[ 103.070669][ T27] audit: type=1800 audit(1580831775.325:36): pid=10362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 103.967637][ T27] audit: type=1400 audit(1580831776.325:37): avc: denied { watch } for pid=10450 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16180 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.14' (ECDSA) to the list of known hosts. 2020/02/04 15:56:25 fuzzer started syzkaller login: [ 112.918413][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 112.918430][ T27] audit: type=1400 audit(1580831785.275:42): avc: denied { map } for pid=10546 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=2339 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/02/04 15:56:27 dialing manager at 10.128.0.26:41199 2020/02/04 15:56:27 syscalls: 2964 2020/02/04 15:56:27 code coverage: enabled 2020/02/04 15:56:27 comparison tracing: enabled 2020/02/04 15:56:27 extra coverage: enabled 2020/02/04 15:56:27 setuid sandbox: enabled 2020/02/04 15:56:27 namespace sandbox: enabled 2020/02/04 15:56:27 Android sandbox: /sys/fs/selinux/policy does not exist 2020/02/04 15:56:27 fault injection: enabled 2020/02/04 15:56:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/02/04 15:56:27 net packet injection: enabled 2020/02/04 15:56:27 net device setup: enabled 2020/02/04 15:56:27 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/02/04 15:56:27 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 115.112020][ T27] audit: type=1400 audit(1580831787.465:43): avc: denied { integrity } for pid=10561 comm="syz-executor" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 15:58:57 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYPTR64], 0x8) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x400000018600010d) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 264.708579][ T27] audit: type=1400 audit(1580831937.065:44): avc: denied { map } for pid=10563 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1036 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 15:58:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff81, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x6}]}, 0x30}}, 0x0) [ 264.956375][T10564] IPVS: ftp: loaded support on port[0] = 21 [ 265.053061][T10566] IPVS: ftp: loaded support on port[0] = 21 15:58:57 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[]], 0x8) r2 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x400000018600010d) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 265.179366][T10564] chnl_net:caif_netlink_parms(): no params data found [ 265.352206][T10564] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.367678][T10564] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.387208][T10564] device bridge_slave_0 entered promiscuous mode [ 265.426725][T10564] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.440107][T10572] IPVS: ftp: loaded support on port[0] = 21 [ 265.446748][T10564] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.455433][T10564] device bridge_slave_1 entered promiscuous mode [ 265.481056][T10566] chnl_net:caif_netlink_parms(): no params data found 15:58:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) bind$rxrpc(0xffffffffffffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r1, &(0x7f0000000c80), 0x400000000000345, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)) [ 265.540593][T10564] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 265.578064][T10564] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 265.682436][T10564] team0: Port device team_slave_0 added [ 265.692704][T10566] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.716807][T10566] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.725892][T10566] device bridge_slave_0 entered promiscuous mode [ 265.749977][T10564] team0: Port device team_slave_1 added [ 265.766801][T10566] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.775356][T10566] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.798903][T10566] device bridge_slave_1 entered promiscuous mode 15:58:58 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYPTR64], 0x8) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x400000018600010d) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 265.896257][T10564] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 265.903948][T10564] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 265.934430][T10564] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 265.996001][T10566] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 266.027492][T10564] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 266.036072][T10564] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 266.071911][T10577] IPVS: ftp: loaded support on port[0] = 21 [ 266.088404][T10564] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 266.112911][T10566] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 266.166628][T10572] chnl_net:caif_netlink_parms(): no params data found [ 266.210246][T10566] team0: Port device team_slave_0 added [ 266.218793][T10579] IPVS: ftp: loaded support on port[0] = 21 15:58:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="0302056e49020100001400000000f7ff00000f090200000000bc015bd20000000000420000000000000000000000000000000000000000230000ffffdabe", 0x3e, 0x1c0}]) [ 266.300001][T10564] device hsr_slave_0 entered promiscuous mode [ 266.337191][T10564] device hsr_slave_1 entered promiscuous mode [ 266.378567][T10566] team0: Port device team_slave_1 added [ 266.462020][T10566] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 266.469605][T10566] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 266.496573][T10566] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 266.511528][T10566] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 266.518689][T10566] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 266.547040][T10566] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 266.603605][T10572] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.611011][T10572] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.619391][T10572] device bridge_slave_0 entered promiscuous mode [ 266.645489][T10582] IPVS: ftp: loaded support on port[0] = 21 [ 266.653175][T10572] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.663142][T10572] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.671551][T10572] device bridge_slave_1 entered promiscuous mode [ 266.749771][T10566] device hsr_slave_0 entered promiscuous mode [ 266.806952][T10566] device hsr_slave_1 entered promiscuous mode [ 266.847756][T10566] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 266.855644][T10566] Cannot create hsr debugfs directory [ 266.875073][T10572] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 266.891237][T10572] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 266.945505][T10572] team0: Port device team_slave_0 added [ 266.959315][T10572] team0: Port device team_slave_1 added [ 267.006019][T10577] chnl_net:caif_netlink_parms(): no params data found [ 267.041885][T10572] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 267.050698][T10572] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 267.083651][T10572] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 267.130045][T10572] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 267.139302][T10572] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 267.167759][T10572] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 267.293284][T10577] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.301990][T10577] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.312441][T10577] device bridge_slave_0 entered promiscuous mode [ 267.347669][T10579] chnl_net:caif_netlink_parms(): no params data found [ 267.365916][T10577] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.373458][T10577] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.375887][ T27] audit: type=1400 audit(1580831939.725:45): avc: denied { create } for pid=10564 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 267.394414][T10577] device bridge_slave_1 entered promiscuous mode [ 267.413596][ T27] audit: type=1400 audit(1580831939.765:46): avc: denied { write } for pid=10564 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 267.436149][T10577] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 267.449747][ T27] audit: type=1400 audit(1580831939.765:47): avc: denied { read } for pid=10564 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 267.484609][T10564] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 267.579872][T10572] device hsr_slave_0 entered promiscuous mode [ 267.637118][T10572] device hsr_slave_1 entered promiscuous mode [ 267.696746][T10572] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 267.706637][T10572] Cannot create hsr debugfs directory [ 267.715345][T10577] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 267.764626][T10564] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 267.826604][T10564] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 267.902965][T10564] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 268.061005][T10577] team0: Port device team_slave_0 added [ 268.067768][T10579] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.074852][T10579] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.083747][T10579] device bridge_slave_0 entered promiscuous mode [ 268.095639][T10579] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.103233][T10579] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.112693][T10579] device bridge_slave_1 entered promiscuous mode [ 268.139942][T10579] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 268.156933][T10577] team0: Port device team_slave_1 added [ 268.166719][T10582] chnl_net:caif_netlink_parms(): no params data found [ 268.184054][T10579] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 268.234610][T10566] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 268.286262][T10577] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 268.295133][T10577] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 268.326196][T10577] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 268.341076][T10577] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 268.348461][T10577] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 268.375226][T10577] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 268.396112][T10566] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 268.452004][T10579] team0: Port device team_slave_0 added [ 268.477872][T10566] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 268.511723][T10566] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 268.573350][T10579] team0: Port device team_slave_1 added [ 268.640816][T10582] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.650401][T10582] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.659842][T10582] device bridge_slave_0 entered promiscuous mode [ 268.670727][T10582] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.681298][T10582] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.689765][T10582] device bridge_slave_1 entered promiscuous mode [ 268.698279][T10579] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 268.705579][T10579] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 268.731906][T10579] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 268.746330][T10579] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 268.753731][T10579] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 268.780877][T10579] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 268.859835][T10577] device hsr_slave_0 entered promiscuous mode [ 268.897195][T10577] device hsr_slave_1 entered promiscuous mode [ 268.946739][T10577] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 268.954988][T10577] Cannot create hsr debugfs directory [ 269.003646][T10582] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 269.021651][T10582] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 269.098647][T10579] device hsr_slave_0 entered promiscuous mode [ 269.137036][T10579] device hsr_slave_1 entered promiscuous mode [ 269.186820][T10579] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 269.194707][T10579] Cannot create hsr debugfs directory [ 269.222837][T10582] team0: Port device team_slave_0 added [ 269.257988][T10582] team0: Port device team_slave_1 added [ 269.279479][T10572] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 269.333688][T10572] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 269.385385][T10572] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 269.473218][T10582] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 269.482899][T10582] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 269.512998][T10582] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 269.530180][T10582] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 269.537292][T10582] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 269.563784][T10582] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 269.575302][T10572] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 269.770471][T10582] device hsr_slave_0 entered promiscuous mode [ 269.827141][T10582] device hsr_slave_1 entered promiscuous mode [ 269.866756][T10582] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 269.874400][T10582] Cannot create hsr debugfs directory [ 269.934838][T10564] 8021q: adding VLAN 0 to HW filter on device bond0 [ 270.031047][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 270.040410][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 270.057777][T10564] 8021q: adding VLAN 0 to HW filter on device team0 [ 270.081694][T10577] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 270.144445][T10577] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 270.190661][T10579] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 270.259493][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 270.268647][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 270.277578][ T3113] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.284902][ T3113] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.293715][T10577] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 270.345133][T10577] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 270.409403][T10579] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 270.473244][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.487677][T10566] 8021q: adding VLAN 0 to HW filter on device bond0 [ 270.510904][T10579] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 270.579239][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 270.588191][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.596658][ T2733] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.603841][ T2733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.612944][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 270.629743][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 270.640489][T10579] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 270.720950][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 270.734246][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 270.762665][T10566] 8021q: adding VLAN 0 to HW filter on device team0 [ 270.780257][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 270.795344][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 270.804989][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 270.833222][T10582] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 270.893871][T10582] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 270.938198][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 270.951302][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 270.959844][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 270.968967][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 270.977612][ T2733] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.985044][ T2733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.993328][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 271.002396][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 271.033233][T10582] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 271.081791][T10572] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.092393][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 271.102756][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 271.112308][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 271.121185][ T2732] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.128310][ T2732] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.152262][T10582] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 271.242822][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 271.251650][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 271.260076][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 271.269150][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 271.278087][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 271.287300][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 271.296915][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 271.335363][T10564] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 271.380956][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 271.391895][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 271.401083][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 271.410047][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 271.418738][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 271.427793][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 271.442864][T10572] 8021q: adding VLAN 0 to HW filter on device team0 [ 271.483985][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 271.494325][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 271.520984][T10577] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.534542][T10566] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 271.544099][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 271.556109][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 271.565126][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 271.574530][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.583526][ T2733] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.590632][ T2733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.606964][T10564] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 271.651496][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 271.659919][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 271.669184][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 271.678725][ T2742] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.685784][ T2742] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.714061][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 271.751524][T10577] 8021q: adding VLAN 0 to HW filter on device team0 [ 271.769647][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 271.781866][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 271.790039][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 271.801477][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 271.809956][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 271.847936][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 271.864751][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 271.874307][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 271.888036][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.899324][ T2876] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.906488][ T2876] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.914544][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 271.923688][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 271.932470][ T2876] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.939659][ T2876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.949708][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 271.978118][T10566] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 271.991753][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 272.005831][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 272.014601][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 272.023412][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 272.032776][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 272.078655][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 272.087326][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 272.095944][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 272.105131][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 272.114882][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.135109][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 272.150203][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 272.161586][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.179561][T10572] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 272.191687][T10582] 8021q: adding VLAN 0 to HW filter on device bond0 [ 272.207978][T10579] 8021q: adding VLAN 0 to HW filter on device bond0 [ 272.219476][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.227952][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.249260][T10564] device veth0_vlan entered promiscuous mode [ 272.257941][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 272.269233][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 272.307270][T10579] 8021q: adding VLAN 0 to HW filter on device team0 [ 272.318011][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 272.333410][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 272.341655][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.350242][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 272.358833][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.367106][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 272.375724][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 272.393737][T10564] device veth1_vlan entered promiscuous mode [ 272.412426][T10582] 8021q: adding VLAN 0 to HW filter on device team0 [ 272.435261][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 272.449584][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 272.459384][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 272.469505][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.478699][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.488806][ T2897] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.495888][ T2897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.504051][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.513083][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.522773][ T2897] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.530674][ T2897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.544405][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 272.555173][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 272.564885][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 272.574697][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 272.627206][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 272.638495][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.651193][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.661012][ T2953] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.668503][ T2953] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.676475][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.687375][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.695791][ T2953] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.703098][ T2953] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.711582][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 272.720678][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 272.728398][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 272.736023][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 272.751660][T10577] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 272.765451][T10577] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 272.784936][T10572] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 272.813793][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 272.822852][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.832531][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 272.841693][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 272.853343][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 272.862687][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 272.902184][T10566] device veth0_vlan entered promiscuous mode [ 272.910030][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 272.920157][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 272.930615][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 272.939781][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 272.948999][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.967069][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.975965][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 273.031697][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 273.043637][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 273.052453][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 273.062136][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 273.071057][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 273.080348][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 273.089837][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 273.099137][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 273.108386][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 273.117097][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 273.134792][T10566] device veth1_vlan entered promiscuous mode [ 273.147584][T10582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 273.166887][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 273.175682][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 273.184617][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 273.193475][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 273.202262][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 273.211677][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 273.245350][T10564] device veth0_macvtap entered promiscuous mode [ 273.263238][T10577] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 273.283134][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 273.292747][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 273.302354][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 273.311362][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 273.321067][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 273.331778][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 273.355472][T10564] device veth1_macvtap entered promiscuous mode [ 273.371046][T10579] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 273.424673][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 273.433942][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 273.443140][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 273.461138][T10572] device veth0_vlan entered promiscuous mode [ 273.492733][T10564] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 273.501180][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 273.512344][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 273.521837][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 273.531689][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 273.545007][T10582] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 273.585575][T10564] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 273.595733][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 273.605345][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 273.613971][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 273.621773][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 273.629456][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 273.638504][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 273.657013][T10572] device veth1_vlan entered promiscuous mode [ 273.696190][T10579] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 273.729616][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 273.748122][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 273.768543][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 273.780692][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 273.789462][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 273.820025][T10566] device veth0_macvtap entered promiscuous mode [ 273.886209][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 273.894572][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 273.909972][T10566] device veth1_macvtap entered promiscuous mode [ 274.010648][ T27] audit: type=1400 audit(1580831946.365:48): avc: denied { associate } for pid=10564 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 274.037637][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 274.051769][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 274.062278][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 274.074710][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 274.084924][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 274.096234][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 274.110681][T10577] device veth0_vlan entered promiscuous mode [ 274.158839][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 274.172248][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 274.184822][T10566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 274.206890][T10566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.224709][T10566] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 274.253743][T10572] device veth0_macvtap entered promiscuous mode [ 274.264053][ T27] audit: type=1400 audit(1580831946.615:49): avc: denied { open } for pid=10606 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 274.302475][ T27] audit: type=1400 audit(1580831946.615:50): avc: denied { kernel } for pid=10606 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 274.335999][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 274.350745][ C0] hrtimer: interrupt took 36900 ns [ 274.362815][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 274.373764][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 274.385992][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 274.397211][ T27] audit: type=1400 audit(1580831946.615:51): avc: denied { confidentiality } for pid=10606 comm="syz-executor.0" lockdown_reason="unsafe use of perf" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 [ 274.430097][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 274.440356][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 274.453253][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 274.462898][ T27] audit: type=1400 audit(1580831946.655:52): avc: denied { watch watch_reads } for pid=10609 comm="syz-executor.0" path="/root/syzkaller-testdir791390496/syzkaller.NUiTr8/0/file0" dev="sda1" ino=16519 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 274.500778][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 274.514309][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 274.531257][T10577] device veth1_vlan entered promiscuous mode [ 274.543086][T10572] device veth1_macvtap entered promiscuous mode 15:59:06 executing program 0: [ 274.560096][T10579] device veth0_vlan entered promiscuous mode [ 274.574136][T10566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 274.609483][T10566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.628594][T10566] batman_adv: batadv0: Interface activated: batadv_slave_1 15:59:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000240)={0x1000, 0xdff, 0xae9, {0x77359400}, 0x6, 0x9}) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) r2 = open(&(0x7f0000000080)='./file0\x00', 0x2fc, 0x0) flock(r2, 0x1) flock(0xffffffffffffffff, 0x0) r3 = open(0x0, 0x0, 0x0) flock(r3, 0x1) flock(r3, 0x8) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) pipe(&(0x7f0000000080)) [ 274.719260][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 274.734804][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 274.752333][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 274.763686][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 274.780894][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 274.794009][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 274.815404][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 274.825137][T10582] device veth0_vlan entered promiscuous mode 15:59:07 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) inotify_init1(0x0) inotify_init1(0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0xf0]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 274.893024][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 274.917306][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 274.931477][T10572] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 274.943645][T10572] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.966166][T10572] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 274.978423][T10572] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.991099][T10572] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 275.022843][T10582] device veth1_vlan entered promiscuous mode [ 275.049758][T10579] device veth1_vlan entered promiscuous mode [ 275.059907][T10627] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 275.108523][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 275.122038][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 275.152311][T10572] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 275.165402][T10572] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.176244][T10572] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 275.188158][T10572] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.205881][T10572] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 275.237151][T10577] device veth0_macvtap entered promiscuous mode [ 275.255757][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 275.281680][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 275.301585][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 275.321147][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 275.377572][T10577] device veth1_macvtap entered promiscuous mode [ 275.385561][T10632] netlink: 'syz-executor.1': attribute type 16 has an invalid length. [ 275.404986][T10632] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 275.412756][T10632] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 275.422852][T10632] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 275.431552][T10632] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 275.458122][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 275.484098][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 15:59:07 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x9371, 0x0) 15:59:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5c000000020605000000000000000000000000000900020073797a320000000016000300686173683a6e65742c706f72742c6e65740000000c0007800800134000000000050001000700000005000400000000000500050002000000227046a827ce7263668e47641cc3b800027ecbf01534053cb14d8f1a1b4412c712f7a5fd1bd5b4f15abc28bf35d8eb1d0702937829aca739ef428249bd6ed18a"], 0x5c}}, 0x0) 15:59:08 executing program 1: bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r0, 0x4b61, &(0x7f0000000080)) [ 275.684845][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 275.704618][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 275.737052][T10577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 15:59:08 executing program 0: syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x2fc, 0x0) flock(r0, 0x1) r1 = open(0x0, 0x2fc, 0x0) flock(r1, 0x0) pipe(0x0) flock(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 275.737084][T10577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.737095][T10577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 275.737101][T10577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 15:59:08 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x560a, 0x0) [ 275.737113][T10577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 275.737119][T10577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.738875][T10577] batman_adv: batadv0: Interface activated: batadv_slave_0 15:59:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000037000510d25a80648c63940d0324fc60100010400a000000053582c137153e370948018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0xf) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000000)=0x80000001) [ 275.743286][T10579] device veth0_macvtap entered promiscuous mode [ 275.744549][T10577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 275.744557][T10577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.744568][T10577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 275.744575][T10577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.744585][T10577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 275.744592][T10577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.746077][T10577] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 275.779313][ T27] audit: type=1400 audit(1580831948.135:53): avc: denied { create } for pid=10641 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 15:59:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5c000000020605000000000000000000000000000900020073797a320000000016000300686173683a6e65742c706f72742c6e65740000000c0007800800134000000000050001000700000005000400000000000500050002000000227046a827ce7263668e47641cc3b800027ecbf01534053cb14d8f1a1b4412c712f7a5fd1bd5b4f15abc28bf35d8eb1d0702937829aca739ef428249bd6ed18a"], 0x5c}}, 0x0) [ 275.780819][ T27] audit: type=1400 audit(1580831948.135:54): avc: denied { write } for pid=10641 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 275.799259][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 275.802005][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 275.802517][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 275.802941][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 275.803355][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 275.803910][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 275.804478][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 275.825214][T10579] device veth1_macvtap entered promiscuous mode [ 275.852644][T10582] device veth0_macvtap entered promiscuous mode [ 275.946066][T10579] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 275.946075][T10579] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.946086][T10579] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 275.946092][T10579] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.946101][T10579] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 275.946106][T10579] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.946115][T10579] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 275.946121][T10579] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.971479][T10579] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 275.972881][T10582] device veth1_macvtap entered promiscuous mode [ 275.975966][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 275.976854][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 275.977525][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 275.978150][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 275.978754][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 276.032426][T10579] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 276.032434][T10579] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.032442][T10579] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 276.032447][T10579] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.032456][T10579] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 276.032460][T10579] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.032469][T10579] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 276.032474][T10579] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.033928][T10579] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 276.060688][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 276.061348][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 276.102570][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 276.102580][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.102591][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 276.102598][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.102609][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 276.102615][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.102635][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 276.102641][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.102652][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 276.102659][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.106224][T10582] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 276.106322][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 276.107748][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 276.148332][T10650] ptrace attach of "/root/syz-executor.2"[10648] was attempted by "/root/syz-executor.2"[10650] [ 276.160019][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 276.160028][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.160038][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 276.160044][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.160054][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 276.160059][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.160070][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 276.160075][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.160085][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 276.160091][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.163539][T10582] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 276.169511][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 276.170215][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 276.478053][T10668] netlink: zone id is out of range [ 276.478117][T10668] netlink: zone id is out of range [ 276.961708][T10678] Dev loop5 Sun disklabel: Csum bad, label corrupted [ 276.962476][T10678] Dev loop5: unable to read RDB block 1 [ 276.963500][T10678] loop5: unable to read partition table [ 276.964598][T10678] loop5: partition table beyond EOD, truncated [ 276.964679][T10678] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 15:59:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199815491be65c3154ad160c3b3ea8100cbb96a06f8b0dd4cfd90b52ebf91d96ad7ec5678f5900c32c2393f1d4010577a7ab0f26501c03a7c3e1d2104e948cd2ae1cb42fbb1490201f72a1390327ba114af6071764f185268dac8650786bc215fe30e91909a321591f55cda9a591e6fc80509aa1bc925423384a1f0bcf36899ad18b091791dfb8be2d9c70315619ea42f0ecb", 0x119}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 15:59:12 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:12 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4bfa, &(0x7f0000000000)) 15:59:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) inotify_init1(0x0) inotify_init1(0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:59:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="0302056e49020100001400000000f7ff00000f090200000000bc015bd20000000000420000000000000000000000000000000000000000230000ffffdabe", 0x3e, 0x1c0}]) 15:59:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) 15:59:12 executing program 1: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) [ 279.909530][T10704] Dev loop5 Sun disklabel: Csum bad, label corrupted [ 279.927685][T10704] Dev loop5: unable to read RDB block 1 [ 279.944118][T10704] loop5: unable to read partition table 15:59:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) gettid() socket$kcm(0x10, 0x3, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="20000000000000000000000007000000070f06a0b5bc7c2a30b8673a00000200"], 0x20}, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) [ 279.955559][T10704] loop5: partition table beyond EOD, truncated 15:59:12 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) [ 279.994355][T10704] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 15:59:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r0, 0x4b45, &(0x7f0000000080)) 15:59:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x129}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 15:59:12 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:15 executing program 5: 15:59:15 executing program 4: 15:59:15 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:15 executing program 3: 15:59:15 executing program 1: 15:59:15 executing program 1: 15:59:15 executing program 5: 15:59:15 executing program 3: 15:59:15 executing program 2: ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:15 executing program 4: 15:59:15 executing program 0: 15:59:15 executing program 1: 15:59:15 executing program 5: 15:59:15 executing program 3: 15:59:15 executing program 2: ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:15 executing program 4: 15:59:15 executing program 2: ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:15 executing program 5: 15:59:15 executing program 3: 15:59:15 executing program 1: 15:59:15 executing program 4: 15:59:16 executing program 0: 15:59:16 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:16 executing program 5: 15:59:16 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x4) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000007c0)=ANY=[@ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008000100", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYPTR64], 0x7}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x49249249249265a, 0x0) 15:59:16 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x11, 0x4, 0x0, 0x5}, 0x3c) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x2, 0x3, 0x238, 0xc8, 0xc8, 0x0, 0xc8, 0x0, 0x1a0, 0x1a0, 0x1a0, 0x1a0, 0x1a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x48], 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@unspec=@cluster={{0x30, 'cluster\x00'}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}, 0x0, 0x98, 0xd8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x14e) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @rand_addr, @dev}, &(0x7f0000000040)=0xc) 15:59:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000080)={0x2c, "06d0d08759418e1dff068f91ae994ad303584fb590f9f97d351bde6158af73cdc02564fe17b6fb2ebfbd514e508eb300f09dcdc66e11f8b0d5f5b38402e6a22a81c65d0df800a438defb9360162ca49c1ee5c75f538f043d4f974ef2b3d8657e14b444b33a0c9f788463d16c9c0a18449cccf0c1d207a0a1fda0b9ddfad58b16"}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 15:59:16 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x1000f03, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000200)='XFSB', 0x4}], 0x8004, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000000)="56e70911755416988d", 0x9}], 0x1, &(0x7f0000000240)=[@txtime={{0x18, 0x1, 0x3d, 0x100000001}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}], 0x48}}, {{&(0x7f00000002c0)=@ipx={0x4, 0x9, 0x59, "3aa6bf1754ea", 0x3}, 0x80, &(0x7f00000014c0)=[{&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000000140)="e0d9", 0x2}, {&(0x7f0000001340)="fd8d41c9cf3812623e407bfff11f8b39c469cd5449ea24cbcb80d2196d2d4a", 0x1f}, {&(0x7f0000001380)="ec145e0226930b28c91abc4713bb4ae04a4a15bee41fd49845fdafaeafbb2dc56601fc977928c11189ed89cb533ee6b789813396e5c4ed461c21a2a1e71075e1c1429974e670ef28ada2cdbdd0ec77de7e0bd57681e6a88bfa38eeb5136da9d0fd345ef30831a399716b7daa537dc1a9d83f1094210b3c3416bf5745f0fdcaec65985557e35f36cc1d8c3bdd9ea51262b70217ec36d606c9a020d61c49e14e38e12a13140a252f9f336965a59e6ff1", 0xaf}, {&(0x7f0000001440)="985e46a1a0212933c31aba64f14b9e3b82af24d220939a6c45ad92f60acd5ef8d08d22722f9aa93de705b2ce995f515e055bac241b86df655bce53f087147a7b4229e955", 0x44}], 0x5, &(0x7f0000001540)=[@timestamping={{0x14, 0x1, 0x25, 0x4}}, @timestamping={{0x14}}], 0x30}}, {{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001580)="fd21774fbc61c932a32166538ea03bce4c5b432f6f13cb2a64c4378f62b1f62124b8ff5f5928b5c47e3a14ad6f94ca481a23f2cbbad090aa20a51ee02f93dee619b42e2571f531d84d52a6f00a1c9a1a86fcf7b5d66358cf3d5b5debf98e9cefe36e", 0x62}, {&(0x7f0000001600)="bcc732e67c532b84e0b2f8ea34fb4ad69325e2f463078bf097f16db47aa0554f50bb712234b37480a3e4c0", 0x2b}], 0x2, &(0x7f0000001680)=[@mark={{0x14, 0x1, 0x24, 0xffff}}, @mark={{0x14}}], 0x30}}], 0x3, 0x20008800) 15:59:16 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:16 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) [ 284.127513][ T27] audit: type=1400 audit(1580831956.485:55): avc: denied { map_create } for pid=10805 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 284.153418][T10813] x_tables: ip_tables: TCPMSS target: only valid for protocol 6 15:59:16 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x8) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) [ 284.181123][T10814] x_tables: ip_tables: TCPMSS target: only valid for protocol 6 [ 284.189303][ T2633] blk_update_request: I/O error, dev loop3, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 284.247334][ T2633] blk_update_request: I/O error, dev loop3, sector 256 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 284.267103][T10808] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 15:59:16 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:16 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) r3 = socket(0x10, 0x80002, 0x0) r4 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xffff, 0x100) bind$xdp(r3, &(0x7f0000000240)={0x2c, 0xa, 0x0, 0x14, r4}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = socket(0x1e, 0x4, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r5, 0x10f, 0x81, &(0x7f0000000480), 0x4) sendmsg$tipc(r5, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) getrandom(&(0x7f0000001300)=""/4096, 0x1000, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0x0) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0x9, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000300)="155fa0fdcf", 0x5, 0x4}, {&(0x7f0000000340)="7fa97a4edae62c91fe60a928964a7a64e21143dfbe2989bd3e1cbdb8fe00e83c929c7fbdd3709dad00a263d31899028f0be19a7d1bfe9ef3b42bd9a8af552e35b93f133170acc1d99792cd448a1525cb69ee0dc0693ba3be05964926f0c3f4faa9372b19c2cb46dd8416a467fcd4dc8b226578dd4df583e72208ad7da3b0d4ec8749a3b031057622180a9a2a7f5c89b1b1295e2dcec09aac3a1b9aa4d8cc312fec5f23be9e10875a4e5ebd3a1c724851a61d12ae91fcb8b751b033f0d9b9517887e7845b60f3f74bb6b7dd0d1933cd6a4e4bda71c4dd20a38a800c6b5ca431f2abd67e17ab3b9bae4194c080", 0xec, 0x8}, {&(0x7f00000004c0)="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", 0xfc, 0x5}], 0x800, &(0x7f0000000740)=ANY=[@ANYBLOB='check=strict,debug,nodots,nodots,dots,nodots,dots,fowner<', @ANYRESDEC=r6, @ANYBLOB=',dont_appraise,euid>', @ANYRESDEC=r8, @ANYBLOB="2c646f6e745f686173682c6673750004000033653765643465322d333561642d623262362d615e62662d38006232003530362c00"]) recvmmsg(r5, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000100)=""/203, 0xcb}], 0x1}}], 0x1, 0x0, 0x0) [ 284.392842][ T27] audit: type=1400 audit(1580831956.745:56): avc: denied { name_connect } for pid=10826 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 284.464465][ T2633] blk_update_request: I/O error, dev loop3, sector 512 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 284.486690][T10808] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 15:59:16 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) [ 284.545345][T10808] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found 15:59:16 executing program 3: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYRES64=0x0], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) r1 = fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="2f6c2ac50c0000000000b484100000000400001c0000000006000000000006000000000000000000040000000000004dfe8fe26d41b52548c1534d3f676cecf328"], 0x2f) r2 = dup2(r0, 0xffffffffffffffff) sendmsg$nl_generic(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0xcc}, 0x1, 0x0, 0x0, 0x8040}, 0x8000) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000480)={0x8, 0xffffffffffffffff, 0x3f}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x400000000000}, 0x0, 0x0, 0x20, 0x0, 0x3}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = getpgrp(r1) setpriority(0x0, r3, 0xffff) socket$kcm(0x2b, 0x1, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r6 = dup2(r5, r4) setsockopt$MISDN_TIME_STAMP(r6, 0x0, 0x1, &(0x7f0000000140), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x80, 0x0) write$cgroup_subtree(r7, &(0x7f0000000280)={[{0x2d, 'cpu'}]}, 0x5) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) ioctl$CAPI_NCCI_OPENCOUNT(0xffffffffffffffff, 0x80044326, &(0x7f0000000240)=0xcaf) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 15:59:16 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) [ 284.605412][T10808] UDF-fs: Scanning with blocksize 512 failed [ 284.642413][ T2632] blk_update_request: I/O error, dev loop3, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 284.688124][ T2632] blk_update_request: I/O error, dev loop3, sector 512 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 284.700822][T10808] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 284.722467][ T2633] blk_update_request: I/O error, dev loop3, sector 1024 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 284.735063][T10808] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 284.769150][T10808] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found 15:59:17 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000080)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xfd, 0xd4, &(0x7f00000001c0)="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", &(0x7f0000000480)=""/212, 0x2, 0x0, 0xa3, 0x1000, &(0x7f00000003c0)="925850599408e37985ba80e458b6b944b05eabb00c48e65f544a92796379c2cca132fb52a6d1fcae7dd09c318381b69e2000a46d6d12f5bbfa4c109949d1dc98589104d7b3670d8b1ab65d558b87533db9572ab1aa2cf132021e0799718509bb1dfd3c3c1606face16be0bf8a9654f6c8986432f170d45c98f12fa4f725ef2a06d28531dbb3c5656b89dbf6e002fc65a2b0d355baee7e6de5a239a476c467e150f954c", &(0x7f0000000bc0)="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"}, 0x40) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f0000000040)={0x7, 0x3, 0x1, 0x3, '\x00', 0x7fff}) [ 284.817318][T10808] UDF-fs: Scanning with blocksize 1024 failed [ 284.848505][ T2633] blk_update_request: I/O error, dev loop3, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 15:59:17 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, 0x0) [ 284.903526][ T2633] blk_update_request: I/O error, dev loop3, sector 1024 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 284.913926][ T27] audit: type=1400 audit(1580831957.265:57): avc: denied { prog_load } for pid=10857 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 284.979461][T10808] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 285.026741][ T27] audit: type=1400 audit(1580831957.375:58): avc: denied { prog_run } for pid=10857 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 285.132752][ T2633] blk_update_request: I/O error, dev loop3, sector 2048 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 285.144469][T10808] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 285.176765][T10808] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 285.191623][T10808] UDF-fs: Scanning with blocksize 2048 failed [ 285.227205][ T2632] blk_update_request: I/O error, dev loop3, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 285.239258][T10808] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 285.257098][T10808] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 285.305359][T10808] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 285.339557][T10808] UDF-fs: Scanning with blocksize 4096 failed [ 285.345701][T10808] UDF-fs: warning (device loop3): udf_fill_super: No partition found (1) [ 285.379930][T10819] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 285.390810][T10819] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 285.407046][T10819] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 285.415713][T10819] UDF-fs: Scanning with blocksize 512 failed [ 285.428875][T10819] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 285.466485][T10819] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 285.505049][T10819] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 285.523360][T10819] UDF-fs: Scanning with blocksize 1024 failed [ 285.530594][T10819] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 285.541771][T10819] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 285.551647][T10819] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 285.560091][T10819] UDF-fs: Scanning with blocksize 2048 failed [ 285.569454][T10819] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 285.579897][T10819] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 285.590202][T10819] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found 15:59:17 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f0000000080)='.\x00', 0x20400, 0x0) write(r1, &(0x7f0000000600)="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", 0xe00) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) fallocate(r1, 0x11, 0x0, 0x10000) 15:59:17 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x5, 0x8000) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f00000001c0)={0xfffffff, 0x80, 0x7, r5, 0x0, &(0x7f0000000180)={0x9909df, 0x0, [], @p_u32=&(0x7f0000000140)=0x8}}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="58000000020601080000000000000000000000000500050002000000090002007392797a3000000000050001000600000014a50300686173683a69702d706f72742c6970000c0007800800124000000c"], 0x1}, 0x1, 0x0, 0x0, 0x4090}, 0x0) 15:59:17 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, 0x0) 15:59:17 executing program 3: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYRES64=0x0], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) r1 = fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="2f6c2ac50c0000000000b484100000000400001c0000000006000000000006000000000000000000040000000000004dfe8fe26d41b52548c1534d3f676cecf328"], 0x2f) r2 = dup2(r0, 0xffffffffffffffff) sendmsg$nl_generic(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="cc0000003a0000062abd7000fddbdf250800000023396865666649887cd71f7ed7b9af5bd806b55bca0a2fac877d39ef0000338c604898aa32c82af0c93bdae209c372b30c5eb992eb88461dbf849f052c8dff5e4573ebcff29802646452203bc6c16497bd83a861942412404b6bccd241214b712245217c7041cb3346d53d7ecbb1bd23a88fd0f1e06070f32c45f53c6801c41e7ff31feb452e4a495137060000007d3998cc4d63aa73bc99c217ede877430c19fc069c0abbcf943b8c7f92a474f3005531bc88e35ce2fab1c4ec0c04874a6f43b9ef0f9cf7e312b7bb8f82af2b7b58a30f5bf6f7cad910933f4d8135fde32ce2df192f8e291ce98e865ad803f63f4ecd15943e0ac297c9bea2e49fa582b953b6b64521044f058c5d95f930a9162f3155195a48cce9b3e00ddfc5676091c884a38663e807d952b3c3d2ba359fb6d393c0a0d697ad7b1794ffd52258dafa2cc67e5b0c36e433d1b890da2f3851a9f89c83ef9bf8f9d3bc5229d539c61b04944d6ce73e7a9a946f8494461dd8d16d25bd23513220a72b2ddcb6ea30af3d55456ac33ac7674990feacd0528f96e1434e59887fb200fc98e4f12b04ab5edff32ba7e673cc3d91aecfd63ad847089c45bc1ea8aa5999de8354c149fb8813edf4c3a5f3c7ae54d76e050ce1c85acbd812f8b1a4ba8ecc293e2ce3ddfdd5c72e58f9c79688078330f6948eb0ed9a"], 0xcc}, 0x1, 0x0, 0x0, 0x8040}, 0x8000) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000480)={0x8, 0xffffffffffffffff, 0x3f}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x400000000000}, 0x0, 0x0, 0x20, 0x0, 0x3}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = getpgrp(r1) setpriority(0x0, r3, 0xffff) socket$kcm(0x2b, 0x1, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r6 = dup2(r5, r4) setsockopt$MISDN_TIME_STAMP(r6, 0x0, 0x1, &(0x7f0000000140), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x80, 0x0) write$cgroup_subtree(r7, &(0x7f0000000280)={[{0x2d, 'cpu'}]}, 0x5) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) ioctl$CAPI_NCCI_OPENCOUNT(0xffffffffffffffff, 0x80044326, &(0x7f0000000240)=0xcaf) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 15:59:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_BASE(r4, 0x4008af12, &(0x7f00000001c0)={0x3, 0x10001}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$MON_IOCX_GET(r7, 0x40189206, &(0x7f0000000080)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000040)=""/6, 0x6}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000001300)={r5, 0x3, 0x6, @dev}, 0x10) r8 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f0000001300)={r9, 0x3, 0x6, @remote}, 0x10) r10 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r10, r8, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000200)=0x51) ioctl(r11, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r12 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0xec71, 0x200040) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) futimesat(r12, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)={{r13, r14/1000+10000}, {0x0, 0x2710}}) ioctl$sock_inet_SIOCSIFBRDADDR(r11, 0x891a, &(0x7f0000000100)={'ipvlan0\x00', {0x2, 0x4e23, @multicast1}}) [ 285.601080][T10819] UDF-fs: Scanning with blocksize 4096 failed [ 285.607403][T10819] UDF-fs: warning (device loop3): udf_fill_super: No partition found (1) 15:59:18 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, 0x0) 15:59:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000240)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x2cc400, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$IPSET_CMD_ADD(r3, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="90000000090601020000797a30000000000900020073797a310000000005000100070000000900020073797a3100000000500007800500070000000000080009400000fd1a0a001100000000000000000008000a4000000009180001801400024024485b8730cb17d53b525a57de5c6e260800094000000008060005404e200000"], 0x90}, 0x1, 0x0, 0x0, 0x40080}, 0xc080) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) r4 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0x60) 15:59:18 executing program 5: ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) [ 285.774520][T10892] device syz_tun entered promiscuous mode [ 285.934732][ T27] audit: type=1800 audit(1580831958.285:59): pid=10898 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16581 res=0 15:59:18 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:59:18 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x2, @empty, 0x1f}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$vcsu(&(0x7f0000000200)='/dev/vcsu#\x00', 0xf7, 0x28281) write$vhost_msg_v2(r4, &(0x7f0000000340)={0x2, 0x0, {&(0x7f0000000500)=""/4096, 0x1000, &(0x7f0000000240)=""/240, 0x2, 0x3}}, 0x48) recvfrom$netrom(r3, &(0x7f0000000040)=""/178, 0xb2, 0x40000000, &(0x7f0000000100)={{0x3, @null, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) bind$rose(r1, &(0x7f00000001c0)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default]}, 0x40) sendfile(r0, r1, 0x0, 0x4000000000dc) [ 286.033464][T10892] device syz_tun left promiscuous mode 15:59:18 executing program 5: ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:18 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f0000000080)='.\x00', 0x20400, 0x0) write(r1, &(0x7f0000000600)="bb8f9f640903127a53527c6fbfe65d43b0e0586f2d40c7e7df58cac83420e83662d6e39bb6d5430622431454eedeeaee423d8f210bc3525fa7927c18d5fbc91ab13c2041136047d8da9375934d00f325499bfe7712208d387d41c31821c2a22d1325b556528e9b790b74053d1ed631c6ec8126d37c87216173138c00cef396868029af5b76bebac5e38b74d8bbc6ae66b6e202b6d505710377710ea7d43edf00e1a4c1c670bb4c263ce777da81abdd5ba5a5c82f67232f9b4d6f21b2e6afa8b38e4642b0daa2acbc0478d89b88e8b2094d4248855e5e81992e60be3afff0f3c3799350615489a901a659abdeca0c615a622ebf64175f990320e0356d4a11ed62eff72b709c23dd65942e8b534d7d775d370c1e435654a2634e6ee3649c4c3bcbe39e866f1eb9972af1a9cef42e701798a53dc92a242aadbac343e1765cf8ea5665e22deda69777e52b1e9e5d3edc022256939e1eee013448294911139d5b9c6241049fecdf9b31f4cdf6cff65d71b5071ef70e1798347c8846aa5b905e83050e3e606986ed3f603d18c5cdeb11cda1ce3abddea9376231af130e19fc7601ec1ab8cb5a7de9e2174547f18225b09a54fc8720dbb91eb69c1be88e601c3c9df4f2758f39a5151951b9c6dbb419ffd783a34c9fad10f201b8724d31865e2fc1fcf48db2be713053b43a0e3943c1e2b08e8a26e946c439d891db2a80b5ffa054bc8d0177d3214056250c61a537d2ec7630fb90395df2cd6aa9c5e573365db580520bdc3f1c6b2be992e1516a4b810a11935dc780699e461d9715f70c6d103ff49bf168f3cff4c0d0d6ba5671fcd2975450b0e1a3474139cb0f2d3476fcd87a8bccbeb2f5f8a821017b879aa5b9d1fafa9f4c429a74cd2da782114d97bf031746a817dd0293c4eddc3a9ecb5afe496f4971474ccd827449409f07cf94dda2e7dbe8520b5afff10a7e3b0b4289a167fc692635b5b7426d9e771b95860b09a3e752c867213c772e48ba30a78feecc7ff26e63e1749c62b52d377ac5cc52db830c965e04ccfcfb24ceacc69cfdc2094124dd27b2d68f699476a2562bab1de117ffc2b0702ee8b0b77f85fecec3a25b37ab7eb06232c9a73b4470f1727c82581d81942abf42d3ea37957927ad3dbd0ebe46678a9f4d25c47acaac83c14210a54b71fed40df017e2be27f01e3e6ea3ea381ca14efd202858e6535ad4f79a8cdf47e385b740a70c14e3651731a45cc0ca4a56f2e903cad0384efcc364caf67e09551d35c682ebc90a9286c4d274ba1b8ced742ede4e55a62db7ef9a96fde2add05b41599fd72a79ba280cc125cb266ef21b7eeafe3ee6aa78eef33fc66454549c3ec298cb683a55a32208cf6ce88b560166159d59e65f30540f62c5437652ea7f2a02f87ca242dd2250f58e75938a9a3ded51ae6598c2aba53287ff5cdaab17be7f4310f8e07e310d52778de79e1c2e4391b254be38910aa1cf6e1ca0e75d24be97d59f7025f16c6fbd549529b74e319c58f50438765ef0e3dc394eeb75dec41b3d80435b17520c97f5cd7ee692fb86d188fb0089fbf737dc1b96b9cc49be23a38a8cd92e5075f349993d7866369dd25eccbe1481477a05fee14e0edd1617921d7fcaa8fdc642e63b64388fa5b63442ff1466b1938d02546750b01ed9c980282ccbe10f204741249aed88c555ed6fdf7f68af9209807a71bbf4f31bef5a4223466da74ba8b034df529aef6ec6610a0d25973961e50e02af22d0ca8be1b9804a5918acbdb536e8f2f441ec9d640ed15133ee747440c86fc4526c9195954528673d25c8390170f3c19cb0b0c30b9e634c7ebae96946ae97c19eabca92226da925d22be37abbe0740938ea899ec42fd529a3b1063981e4c154219df5cf5af60a29b5a8ee530905725a14b28900eae937e705401ba8f632a7bca00d9724a992afdc9ed14aac71b8e3a7ee5ca095888feb195b4e083c3b611a1c2f8d092febe3b9f5f0df61e8d3c31a643c935b76bc1ad4265164e755484beb06610510bc51e8c6da8d71123bbe83a5e4128f41cf5c486d6a60496c300c406f990bee485cbdef794f2663ee66d2b18d8e55210c25c04b1a0c6d9c5f904e72806d2d4f5e5439bcdf146343cdffe4d0d70d42a9959cff9bd50c37cd478b0b0add16aae4dc839b46bca2ac7547144b6a422aed5e2db661bcb31a82bc0fc678e71a6cb090ef772860f3008b4152b5d281033be4a77b367baec3ab8ce7c83c601b11c8199bafcd15161a5454a6a982dbc3c2e3a5172b6a63e4904817075754eccbb0188c9cb2e5da9600f567485014887463b40f189b7ec3c5c0f36d502509e402c285765c78417ce6b3aab130ee79622dcd8ada842233e73a14554ee5e4995e32b3fe4075e247eb9bdeef64d1a7436c9b5782fb2f84f74e4c6e976289729c37b5bb8200a9480d181a6b11f5ec229b818134b8334967ae935ac1d81be4776fae4cb68b6fa330e93bd8de388b38455d569159bcd166df030a6dfedf28caf4608de7243f5df2c76f6680c301d819dc67d24d2f780432a931700a253b0a5b075195c6dbfd1fe17a1c11a3dffa872a07b877adc66d069fffb6d8326e1998c5a337c3d530250cae335ceffcf81dc438a47e73490d050a053813dbe6674e42c91ae94b4a88144f36adc1b08b4bcd6ddf4058c4e08d4dc83d5fbd843ee27eaf50b297c220350260d9abbeeb6deb921e50cae0ea590cfb6f00fb3c71520f565bb769705e2481ef27cf537d29f163c9fe3d39ed9fd18dc8b0c976cd302283e430807a9d751357f89092532d89fe280c69ad36e3541b5da9dea13fd19d0434c760fe295dfd9b9e63453c7853914c50b1b77ccd4b33c8b1f31fcb1aec040ffe2f9d728d8ea84297bac2e22230ebd1488c503b05b2e433cc37ce9fc123b7d3eb244b4549e9a841e73b664c8f6621ea5a4c9ff9c1da032255311f2c063a682baf4c97e7ba552bf71af4bd64f43872b846d15c65c487089be272cfa24a33f8c50930ea0bc4b089505fb8e9e688d35a978813c38add66548d7575727ded0e7e64a5ce897da6b940df4c3dddb8b4871d773f6ebf02058518c55c19aadb0f266caf18777ae68d2bfcfb2225961fcd10538ba664fd053a443320072707533ab761b9397bd0559126b84fe9196463ae50633017ea2d80940311d9c867102b1017f34af1965d8eb61be616a0d40656e2bbb750aee6f74f788c8acb2578e8686f5f8da6a19e979c152b7ee7c7f16902120588e2ff630144b5f929ffc593e946d9717c5968aa16c2d73d689fb5cce117acda3e23e5e0116de1cb6bddfa1a84cefb22c1e2c3753017696f27b9aec5d44f15411247643b84dd4410e784b4eb5b9c68fea671976f9b51c6526e2ddb40659611b0b3bcc7e249c77396fdb8c864ea9318f9de7fd3936fcbdc732c2f8b9556ec9afeb15d5e2df890351d66074d53dddc6e8dba8c91d733623ac95a49eb69c7de37ff2364ccddb01f6500750a012c2acf32a9f6bbd9e92d17ef858fbc34575db414ea42ad87a65b11ae5506469db256c421328f45aec73bdf18562447dc2840bbe9fc84dedd0fe6276fa174f21210d40193530ec7a70a9e60bfd6b00cba4d483be59950f16fa0dbd089b5fd0bb078badfcf42270cc62fe37be22b0d81f755263d74636fa466d2574ca62b58c649936d21e949de73ea45df3acade6609413f56fc218d6f11947bf1fd629d38d8acce90ee3c1a51117601ae126bec537e3e76ce7ecc53cfeefee8aaa104aa853a65aadf27bac9849ee0122793b11cd8e4f32fb07afa39e439cb738c30a6df958160aac15c26032a61aaf614b2e6601581fb0ab8d115e045005dee3df8ea42643cbcbb0b111130c42c94b7e874cfee50d5c2eb13b3a38c417fce9d740b7d43120431a7d44bc3934ee87b112401cbee3553837b6a0b4b3faaceb46eca4064301c8060870350e256ac9d5557f674536b9d9717a82fa211e7dfb52ca410d8a4f2f6b733c2a082f247538a6c40f56cf64204e62515db692f32733ff6f4b0787ef305d5e80881375467ae603ac3600e688c42f89a4fea4fdda09a8d59e19457c654a98c8129a8c65bae3310af2b170729e18400c915d0a2f4c4fc51747846630b95ec181228bda7ef48ad389815aa82de6c4a3b0746c28c01f9ec697ff17f095e1cf9d2fe78fdab9cbb1ca7aefc8af6a0cd98444735fad79e394a8f9c2fd358c3cde4ca6d57a620d0bb52dc6ff93f034b596f407c21511cc2c5ec8b0ede7f5c0acca61939ac7f2cad820c15133e69507eaa739e9a88936f4a74f0ad1574a1591f31f582a76157d89805cb3ba5e8d10509bf7a08e928653b4f05ba797a06765b74c8759fc34178624c08a2b99e59bcff5d33af2b0f9176b56c35f4da31c751a4c2fd88a1997cd9fc9bbf78220731d4c8cea23be1fd29c36b34d8458b7021ebcfafdc7e54096e517da3eb684298f742532d776164d9c9658e5faca0a3b08afca1bc27ed357884f49fe51bd0c38057f4288f1917e36e3865310b5eed140aef6150ae363293cf7467abd5e06cd7af5e2c49e7c5253a1155741e380bccb023a0faed93d9a64512d72436f1ef4ac0904a413e45164c23413bd57274a0a951c41a9a43aed094d4ea5c480ce64663cc9d36723179e2b19a48e9277a6591bbd888a06e0f2f142cd4495be4ba7274d69ba32a2788b935b2f18c5f336cb9de062829e2e0bb476efb36c3f53a766c14314f31637a464ac59d378ad7f51bef8d88715613653a427038e0d3e4dc3948bb1d70eb55c91c92f7510b1c0387253b458d2c90d17238f9eb239c680179a6c1e0759be367963e3b4d7395fd3911626582a094e6a8d0e746242f94267a4c57d5b2360ce3a6f7f3e3c10e124a54ed24d1585bc7b731cf731c94ee00ebf070b999b9bf28d76bfec9dcf12fcce2b9c4444c706ec6b943b5f39e9151a764ba1cd0cd6c1c7cdc3aa824cf17da705be27a18fbee41be39d6ae4dd4312f5f4bfee2c5bb21d941666f9d79b0f80c9b1bace84a05d2b0e3be1c3fd04d72b4b0124595c435813969d413960fddc858730a433383f3bc0472cb7683ea569e001f", 0xe00) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) fallocate(r1, 0x11, 0x0, 0x10000) 15:59:18 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:59:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000100)={0x0, 0x0, @ioapic}) r2 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/key-users\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4000000000010066) 15:59:18 executing program 3: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYRES64=0x0], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) r1 = fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="2f6c2ac50c0000000000b484100000000400001c0000000006000000000006000000000000000000040000000000004dfe8fe26d41b52548c1534d3f676cecf328"], 0x2f) r2 = dup2(r0, 0xffffffffffffffff) sendmsg$nl_generic(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="cc0000003a0000062abd7000fddbdf250800000023396865666649887cd71f7ed7b9af5bd806b55bca0a2fac877d39ef0000338c604898aa32c82af0c93bdae209c372b30c5eb992eb88461dbf849f052c8dff5e4573ebcff29802646452203bc6c16497bd83a861942412404b6bccd241214b712245217c7041cb3346d53d7ecbb1bd23a88fd0f1e06070f32c45f53c6801c41e7ff31feb452e4a495137060000007d3998cc4d63aa73bc99c217ede877430c19fc069c0abbcf943b8c7f92a474f3005531bc88e35ce2fab1c4ec0c04874a6f43b9ef0f9cf7e312b7bb8f82af2b7b58a30f5bf6f7cad910933f4d8135fde32ce2df192f8e291ce98e865ad803f63f4ecd15943e0ac297c9bea2e49fa582b953b6b64521044f058c5d95f930a9162f3155195a48cce9b3e00ddfc5676091c884a38663e807d952b3c3d2ba359fb6d393c0a0d697ad7b1794ffd52258dafa2cc67e5b0c36e433d1b890da2f3851a9f89c83ef9bf8f9d3bc5229d539c61b04944d6ce73e7a9a946f8494461dd8d16d25bd23513220a72b2ddcb6ea30af3d55456ac33ac7674990feacd0528f96e1434e59887fb200fc98e4f12b04ab5edff32ba7e673cc3d91aecfd63ad847089c45bc1ea8aa5999de8354c149fb8813edf4c3a5f3c7ae54d76e050ce1c85acbd812f8b1a4ba8ecc293e2ce3ddfdd5c72e58f9c79688078330f6948eb0ed9a"], 0xcc}, 0x1, 0x0, 0x0, 0x8040}, 0x8000) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000480)={0x8, 0xffffffffffffffff, 0x3f}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x400000000000}, 0x0, 0x0, 0x20, 0x0, 0x3}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = getpgrp(r1) setpriority(0x0, r3, 0xffff) socket$kcm(0x2b, 0x1, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r6 = dup2(r5, r4) setsockopt$MISDN_TIME_STAMP(r6, 0x0, 0x1, &(0x7f0000000140), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x80, 0x0) write$cgroup_subtree(r7, &(0x7f0000000280)={[{0x2d, 'cpu'}]}, 0x5) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) ioctl$CAPI_NCCI_OPENCOUNT(0xffffffffffffffff, 0x80044326, &(0x7f0000000240)=0xcaf) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 15:59:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) sched_setaffinity(r2, 0x8, &(0x7f0000000040)=0x400) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000000200), 0xfffffffffffffeb4, 0x2000800a, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x17) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r3, r5, 0x0) keyctl$chown(0x4, r3, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000100)=""/140, 0x8c) recvfrom(r1, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x120, 0x0, 0x4f) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 15:59:18 executing program 5: ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) [ 286.607106][ T27] audit: type=1400 audit(1580831958.965:60): avc: denied { create } for pid=10931 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 286.686926][T10937] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:59:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:59:19 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:19 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', 0x0, 0x23c040, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000340)=0x1220384, 0x4) socket(0x100000000011, 0x0, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) bind(r3, 0x0, 0xfffffffffffffe15) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f00000001c0), 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'ip6tnl0\x00'}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/vga_arbiter\x00', 0x420000, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000000)) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088471fffffff00004000638877fbac141426e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) [ 286.931459][ T27] audit: type=1800 audit(1580831959.285:61): pid=10944 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16612 res=0 15:59:19 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) [ 287.089899][ T27] audit: type=1400 audit(1580831959.295:62): avc: denied { ioctl } for pid=10931 comm="syz-executor.0" path="socket:[42230]" dev="sockfs" ino=42230 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 287.213731][T10961] FAULT_INJECTION: forcing a failure. [ 287.213731][T10961] name failslab, interval 1, probability 0, space 0, times 1 [ 287.248839][T10961] CPU: 0 PID: 10961 Comm: syz-executor.2 Not tainted 5.5.0-syzkaller #0 [ 287.257421][T10961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.267493][T10961] Call Trace: [ 287.271116][T10961] dump_stack+0x197/0x210 [ 287.275547][T10961] should_fail.cold+0x5/0xd [ 287.275841][ T27] audit: type=1400 audit(1580831959.585:63): avc: denied { map } for pid=10958 comm="syz-executor.4" path="/dev/nullb0" dev="devtmpfs" ino=23711 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=blk_file permissive=1 [ 287.280083][T10961] ? fault_create_debugfs_attr+0x140/0x140 [ 287.280174][T10961] ? ___might_sleep+0x163/0x2c0 [ 287.280253][T10961] __should_failslab+0xb7/0x100 [ 287.322885][T10961] should_failslab+0x9/0x14 [ 287.327413][T10961] __kmalloc+0x2e0/0x770 [ 287.331792][T10961] ? mark_held_locks+0xf0/0xf0 [ 287.336652][T10961] ? _parse_integer+0x190/0x190 [ 287.342076][T10961] ? tomoyo_realpath_from_path+0xc5/0x660 [ 287.347831][T10961] tomoyo_realpath_from_path+0xc5/0x660 [ 287.353396][T10961] ? tomoyo_path_number_perm+0x193/0x520 [ 287.359062][T10961] tomoyo_path_number_perm+0x1dd/0x520 [ 287.364534][T10961] ? tomoyo_path_number_perm+0x193/0x520 [ 287.370192][T10961] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 287.376076][T10961] ? __f_unlock_pos+0x19/0x20 [ 287.380795][T10961] ? ___might_sleep+0x163/0x2c0 [ 287.385778][T10961] ? selinux_file_mprotect+0x620/0x620 [ 287.391254][T10961] ? __fget_files+0x359/0x520 [ 287.396262][T10961] ? ksys_dup3+0x3e0/0x3e0 [ 287.400960][T10961] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 287.407283][T10961] ? fput_many+0x12c/0x1a0 [ 287.411740][T10961] tomoyo_file_ioctl+0x23/0x30 [ 287.416588][T10961] security_file_ioctl+0x77/0xc0 [ 287.421603][T10961] ksys_ioctl+0x56/0x180 [ 287.425866][T10961] __x64_sys_ioctl+0x73/0xb0 [ 287.430497][T10961] do_syscall_64+0xfa/0x790 [ 287.435095][T10961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.441123][T10961] RIP: 0033:0x45b399 [ 287.445244][T10961] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.465260][T10961] RSP: 002b:00007f12d04f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 287.474111][T10961] RAX: ffffffffffffffda RBX: 00007f12d04f46d4 RCX: 000000000045b399 [ 287.483360][T10961] RDX: 0000000020000100 RSI: 0000000000004b72 RDI: 0000000000000003 [ 287.491346][T10961] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 287.499449][T10961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 287.507429][T10961] R13: 0000000000000366 R14: 00000000004c48ce R15: 0000000000000000 15:59:19 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) [ 287.519089][T10961] ERROR: Out of memory at tomoyo_realpath_from_path. 15:59:19 executing program 1: bind$alg(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x1}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$alg(0x26, 0x5, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x6}, 0x10002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) connect$vsock_stream(0xffffffffffffffff, &(0x7f00000001c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) r4 = open(0x0, 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/diskstats\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000140), 0x4) getdents64(r4, &(0x7f00000000c0)=""/79, 0xffa0) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/79, 0xffa0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)=0x0) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) kcmp(0x0, r6, 0x0, r1, 0xffffffffffffffff) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 15:59:19 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000000)=0x8, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/vlan/vlan1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3a86}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SOUND_PCM_READ_RATE(r4, 0x80045002, &(0x7f0000000040)) preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) 15:59:19 executing program 2 (fault-call:1 fault-nth:1): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr="e310969f345fd71d590c7a39dc70000e", 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) sendmsg$inet6(r0, &(0x7f0000000180)={&(0x7f0000000080)={0xa, 0x4e25, 0x1000000080000, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000029000000370000000000000000000000180000000000000000000000000000000000000000000000bb45c60d0a85285492fc360d243aa1328445aea43d56b144297a1d7694a47e4896a906f8"], 0x30}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x1f, 0x1, 0x0, 0xa, 0x0, 0x1ffd}, 0x20) 15:59:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x2, 0x3, 0x238, 0xc8, 0xc8, 0x0, 0xc8, 0x0, 0x1a0, 0x1a0, 0x1a0, 0x1a0, 0x1a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x48], 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@unspec=@cluster={{0x30, 'cluster\x00'}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}, 0x0, 0x98, 0xd8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x14e) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000200)={'veth1_to_bond\x00', {0x2, 0x4e23, @multicast2}}) migrate_pages(r1, 0x9, &(0x7f0000000140)=0x80000000, &(0x7f0000000180)=0x5) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = syz_open_dev$vcsu(&(0x7f0000000380)='/dev/vcsu#\x00', 0x7fff, 0x488000) getsockopt$sock_buf(r3, 0x1, 0x0, &(0x7f00000003c0)=""/46, &(0x7f0000000400)=0x2e) r4 = gettid() r5 = socket$inet(0x10, 0x1000000000002, 0xc) sendmsg(r5, &(0x7f0000011fc8)={0x0, 0x0, 0x0}, 0x0) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nvram\x00', 0x140, 0x0) ioctl$UI_SET_PHYS(r6, 0x4008556c, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r4) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) ioctl(r7, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$NFT_MSG_GETOBJ(r7, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80c00c0}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x6c, 0x13, 0xa, 0x201, 0x0, 0x0, {0xc, 0x0, 0xffff}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x1}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x2800a000}, 0x1) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x700, 0x0, 0xffffffffffffff39) [ 287.819256][T10977] FAULT_INJECTION: forcing a failure. [ 287.819256][T10977] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 287.836950][T10977] CPU: 0 PID: 10977 Comm: syz-executor.2 Not tainted 5.5.0-syzkaller #0 [ 287.845287][T10977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.855362][T10977] Call Trace: [ 287.858677][T10977] dump_stack+0x197/0x210 [ 287.863039][T10977] should_fail.cold+0x5/0xd [ 287.867702][T10977] ? fault_create_debugfs_attr+0x140/0x140 [ 287.873529][T10977] ? __kasan_check_read+0x11/0x20 [ 287.878630][T10977] should_fail_alloc_page+0x50/0x60 [ 287.883895][T10977] __alloc_pages_nodemask+0x1a1/0x910 [ 287.889273][T10977] ? avc_has_extended_perms+0x8e4/0x10f0 [ 287.894911][T10977] ? __alloc_pages_slowpath+0x2900/0x2900 [ 287.900829][T10977] ? __kasan_check_read+0x11/0x20 [ 287.905884][T10977] cache_grow_begin+0x90/0xc60 [ 287.910716][T10977] ? trace_hardirqs_off+0x62/0x240 [ 287.916003][T10977] __kmalloc+0x6b2/0x770 [ 287.920247][T10977] ? mark_held_locks+0xf0/0xf0 [ 287.925011][T10977] ? tomoyo_realpath_from_path+0xc5/0x660 [ 287.930742][T10977] tomoyo_realpath_from_path+0xc5/0x660 [ 287.936301][T10977] ? tomoyo_path_number_perm+0x193/0x520 [ 287.942323][T10977] tomoyo_path_number_perm+0x1dd/0x520 [ 287.947777][T10977] ? tomoyo_path_number_perm+0x193/0x520 [ 287.953421][T10977] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 287.959222][T10977] ? __f_unlock_pos+0x19/0x20 [ 287.963945][T10977] ? ___might_sleep+0x163/0x2c0 [ 287.968844][T10977] ? selinux_file_mprotect+0x620/0x620 [ 287.974320][T10977] ? __fget_files+0x359/0x520 [ 287.979014][T10977] ? ksys_dup3+0x3e0/0x3e0 [ 287.983427][T10977] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 287.989673][T10977] ? fput_many+0x12c/0x1a0 [ 287.994103][T10977] tomoyo_file_ioctl+0x23/0x30 [ 287.998873][T10977] security_file_ioctl+0x77/0xc0 [ 288.003939][T10977] ksys_ioctl+0x56/0x180 [ 288.008183][T10977] __x64_sys_ioctl+0x73/0xb0 [ 288.012782][T10977] do_syscall_64+0xfa/0x790 [ 288.018175][T10977] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.024183][T10977] RIP: 0033:0x45b399 [ 288.028066][T10977] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.047677][T10977] RSP: 002b:00007f12d04f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 288.056192][T10977] RAX: ffffffffffffffda RBX: 00007f12d04f46d4 RCX: 000000000045b399 15:59:20 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) [ 288.064246][T10977] RDX: 0000000020000100 RSI: 0000000000004b72 RDI: 0000000000000003 [ 288.072385][T10977] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 288.080370][T10977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 288.089161][T10977] R13: 0000000000000366 R14: 00000000004c48ce R15: 0000000000000001 15:59:20 executing program 3: set_mempolicy(0x0, &(0x7f00000000c0)=0x6, 0x27) shmget(0x1, 0x4000, 0x1209, &(0x7f000096d000/0x4000)=nil) uselib(&(0x7f0000000000)='./file0\x00') r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x6777dd2c59b255af, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000280)={0x18, 0x1, 0x0, {0xd2}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xa1, 0x3, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x6b5a729cd8838c77) semctl$IPC_RMID(0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) bind$unix(r1, &(0x7f00000001c0)=@abs={0x1}, 0x6e) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000100)=0x20) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) r2 = socket$unix(0x1, 0x7, 0x0) bind$unix(r2, 0x0, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvram\x00', 0x100, 0x0) ioctl$PPPIOCSNPMODE(r3, 0x4008744b, &(0x7f0000000140)={0x2b}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-monitor\x00', 0x280900, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x281400, 0x0) bind$rxrpc(r6, &(0x7f0000000400)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) bind(r5, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b09000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x11) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$l2tp6(0xa, 0x2, 0x73) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="240000001800030a00000000000000001d01000008000a00", @ANYRES32=r9, @ANYBLOB='\b\x00\t\x00', @ANYRES32=r7, @ANYBLOB="34ebbdc7e255bf329deb67ac84dd4a9990adf3e94edb0c4731d431167ade7e84c1489d0c2846510700c9f9eb5edb37acee068216a20300000000000000a475570f3d2b98cc5ebe877b8c962642"], 0x24}}, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000140)=0x700) 15:59:20 executing program 2 (fault-call:1 fault-nth:2): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:20 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, 0x0) 15:59:20 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, 0x0) 15:59:20 executing program 0: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x900, &(0x7f00000001c0), 0x10) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000080)=0x4) 15:59:20 executing program 1: bind$alg(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x1}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$alg(0x26, 0x5, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x6}, 0x10002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) connect$vsock_stream(0xffffffffffffffff, &(0x7f00000001c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) r4 = open(0x0, 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/diskstats\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000140), 0x4) getdents64(r4, &(0x7f00000000c0)=""/79, 0xffa0) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/79, 0xffa0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)=0x0) bind$inet(0xffffffffffffffff, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) kcmp(0x0, r6, 0x0, r1, 0xffffffffffffffff) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) creat(&(0x7f00000000c0)='./bus\x00', 0x0) [ 288.540495][T11002] x_tables: ip_tables: TCPMSS target: only valid for protocol 6 15:59:21 executing program 3: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setxattr$security_selinux(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:setrans_var_run_t:s0\x00', 0x1c, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000100)='/dev/vcsu#\x00', 0x10000, 0x400000) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f00000001c0)={0xfac8, 0xe, [{0xc, 0x1}, {0x3, 0x1}, {0xa, 0x1}, {0xd}, {0xb}, {0x5, 0x1}, {0x4, 0x1}, {0x3}, {0xb}, {0x7}, {0x8}, {0x1}, {0xa, 0x1}, {0xe, 0x1}]}) mknod$loop(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x2000, 0x1) [ 288.628957][T11011] FAULT_INJECTION: forcing a failure. [ 288.628957][T11011] name failslab, interval 1, probability 0, space 0, times 0 [ 288.644707][T11002] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 288.687464][T11011] CPU: 1 PID: 11011 Comm: syz-executor.2 Not tainted 5.5.0-syzkaller #0 [ 288.695876][T11011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.705940][T11011] Call Trace: [ 288.709240][T11011] dump_stack+0x197/0x210 [ 288.713610][T11011] should_fail.cold+0x5/0xd [ 288.718118][T11011] ? fault_create_debugfs_attr+0x140/0x140 [ 288.724018][T11011] ? ___might_sleep+0x163/0x2c0 [ 288.728893][T11011] __should_failslab+0xb7/0x100 [ 288.733754][T11011] should_failslab+0x9/0x14 [ 288.738259][T11011] __kmalloc+0x2e0/0x770 [ 288.742498][T11011] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.748824][T11011] ? d_absolute_path+0x11b/0x170 [ 288.753771][T11011] ? __d_path+0x140/0x140 [ 288.758113][T11011] ? tomoyo_encode2.part.0+0xf5/0x400 [ 288.763614][T11011] tomoyo_encode2.part.0+0xf5/0x400 [ 288.768813][T11011] tomoyo_encode+0x2b/0x50 [ 288.773365][T11011] tomoyo_realpath_from_path+0x19c/0x660 [ 288.779008][T11011] tomoyo_path_number_perm+0x1dd/0x520 [ 288.784576][T11011] ? tomoyo_path_number_perm+0x193/0x520 [ 288.790433][T11011] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 288.796369][T11011] ? __f_unlock_pos+0x19/0x20 [ 288.801084][T11011] ? ___might_sleep+0x163/0x2c0 [ 288.806127][T11011] ? selinux_file_mprotect+0x620/0x620 [ 288.811693][T11011] ? __fget_files+0x359/0x520 [ 288.817359][T11011] ? ksys_dup3+0x3e0/0x3e0 [ 288.822574][T11011] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 288.828822][T11011] ? fput_many+0x12c/0x1a0 [ 288.833272][T11011] tomoyo_file_ioctl+0x23/0x30 [ 288.838043][T11011] security_file_ioctl+0x77/0xc0 [ 288.842995][T11011] ksys_ioctl+0x56/0x180 [ 288.847245][T11011] __x64_sys_ioctl+0x73/0xb0 [ 288.852364][T11011] do_syscall_64+0xfa/0x790 [ 288.856925][T11011] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.862825][T11011] RIP: 0033:0x45b399 [ 288.866716][T11011] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:59:21 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, 0x0) [ 288.886426][T11011] RSP: 002b:00007f12d04f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 288.894837][T11011] RAX: ffffffffffffffda RBX: 00007f12d04f46d4 RCX: 000000000045b399 [ 288.902809][T11011] RDX: 0000000020000100 RSI: 0000000000004b72 RDI: 0000000000000003 [ 288.910780][T11011] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 288.918747][T11011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 288.926718][T11011] R13: 0000000000000366 R14: 00000000004c48ce R15: 0000000000000002 [ 288.982135][ T27] audit: type=1400 audit(1580831961.335:64): avc: denied { mac_admin } for pid=11014 comm="syz-executor.3" capability=33 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 288.982349][T11016] SELinux: Context system_u:object_r:setrans_va is not valid (left unmapped). [ 289.044466][T11011] ERROR: Out of memory at tomoyo_realpath_from_path. 15:59:21 executing program 2 (fault-call:1 fault-nth:3): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:21 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 289.386881][T11022] x_tables: ip_tables: TCPMSS target: only valid for protocol 6 15:59:22 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$IP_SET_OP_GET_BYNAME(r1, 0x1, 0x53, &(0x7f0000000000)={0x6, 0x7, 'syz2\x00'}, &(0x7f00000000c0)=0x28) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv4=@dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "f426e6", 0x0, "3237fb"}}}}}, 0xfdef) 15:59:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:22 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) syz_open_procfs(r1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/bsg\x00', 0x44600, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000740)=ANY=[@ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000300)={r3, 0x5}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000ac0)={0x0, 0x8000, 0x20, 0x564d, 0x7}, &(0x7f0000000b00)=0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(r4, 0x40044104, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) 15:59:22 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:59:22 executing program 0: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x900, &(0x7f00000001c0), 0x10) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000080)=0x4) 15:59:22 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:59:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x2, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000040)=0x0, &(0x7f00000000c0)=0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x2, 0x3, 0x238, 0xc8, 0xc8, 0x0, 0xc8, 0x0, 0x1a0, 0x1a0, 0x1a0, 0x1a0, 0x1a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x48], 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@unspec=@cluster={{0x30, 'cluster\x00'}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}, 0x0, 0x98, 0xd8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x14e) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x2, 0x3, 0x238, 0xc8, 0xc8, 0x0, 0xc8, 0x0, 0x1a0, 0x1a0, 0x1a0, 0x1a0, 0x1a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x48], 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@unspec=@cluster={{0x30, 'cluster\x00'}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}, 0x0, 0x98, 0xd8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x14e) r3 = dup2(r2, 0xffffffffffffffff) bind$xdp(0xffffffffffffffff, &(0x7f0000000140)={0x2c, 0x1b, r0, 0x20, r3}, 0x10) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=', @ANYRESHEX]) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, &(0x7f0000000200)) 15:59:22 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x10, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) [ 290.444305][T11069] FAULT_INJECTION: forcing a failure. [ 290.444305][T11069] name failslab, interval 1, probability 0, space 0, times 0 [ 290.512223][T11069] CPU: 1 PID: 11069 Comm: syz-executor.5 Not tainted 5.5.0-syzkaller #0 [ 290.520617][T11069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.530682][T11069] Call Trace: [ 290.534013][T11069] dump_stack+0x197/0x210 [ 290.538377][T11069] should_fail.cold+0x5/0xd [ 290.542941][T11069] ? fault_create_debugfs_attr+0x140/0x140 [ 290.548890][T11069] ? ___might_sleep+0x163/0x2c0 [ 290.553768][T11069] __should_failslab+0xb7/0x100 [ 290.558635][T11069] should_failslab+0x9/0x14 [ 290.563158][T11069] __kmalloc+0x2e0/0x770 [ 290.567626][T11069] ? mark_held_locks+0xf0/0xf0 [ 290.572411][T11069] ? _parse_integer+0x190/0x190 [ 290.577280][T11069] ? tomoyo_realpath_from_path+0xc5/0x660 [ 290.583032][T11069] tomoyo_realpath_from_path+0xc5/0x660 [ 290.588593][T11069] ? tomoyo_path_number_perm+0x193/0x520 [ 290.594253][T11069] tomoyo_path_number_perm+0x1dd/0x520 [ 290.599720][T11069] ? tomoyo_path_number_perm+0x193/0x520 [ 290.605378][T11069] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 290.611195][T11069] ? __f_unlock_pos+0x19/0x20 [ 290.615968][T11069] ? ___might_sleep+0x163/0x2c0 [ 290.620891][T11069] ? selinux_file_mprotect+0x620/0x620 [ 290.626501][T11069] ? __fget_files+0x359/0x520 [ 290.631316][T11069] ? ksys_dup3+0x3e0/0x3e0 [ 290.635881][T11069] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 290.642133][T11069] ? fput_many+0x12c/0x1a0 [ 290.647010][T11069] tomoyo_file_ioctl+0x23/0x30 [ 290.651826][T11069] security_file_ioctl+0x77/0xc0 [ 290.656779][T11069] ksys_ioctl+0x56/0x180 [ 290.661046][T11069] __x64_sys_ioctl+0x73/0xb0 [ 290.665660][T11069] do_syscall_64+0xfa/0x790 [ 290.670303][T11069] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.676200][T11069] RIP: 0033:0x45b399 [ 290.680103][T11069] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.699815][T11069] RSP: 002b:00007ff583479c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:59:23 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b2f, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000100)={0x0, 0x3}, 0xc) accept(r0, &(0x7f0000000440)=@x25, &(0x7f0000000000)=0x80) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r2, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x8, 0x3}, 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x2, 0x9, 0x7f}, &(0x7f0000000500)=0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x2}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x0, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x89a2, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = syz_open_procfs(r4, &(0x7f0000000300)='attr/exec\x00') ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @broadcast}, {0x6, @local}, 0x0, {0x2, 0x4e21, @empty}, 'vxcan1\x00'}) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f00000001c0)="7880cca144094ebab4b6d3d381056a7e", 0x10) getpid() getpgid(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x13f}}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r8 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) write$9p(r8, &(0x7f0000001400)="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", 0x600) r9 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$UHID_DESTROY(r8, &(0x7f00000002c0), 0x4) sendfile(r8, r9, 0x0, 0x10000) [ 290.708367][T11069] RAX: ffffffffffffffda RBX: 00007ff58347a6d4 RCX: 000000000045b399 [ 290.716353][T11069] RDX: 0000000020000100 RSI: 0000000000004b72 RDI: 0000000000000003 [ 290.724333][T11069] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 290.732309][T11069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 290.740390][T11069] R13: 0000000000000366 R14: 00000000004c48ce R15: 0000000000000000 [ 290.946107][T11080] x_tables: ip_tables: TCPMSS target: only valid for protocol 6 [ 291.001578][T11080] x_tables: ip_tables: TCPMSS target: only valid for protocol 6 [ 291.016830][T11069] ERROR: Out of memory at tomoyo_realpath_from_path. [ 291.024612][ T27] audit: type=1804 audit(1580831963.375:65): pid=11077 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir193911687/syzkaller.Wr5DVa/16/file0" dev="sda1" ino=16630 res=1 [ 291.087581][T11083] x_tables: ip_tables: TCPMSS target: only valid for protocol 6 [ 291.114515][T11084] x_tables: ip_tables: TCPMSS target: only valid for protocol 6 [ 291.563001][ T27] audit: type=1800 audit(1580831963.915:66): pid=11081 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="file0" dev="sda1" ino=16630 res=0 15:59:24 executing program 4: memfd_create(0x0, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000d40)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000000)=0x4915, 0x4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 15:59:24 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b30, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:24 executing program 3: socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x2, 0x3, 0x238, 0xc8, 0xc8, 0x0, 0xc8, 0x0, 0x1a0, 0x1a0, 0x1a0, 0x1a0, 0x1a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x48], 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@unspec=@cluster={{0x30, 'cluster\x00'}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}, 0x0, 0x98, 0xd8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x14e) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000003c0)) r3 = socket(0x10, 0x803, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0xc8a80, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r4, 0x40045532, &(0x7f00000002c0)=0x7) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x3a1e01, 0x0) openat(r5, &(0x7f0000000280)='./file0\x00', 0x40400, 0x180) shmget$private(0x0, 0x2000, 0x4, &(0x7f0000ffe000/0x2000)=nil) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[]}}, 0x44080) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x16, 0x3, &(0x7f0000000040)=@framed={{0x45, 0xa, 0x0, 0x0, 0x0, 0x71, 0x10, 0xb7}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, [], r6, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4000000}, 0x10}, 0x78) 15:59:24 executing program 5 (fault-call:1 fault-nth:1): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:24 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = socket(0x1d, 0x80002, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) getresuid(&(0x7f0000000780), &(0x7f00000007c0)=0x0, &(0x7f0000000800)) mount$9p_tcp(&(0x7f0000000140)='127.0.0.1\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000740)='9p\x00', 0x2000, &(0x7f0000000840)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@mmap='mmap'}, {@version_u='version=9p2000.u'}, {@cachetag={'cachetag', 0x3d, 'huge=never'}}, {@access_client='access=client'}, {@cache_none='cache=none'}, {@afid={'afid', 0x3d, 0x7}}, {@access_any='access=any'}, {@cache_fscache='cache=fscache'}], [{@obj_role={'obj_role', 0x3d, '}{'}}, {@fowner_lt={'fowner<', r5}}, {@appraise='appraise'}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid', 0x3d, {[0x57, 0x30, 0x66, 0x34, 0x38, 0x34, 0x39, 0x66], 0x2d, [0x38, 0x63, 0x62, 0x31], 0x2d, [0x32, 0x38, 0x61, 0x32], 0x2d, [0x35, 0x34, 0x62, 0x66], 0x2d, [0x31, 0x63, 0x63, 0x33, 0x64, 0x39, 0x65, 0x32]}}}]}}) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x100, 0x4, &(0x7f0000000580)=[{&(0x7f0000000140), 0x0, 0x8}, {&(0x7f00000003c0)="2362bdc69fd6ce0365cb22765cbb6f4bda4bc77197a2f6dcd066b917d970e59b4db99d20a91e6eca9a52d81209efc2ab8adb50ed9f973357887e4434c35d8a13d7022024b7066ef950309a43becccac574f58819de72fbaaac4d9f49f4f62bfeae29fc7951748936eb402f86df6ee00e0472890d4a945cd791a633d0ac382f4b837c6f34ebf04c20d0d7b27d4515b68de69a404b157fe809658250e9fb40135e024591146b7f56dc02b1538b", 0xac, 0x6}, {&(0x7f0000000480)="606a7ee6e7fe6a4d07c451dd85ed7224f8e0a43c3f5d0cc9185179803216be89ba6adf7c1c466f77025cdf6362b91e7d9fd1c03c756a686a00e51fcbe4d05f04c78cfbdf8226f5784bd1a6ed38e06c43c78ddb1b3d47cc5ac885f4fb68a5ea444673ad1f1fc2e0dc8f8658739eb626fe9789cb1f691ce815f269a19e3297bb5d093835d5c58f250bb48ba62c7d0e38314bd4af3d0bcb7a52d3b5bc726527d7f40eb2a6a3242bc39b6746f215dd4b729d0d369e4dd008f7dc239ddfa3d122bba7e032c3971c67283d5d52efbe64a8fed836fbedd268468eaf8f933d5e5f82efcc63", 0xe1, 0x2}, {&(0x7f0000000240)="8384e1e4d639c21d29fc91eb879d7667ac3f968e89d6201d98b95128cd999d7efa1ef526aaa07b7db751f6a9c9", 0x2d, 0x1}], 0x80, &(0x7f0000000600)={[{@huge_within_size={'huge=within_size', 0x3d, 'cgroup.stat\x00'}}, {@nr_inodes={'nr_inodes', 0x3d, [0x65, 0x30, 0x6d, 0x0, 0x39, 0x34]}}, {@huge_always={'huge=always', 0x3d, '\xe1'}}, {@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0x34, 0x33, 0x2f, 0x39, 0x37]}}}}, {@huge_never={'huge=never'}}, {@mode={'mode', 0x3d, 0x8}}, {@nr_inodes={'nr_inodes', 0x3d, [0x36]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x6d, 0x36, 0x36, 0x74, 0x6d]}}], [{@obj_type={'obj_type', 0x3d, '+!'}}, {@hash='hash'}, {@pcr={'pcr', 0x3d, 0x23}}, {@euid_lt={'euid<', r4}}, {@smackfsdef={'smackfsdef', 0x3d, 'cgroup.stat\x00'}}, {@appraise_type='appraise_type=imasig'}, {@smackfshat={'smackfshat', 0x3d, '+$&keyringselinuxvboxnet0-'}}]}) sendmmsg$alg(r2, &(0x7f0000000180), 0x572, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x40, 0x0, 0x0, 0x3, 0x1000, 0x8, 0x4, {r6, @in6={{0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0xa}, 0xffff7fff}}, 0x3, 0x0, 0x0, 0x35, 0x3}}, &(0x7f0000000380)=0xb0) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000000)={r6, 0x1f}, &(0x7f0000000040)=0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) [ 291.982396][T11098] x_tables: ip_tables: TCPMSS target: only valid for protocol 6 [ 291.985128][T11101] FAULT_INJECTION: forcing a failure. [ 291.985128][T11101] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 292.003305][T11101] CPU: 0 PID: 11101 Comm: syz-executor.5 Not tainted 5.5.0-syzkaller #0 [ 292.011757][T11101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.020607][T11098] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 292.021820][T11101] Call Trace: [ 292.021855][T11101] dump_stack+0x197/0x210 [ 292.021893][T11101] should_fail.cold+0x5/0xd [ 292.042171][T11101] ? fault_create_debugfs_attr+0x140/0x140 [ 292.048005][T11101] ? __kasan_check_read+0x11/0x20 [ 292.053061][T11101] should_fail_alloc_page+0x50/0x60 [ 292.058394][T11101] __alloc_pages_nodemask+0x1a1/0x910 [ 292.063909][T11101] ? avc_has_extended_perms+0x8e4/0x10f0 [ 292.069563][T11101] ? __alloc_pages_slowpath+0x2900/0x2900 [ 292.075305][T11101] ? __kasan_check_read+0x11/0x20 [ 292.080535][T11101] cache_grow_begin+0x90/0xc60 [ 292.085435][T11101] ? trace_hardirqs_off+0x62/0x240 [ 292.090602][T11101] __kmalloc+0x6b2/0x770 [ 292.094863][T11101] ? mark_held_locks+0xf0/0xf0 [ 292.099657][T11101] ? tomoyo_realpath_from_path+0xc5/0x660 [ 292.105402][T11101] tomoyo_realpath_from_path+0xc5/0x660 [ 292.110971][T11101] ? tomoyo_path_number_perm+0x193/0x520 [ 292.116642][T11101] tomoyo_path_number_perm+0x1dd/0x520 [ 292.122563][T11101] ? tomoyo_path_number_perm+0x193/0x520 [ 292.128228][T11101] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 292.134054][T11101] ? __f_unlock_pos+0x19/0x20 [ 292.138763][T11101] ? ___might_sleep+0x163/0x2c0 [ 292.143777][T11101] ? selinux_file_mprotect+0x620/0x620 [ 292.149259][T11101] ? __fget_files+0x359/0x520 [ 292.154088][T11101] ? ksys_dup3+0x3e0/0x3e0 [ 292.158524][T11101] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 292.164916][T11101] ? fput_many+0x12c/0x1a0 [ 292.169368][T11101] tomoyo_file_ioctl+0x23/0x30 [ 292.174681][T11101] security_file_ioctl+0x77/0xc0 [ 292.179802][T11101] ksys_ioctl+0x56/0x180 [ 292.184091][T11101] __x64_sys_ioctl+0x73/0xb0 [ 292.188710][T11101] do_syscall_64+0xfa/0x790 [ 292.193374][T11101] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.199393][T11101] RIP: 0033:0x45b399 [ 292.203309][T11101] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.223534][T11101] RSP: 002b:00007ff583479c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 292.231957][T11101] RAX: ffffffffffffffda RBX: 00007ff58347a6d4 RCX: 000000000045b399 [ 292.239958][T11101] RDX: 0000000020000100 RSI: 0000000000004b72 RDI: 0000000000000003 [ 292.248044][T11101] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 292.256131][T11101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 292.264139][T11101] R13: 0000000000000366 R14: 00000000004c48ce R15: 0000000000000001 [ 292.303385][T11100] can: request_module (can-proto-0) failed. [ 292.337352][T11107] ptrace attach of "/root/syz-executor.4"[10579] was attempted by "/root/syz-executor.4"[11107] 15:59:24 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b31, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:24 executing program 5 (fault-call:1 fault-nth:2): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) [ 292.384720][T11098] 8021q: adding VLAN 0 to HW filter on device bond1 [ 292.419223][T11112] tmpfs: Bad value for 'huge' 15:59:24 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b32, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) [ 292.491292][T11109] can: request_module (can-proto-0) failed. [ 292.500466][T11098] x_tables: ip_tables: TCPMSS target: only valid for protocol 6 [ 292.535801][T11119] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 15:59:24 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b33, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:25 executing program 4: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x418000, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x40000001, 0x8b}, 0x0, 0xfffffffffffffffc, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0xfff, 0x3}, 0x8) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000180)="0503000006003e0000000100c52cf7c25975e605b02f0800eb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) 15:59:25 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f00000034c0)=[{0x0, 0x0, 0xffff}, {&(0x7f0000000480)="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", 0x1d5}]) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000240)=""/198) semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000000)=""/168) 15:59:25 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) setsockopt$sock_linger(r1, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r1, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r2 = accept4$netrom(r0, &(0x7f00000001c0)={{0x3, @rose}, [@remote, @remote, @remote, @rose, @null, @rose, @default, @bcast]}, &(0x7f00000000c0)=0x48, 0x0) sendmmsg(r2, &(0x7f0000004d80), 0x0, 0x4000000) 15:59:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b34, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:25 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = dup(0xffffffffffffffff) setsockopt$packet_int(r1, 0x107, 0x0, 0x0, 0x0) r2 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r2}, 0x0) r3 = memfd_create(0x0, 0x5) r4 = syz_open_dev$sndseq(0x0, 0x0, 0x1) dup2(r4, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0xfef0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="00eb800000", @ANYRES32, @ANYBLOB="00b237afa45aa94200a476cafb3cca8b40b5bb3b612f96d4f3b789ef71d61f78de1b093fdaf9caf1b3f845d91d5506cae2990eb0a39048fa307d8e8ad4efcb2fd33d3ad209ba32ac3e3ea9a7dea3833434837937bab6ea89c4", @ANYRES32=0x0, @ANYRESHEX=r0], 0x5, 0x1) socket(0xa, 0x0, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) r6 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000040)={{0x3, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000]}) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000700)="6188a4e9337d3b27d2ad19e7a49f98148d8ba086d83c8e70303f1464f7a1ef78506c2cb96e5d813d4b2aab4c6c9c13fca13e90bf3fe751baeb42f6f1d7af492ad9fb857e1a8178911c73f7fe2075", 0x4e}], 0x1) ioctl$SG_GET_REQUEST_TABLE(r6, 0x227d, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r6) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r7, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r7, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r8 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r9 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r9, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r8, 0x4c00, r9) sendfile(r7, r8, 0x0, 0x102000004) 15:59:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b35, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:25 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:25 executing program 4: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x418000, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x40000001, 0x8b}, 0x0, 0xfffffffffffffffc, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0xfff, 0x3}, 0x8) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000180)="0503000006003e0000000100c52cf7c25975e605b02f0800eb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) 15:59:25 executing program 1: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x4000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/seq/timer\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x40, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x6c082, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x30, r3, 0x23f, 0x0, 0x0, {{}, {0x0, 0x410c}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r3, 0x10, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8081}, 0x8000000) read(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x25}}}, 0x0, 0x0, 0x26, 0x0, "d4a44b21665578baf6b976d3fa59cdfeb0771bd1e93f07e0be7672c37fc6646c1cbfe2397af17592b1ac178b97dabd75eb2d8d97223aa649da2287b7a9aaed95e7f789fad539a654d36e892e921be742"}, 0xd8) 15:59:25 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x2, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b36, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x8004, 0x0, 0x400000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r1, 0x400000000e) getsockopt$inet6_mreq(r0, 0x29, 0x67be8db96986f40a, &(0x7f0000000040)={@empty, 0x0}, &(0x7f0000000240)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40d4}, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000440), 0x8) r3 = socket(0x10, 0x2, 0x0) r4 = getpid() unshare(0x40000000) sched_setscheduler(r4, 0x5, &(0x7f0000000380)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48120002}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x0) write(r3, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff00000000000000", 0x1e5) r5 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$inet(r5, &(0x7f0000000740)={&(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000080)="fbd0db4bdb4ffb6f227e97f2f643f025e24f353c60342f8e504beb21eab2ca049889926ddd8582ad0f7ccc7427bff978c58b1ba62bf8dd475288ad73a7347fb35815e71afc72f1e9d8ee36cd8fe148df72202e73f8e9ec55f66533482795232f9768893e78ba50eca38aa29ec12b54d4c9b5e5b569b6c40cc908e5b8df43ed7d6015dd7ccee1fcea15bb3ce3f66734016a1d624cadb5b31671edfb2e949b9a20ab", 0xa1}, {&(0x7f00000003c0)="f4d9cb95ed621fb5a42e69db5697b71de290e4f9f8a58fc2cb62afebcab35df727bc71a537af37756864f3ab82dc0e609b361532dee3b7d4ff4a69351d82078507853361297622a99f75e4df937e763ee3a77c66a37f501fde", 0x59}, {&(0x7f00000002c0)="592f6d9e3401cfb02c4acd6ecfed69987df070306a", 0x15}, {&(0x7f0000000480)="14d3fcb1ed3c9b3b34ffb1c0c5930ffc650e81c000f8cc1659de3095f9270ae4dd29b549f103cb33f2b9e7474722e35a7d179792f0a5373095ffae12820c3713d3c69162664d8bee69597ad87609767aeeee76cdbd4a6693fffe8c7c3f37b4e922c163c1ea69070c1f942f28f125733be2753eabc9001f33a4dbcd4061a385470c7c10b59d", 0x85}, {&(0x7f0000000540)="d46476304b5e2dcee85b2c020f53110ce32aef04c51199adcf6753954755da8066ed727492cdbd71911be0360ba68436a2745e4b8d0fb3fba00de9ddc93bd27dd915f7f5a290a604e2aea51e30d4833da39e997c66ec862442af948518d8d20efd7aa6bf77a879f013c1d83d108f0bece089da9c0c51366278c02f5048232f5825525ee720528f7ef46e21675c5af7b6987504cdee1f5d27bccf3477bbcc1303ac6b1aaf2211703f6769", 0xaa}, {&(0x7f0000000640)="927df8735909bdb5a72aeb2ccb61e08f7a473201714a8a617e7c59916bb988a657736d3e9f96db0da598c7c5da0f6180884eff1c926b6901c1e4c3", 0x3b}], 0x6, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @empty, @local}}}], 0x20}, 0x8001) recvmmsg(r3, &(0x7f0000006280)=[{{&(0x7f0000000300)=@x25, 0x80, &(0x7f0000000180)=[{0x0}], 0x1}, 0xfffffff7}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001500)=""/214, 0xd6}, {0x0}, {0x0}, {&(0x7f0000001900)=""/136, 0x88}], 0x4}, 0x7f}, {{0x0, 0x0, &(0x7f0000004140)=[{0x0}, {&(0x7f0000001d00)=""/159, 0x9f}, {&(0x7f0000001dc0)=""/170, 0xaa}, {&(0x7f0000001e80)=""/4096, 0x1000}, {&(0x7f0000002e80)=""/188, 0xbc}, {&(0x7f0000002f40)=""/4096, 0x1000}, {&(0x7f0000004080)=""/163, 0xa3}], 0x7}, 0x800}, {{0x0, 0x0, &(0x7f0000004480)=[{&(0x7f0000004300)=""/137, 0x89}, {&(0x7f0000004440)=""/20, 0x14}], 0x2, &(0x7f00000044c0)=""/4096, 0x1000}, 0x1}, {{&(0x7f00000054c0)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, 0x0}}, {{&(0x7f0000005cc0)=@hci, 0x80, 0x0}}], 0x6, 0x12, &(0x7f00000001c0)={0x77359400}) 15:59:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x10, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:26 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b37, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:26 executing program 4: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x418000, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x40000001, 0x8b}, 0x0, 0xfffffffffffffffc, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0xfff, 0x3}, 0x8) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000180)="0503000006003e0000000100c52cf7c25975e605b02f0800eb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) 15:59:26 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b3a, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) [ 293.926782][T11179] IPVS: ftp: loaded support on port[0] = 21 [ 293.961770][ T2632] print_req_error: 14 callbacks suppressed [ 293.961789][ T2632] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 16 prio class 0 [ 294.093850][ T27] audit: type=1400 audit(1580831966.445:67): avc: denied { write } for pid=11178 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 294.135729][T11179] IPVS: ftp: loaded support on port[0] = 21 15:59:26 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xdf5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x0, 0x2000) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) syncfs(r3) sendto$inet(r5, &(0x7f0000000880)="cc110a16d268790227814dc4e635eb09", 0x10, 0x0, &(0x7f00006f7000)={0x2, 0xffff, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000008c0)=0x4) syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r6, &(0x7f0000000400)={'syz1\x00', {}, 0x16, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbb1], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x45c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_MD5SIG(r8, 0x6, 0xe, &(0x7f0000000900)={@in={{0x2, 0x1, @dev={0xac, 0x14, 0x14, 0x3f}}}, 0x0, 0x0, 0x4e, 0x0, "3cb5f645a9228d6d65b8b3568908842e83a6f4159909a860fe1492236eb5c442d258185b656a94892c13e738d1c5947fccbac9de1b6d48e3a12c760b32a7cef4af77523a950b7a2e06fa042a8aa2fc72"}, 0xd8) ioctl$UI_DEV_SETUP(r6, 0x5501, 0x0) r9 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r6, r9, 0x0) ioctl$UI_DEV_DESTROY(r9, 0x5502) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r9, 0xc01064c7, &(0x7f0000000280)={0x1, 0x0, &(0x7f0000000240)=[0x0]}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f00000002c0)={&(0x7f0000000200)=[0x5, 0x4, 0x6770, 0x8c, 0xffffffff], 0x5, 0x80000, r10}) r11 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) r12 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r11, r12, 0x0) ioctl$UI_DEV_DESTROY(r12, 0x5502) 15:59:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b2f, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:26 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b3b, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:26 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x404e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x20) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) sendfile(r0, r5, 0x0, 0x80001d00c0d0) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200000, 0x0) socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r11, 0xc0205649, &(0x7f0000001300)={0x9d0000, 0x8, 0x9, 0xffffffffffffffff, 0x0, &(0x7f00000012c0)={0x9909dd, 0x1f, [], @p_u16=&(0x7f0000001280)=0x2}}) write$capi20(r12, &(0x7f0000001340)={0x10, 0x200, 0x2, 0x81, 0xffff, 0x1}, 0x10) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r9, @ANYBLOB="01000000000100001c0012000c000100626f6e64000000000c000200080001b56b000000c47443b744348f80b07dab16be04fa7941c76799baaad5ff53e379fa1da04695b4d771ebecd97cfb73b138af59b2fbc4245dbe8fa94d3702c0df05721d12976156c38788664d4d907434ea804318d1e3bee29f0ddf"], 0x3c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r14, 0xc0205649, &(0x7f00000014c0)={0x9e0000, 0x6, 0x10001, r7, 0x0, &(0x7f0000001480)={0x990968, 0x6, [], @p_u32=&(0x7f0000001440)}}) sendmsg$nl_route(r15, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_PROTO={0x5, 0x9, 0x29}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x8001}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e24}]}}}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x60}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = dup(r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000004480)={0xffffffffffffffff, 0x10, &(0x7f0000004440)={&(0x7f0000004340)=""/210, 0xd2, r18}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x3, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x2f}, @map={0x18, 0x7, 0x1, 0x0, r6}]}, &(0x7f0000000140)='syzkaller\x00', 0x96a, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x4, [], r9, 0x18, r17, 0x8, &(0x7f0000001180)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x5, 0x4, 0x9, 0x356}, 0x10, r18}, 0x78) 15:59:26 executing program 4: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x418000, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x40000001, 0x8b}, 0x0, 0xfffffffffffffffc, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0xfff, 0x3}, 0x8) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000180)="0503000006003e0000000100c52cf7c25975e605b02f0800eb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) 15:59:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000080)={0x6, "07ee5f054d2eae162a11f97ebbc0600cb4a21c65310bd03877f222f9f7cd87a3", 0x4, 0x80000000, 0x1, 0x4, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f00000001c0)=""/133) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r4, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r4, 0x0) unshare(0x40000000) pipe(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) accept$alg(r6, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) [ 294.338836][T11160] syz-executor.3 (11160) used greatest stack depth: 22008 bytes left [ 294.427166][ T585] tipc: TX() has been purged, node left! 15:59:26 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b3c, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b30, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:27 executing program 4: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x418000, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x40000001, 0x8b}, 0x0, 0xfffffffffffffffc, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0xfff, 0x3}, 0x8) sendto$inet6(r1, &(0x7f0000000180)="0503000006003e0000000100c52cf7c25975e605b02f0800eb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) 15:59:27 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b3d, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b31, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x400, &(0x7f0000000080)="387b23560bcfa574278933e94d924111974fca2cdc39a38f") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001480)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f00000014c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB='\x00\x00:'], 0x28}}, 0x80) [ 295.051530][ T27] audit: type=1800 audit(1580831967.405:68): pid=11205 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16660 res=0 15:59:27 executing program 3: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1a, 0x15}}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x50}}, 0x0) 15:59:27 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b40, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:27 executing program 4: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x418000, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x40000001, 0x8b}, 0x0, 0xfffffffffffffffc, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0xfff, 0x3}, 0x8) sendto$inet6(r1, &(0x7f0000000180)="0503000006003e0000000100c52cf7c25975e605b02f0800eb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) 15:59:27 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x404e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x20) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) sendfile(r0, r5, 0x0, 0x80001d00c0d0) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200000, 0x0) socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r11, 0xc0205649, &(0x7f0000001300)={0x9d0000, 0x8, 0x9, 0xffffffffffffffff, 0x0, &(0x7f00000012c0)={0x9909dd, 0x1f, [], @p_u16=&(0x7f0000001280)=0x2}}) write$capi20(r12, &(0x7f0000001340)={0x10, 0x200, 0x2, 0x81, 0xffff, 0x1}, 0x10) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r9, @ANYBLOB="01000000000100001c0012000c000100626f6e64000000000c000200080001b56b000000c47443b744348f80b07dab16be04fa7941c76799baaad5ff53e379fa1da04695b4d771ebecd97cfb73b138af59b2fbc4245dbe8fa94d3702c0df05721d12976156c38788664d4d907434ea804318d1e3bee29f0ddf"], 0x3c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r14, 0xc0205649, &(0x7f00000014c0)={0x9e0000, 0x6, 0x10001, r7, 0x0, &(0x7f0000001480)={0x990968, 0x6, [], @p_u32=&(0x7f0000001440)}}) sendmsg$nl_route(r15, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_PROTO={0x5, 0x9, 0x29}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x8001}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e24}]}}}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x60}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = dup(r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000004480)={0xffffffffffffffff, 0x10, &(0x7f0000004440)={&(0x7f0000004340)=""/210, 0xd2, r18}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x3, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x2f}, @map={0x18, 0x7, 0x1, 0x0, r6}]}, &(0x7f0000000140)='syzkaller\x00', 0x96a, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x4, [], r9, 0x18, r17, 0x8, &(0x7f0000001180)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x5, 0x4, 0x9, 0x356}, 0x10, r18}, 0x78) 15:59:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b32, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:27 executing program 1: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() pidfd_open(r2, 0x0) syz_open_procfs$namespace(r2, &(0x7f00000000c0)='ns/uts\x00') r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/nvme-fabrics\x00', 0x0, 0x0) pread64(r3, 0x0, 0x0, 0x9) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/nvme-fabrics\x00', 0x0, 0x0) pread64(r4, 0x0, 0x0, 0x9) r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/nvme-fabrics\x00', 0x0, 0x0) pread64(r5, 0x0, 0x0, 0x9) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x20000, 0x0) r7 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/nvme-fabrics\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) sendmmsg$inet6(r8, 0x0, 0x0, 0x20000000) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x59, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000140), 0x10, 0x0, r8}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0x28, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f089061fffffff00003f00632f77fbac141411e934a0a662079f4b4d2f87e5e0ca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0xfffffffffffffea3, 0xfffffffffffffe09}, 0x28) r10 = socket$inet(0x15, 0x5, 0x0) sendto$inet(r10, 0x0, 0xf00, 0x0, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x8}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r10, 0x8982, &(0x7f0000000040)={0x0, 'gretap0\x00', {0x600}, 0xe872}) r11 = socket$inet6(0xa, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000600)='auxv\x00') sendfile(r11, r12, &(0x7f0000000240)=0x202, 0x4000000000dc) write$FUSE_NOTIFY_INVAL_ENTRY(r12, &(0x7f0000000880)=ANY=[@ANYBLOB="29000000180000000000000000000000000000000000000008009daa930300006772657461703000000f611b12d3f17c5bc5ee86477e0b66f1fe8822997607df10c814dbd66ef56be28b300f4652d228015a148110ebf45e87c2b701a5724ea6751d5c433ddffa35fa14cab5cdaf1db8dbcd092a1b0da8d9e6dd32134d68f59660665842d7024a4a901645bb93f53c49939a077ca278e8dacf67dfe6e14ef52a473dbb291bd6a53323add91425a41192e01ea6563c4bf18157e6a62c83106edc00000000000000"], 0x29) syz_open_procfs$namespace(0x0, 0x0) r13 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r13, &(0x7f0000000080)={0x1f, 0xffff}, 0x6) r14 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fb0\x00', 0x0, 0x0) r15 = socket$inet(0x2, 0x4000000805, 0x0) dup2(r15, r14) r16 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) dup2(r0, r13) ioctl$sock_inet_SIOCGIFADDR(r13, 0x8915, &(0x7f00000001c0)={'gre0\x00', {0x2, 0x4e22, @local}}) msgget$private(0x0, 0xc00) 15:59:27 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b41, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:27 executing program 3: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40046f41, 0x76006e) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x46002001}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="30000000040a0300000000402de81700000000000c00000009de030073797a3200001f0008000540fffffffe080007006e617400"], 0x30}, 0x1, 0x0, 0x0, 0x24000010}, 0x20040020) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40046f41, 0x76006e) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000001280)=0x7fffffff, 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") getsockopt$IP_SET_OP_VERSION(r4, 0x1, 0x53, &(0x7f0000000100), &(0x7f00000002c0)=0x8) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}], {0x95, 0x0, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x6, 0x0, [], r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 15:59:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b33, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:27 executing program 4: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x418000, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x40000001, 0x8b}, 0x0, 0xfffffffffffffffc, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0xfff, 0x3}, 0x8) sendto$inet6(r1, &(0x7f0000000180)="0503000006003e0000000100c52cf7c25975e605b02f0800eb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) 15:59:28 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b44, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) [ 295.706021][T11268] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=11268 comm=syz-executor.3 15:59:28 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b34, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) [ 295.805105][ T27] audit: type=1400 audit(1580831968.155:69): avc: denied { ioctl } for pid=11262 comm="syz-executor.3" path="socket:[43077]" dev="sockfs" ino=43077 ioctlcmd=0x8933 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:59:28 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b45, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:28 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b35, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:28 executing program 4: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x418000, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x40000001, 0x8b}, 0x0, 0xfffffffffffffffc, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000180)="0503000006003e0000000100c52cf7c25975e605b02f0800eb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) [ 296.154200][T11266] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=11266 comm=syz-executor.3 15:59:28 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x404e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x20) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) sendfile(r0, r5, 0x0, 0x80001d00c0d0) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200000, 0x0) socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r11, 0xc0205649, &(0x7f0000001300)={0x9d0000, 0x8, 0x9, 0xffffffffffffffff, 0x0, &(0x7f00000012c0)={0x9909dd, 0x1f, [], @p_u16=&(0x7f0000001280)=0x2}}) write$capi20(r12, &(0x7f0000001340)={0x10, 0x200, 0x2, 0x81, 0xffff, 0x1}, 0x10) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r9, @ANYBLOB="01000000000100001c0012000c000100626f6e64000000000c000200080001b56b000000c47443b744348f80b07dab16be04fa7941c76799baaad5ff53e379fa1da04695b4d771ebecd97cfb73b138af59b2fbc4245dbe8fa94d3702c0df05721d12976156c38788664d4d907434ea804318d1e3bee29f0ddf"], 0x3c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r14, 0xc0205649, &(0x7f00000014c0)={0x9e0000, 0x6, 0x10001, r7, 0x0, &(0x7f0000001480)={0x990968, 0x6, [], @p_u32=&(0x7f0000001440)}}) sendmsg$nl_route(r15, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_PROTO={0x5, 0x9, 0x29}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x8001}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e24}]}}}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x60}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = dup(r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000004480)={0xffffffffffffffff, 0x10, &(0x7f0000004440)={&(0x7f0000004340)=""/210, 0xd2, r18}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x3, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x2f}, @map={0x18, 0x7, 0x1, 0x0, r6}]}, &(0x7f0000000140)='syzkaller\x00', 0x96a, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x4, [], r9, 0x18, r17, 0x8, &(0x7f0000001180)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x5, 0x4, 0x9, 0x356}, 0x10, r18}, 0x78) 15:59:28 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b46, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:28 executing program 1: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() pidfd_open(r2, 0x0) syz_open_procfs$namespace(r2, &(0x7f00000000c0)='ns/uts\x00') r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/nvme-fabrics\x00', 0x0, 0x0) pread64(r3, 0x0, 0x0, 0x9) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/nvme-fabrics\x00', 0x0, 0x0) pread64(r4, 0x0, 0x0, 0x9) r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/nvme-fabrics\x00', 0x0, 0x0) pread64(r5, 0x0, 0x0, 0x9) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x20000, 0x0) r7 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/nvme-fabrics\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) sendmmsg$inet6(r8, 0x0, 0x0, 0x20000000) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x59, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000140), 0x10, 0x0, r8}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0x28, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f089061fffffff00003f00632f77fbac141411e934a0a662079f4b4d2f87e5e0ca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0xfffffffffffffea3, 0xfffffffffffffe09}, 0x28) r10 = socket$inet(0x15, 0x5, 0x0) sendto$inet(r10, 0x0, 0xf00, 0x0, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x8}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r10, 0x8982, &(0x7f0000000040)={0x0, 'gretap0\x00', {0x600}, 0xe872}) r11 = socket$inet6(0xa, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000600)='auxv\x00') sendfile(r11, r12, &(0x7f0000000240)=0x202, 0x4000000000dc) write$FUSE_NOTIFY_INVAL_ENTRY(r12, &(0x7f0000000880)=ANY=[@ANYBLOB="29000000180000000000000000000000000000000000000008009daa930300006772657461703000000f611b12d3f17c5bc5ee86477e0b66f1fe8822997607df10c814dbd66ef56be28b300f4652d228015a148110ebf45e87c2b701a5724ea6751d5c433ddffa35fa14cab5cdaf1db8dbcd092a1b0da8d9e6dd32134d68f59660665842d7024a4a901645bb93f53c49939a077ca278e8dacf67dfe6e14ef52a473dbb291bd6a53323add91425a41192e01ea6563c4bf18157e6a62c83106edc00000000000000"], 0x29) syz_open_procfs$namespace(0x0, 0x0) r13 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r13, &(0x7f0000000080)={0x1f, 0xffff}, 0x6) r14 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fb0\x00', 0x0, 0x0) r15 = socket$inet(0x2, 0x4000000805, 0x0) dup2(r15, r14) r16 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) dup2(r0, r13) ioctl$sock_inet_SIOCGIFADDR(r13, 0x8915, &(0x7f00000001c0)={'gre0\x00', {0x2, 0x4e22, @local}}) msgget$private(0x0, 0xc00) 15:59:28 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b36, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:28 executing program 4: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x418000, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x40000001, 0x8b}, 0x0, 0xfffffffffffffffc, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000180)="0503000006003e0000000100c52cf7c25975e605b02f0800eb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) 15:59:28 executing program 3: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40046f41, 0x76006e) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x46002001}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="30000000040a0300000000402de81700000000000c00000009de030073797a3200001f0008000540fffffffe080007006e617400"], 0x30}, 0x1, 0x0, 0x0, 0x24000010}, 0x20040020) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40046f41, 0x76006e) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000001280)=0x7fffffff, 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") getsockopt$IP_SET_OP_VERSION(r4, 0x1, 0x53, &(0x7f0000000100), &(0x7f00000002c0)=0x8) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}], {0x95, 0x0, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x6, 0x0, [], r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 15:59:28 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b47, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b48, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:29 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b37, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) [ 296.714315][T11314] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=11314 comm=syz-executor.3 15:59:29 executing program 4: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x418000, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x40000001, 0x8b}, 0x0, 0xfffffffffffffffc, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000180)="0503000006003e0000000100c52cf7c25975e605b02f0800eb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) 15:59:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b49, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:29 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b3a, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:29 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x404e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x20) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) sendfile(r0, r5, 0x0, 0x80001d00c0d0) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200000, 0x0) socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r11, 0xc0205649, &(0x7f0000001300)={0x9d0000, 0x8, 0x9, 0xffffffffffffffff, 0x0, &(0x7f00000012c0)={0x9909dd, 0x1f, [], @p_u16=&(0x7f0000001280)=0x2}}) write$capi20(r12, &(0x7f0000001340)={0x10, 0x200, 0x2, 0x81, 0xffff, 0x1}, 0x10) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r9, @ANYBLOB="01000000000100001c0012000c000100626f6e64000000000c000200080001b56b000000c47443b744348f80b07dab16be04fa7941c76799baaad5ff53e379fa1da04695b4d771ebecd97cfb73b138af59b2fbc4245dbe8fa94d3702c0df05721d12976156c38788664d4d907434ea804318d1e3bee29f0ddf"], 0x3c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r14, 0xc0205649, &(0x7f00000014c0)={0x9e0000, 0x6, 0x10001, r7, 0x0, &(0x7f0000001480)={0x990968, 0x6, [], @p_u32=&(0x7f0000001440)}}) sendmsg$nl_route(r15, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_PROTO={0x5, 0x9, 0x29}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x8001}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e24}]}}}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x60}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = dup(r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000004480)={0xffffffffffffffff, 0x10, &(0x7f0000004440)={&(0x7f0000004340)=""/210, 0xd2, r18}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x3, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x2f}, @map={0x18, 0x7, 0x1, 0x0, r6}]}, &(0x7f0000000140)='syzkaller\x00', 0x96a, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x4, [], r9, 0x18, r17, 0x8, &(0x7f0000001180)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x5, 0x4, 0x9, 0x356}, 0x10, r18}, 0x78) 15:59:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b4a, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:29 executing program 3: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40046f41, 0x76006e) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x46002001}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="30000000040a0300000000402de81700000000000c00000009de030073797a3200001f0008000540fffffffe080007006e617400"], 0x30}, 0x1, 0x0, 0x0, 0x24000010}, 0x20040020) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40046f41, 0x76006e) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000001280)=0x7fffffff, 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") getsockopt$IP_SET_OP_VERSION(r4, 0x1, 0x53, &(0x7f0000000100), &(0x7f00000002c0)=0x8) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}], {0x95, 0x0, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x6, 0x0, [], r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 15:59:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b4b, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:29 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b3b, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:29 executing program 4: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x418000, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x40000001, 0x8b}, 0x0, 0xfffffffffffffffc, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000180)="0503000006003e0000000100c52cf7c25975e605b02f0800eb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) 15:59:29 executing program 1: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() pidfd_open(r2, 0x0) syz_open_procfs$namespace(r2, &(0x7f00000000c0)='ns/uts\x00') r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/nvme-fabrics\x00', 0x0, 0x0) pread64(r3, 0x0, 0x0, 0x9) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/nvme-fabrics\x00', 0x0, 0x0) pread64(r4, 0x0, 0x0, 0x9) r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/nvme-fabrics\x00', 0x0, 0x0) pread64(r5, 0x0, 0x0, 0x9) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x20000, 0x0) r7 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/nvme-fabrics\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) sendmmsg$inet6(r8, 0x0, 0x0, 0x20000000) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x59, &(0x7f0000000580)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000d4ba000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e50184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000010000009dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390af9a9ceafd07ed00b0000002cab154ad02ba119ca3c97278087001460a87d3e3e89c023a38f27def07231e23b0d89df976eb498caa2d196332202275463ac86ae9cd6a951c4c478d0e2bc641a4ad6d828b1ba60a3f4712561a2ed773c34297e36a7dd941ecd34d420a910d7b7a4135f5eef3e5139727cb2ebbb56953289ee927ba6edc4dd8759a55997816067c908f46dc7b93c1447161562c2d9ed57355987d4c2c3f78c58d6507ff3814831eafd14d90492e8b619905a9a9d44a9ca28a8a48285aa6b64f1a3654ad1d3cc71fdedda26c8e46106603a3d25327f914f5ad4a8a6199e8c0f894179ba6806658d1980470e5e5c7de25e633d99edcb13453a135e7bc1c5"], &(0x7f0000000340)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000140), 0x10, 0x0, r8}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0x28, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f089061fffffff00003f00632f77fbac141411e934a0a662079f4b4d2f87e5e0ca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0xfffffffffffffea3, 0xfffffffffffffe09}, 0x28) r10 = socket$inet(0x15, 0x5, 0x0) sendto$inet(r10, 0x0, 0xf00, 0x0, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x8}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r10, 0x8982, &(0x7f0000000040)={0x0, 'gretap0\x00', {0x600}, 0xe872}) r11 = socket$inet6(0xa, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000600)='auxv\x00') sendfile(r11, r12, &(0x7f0000000240)=0x202, 0x4000000000dc) write$FUSE_NOTIFY_INVAL_ENTRY(r12, &(0x7f0000000880)=ANY=[@ANYBLOB="29000000180000000000000000000000000000000000000008009daa930300006772657461703000000f611b12d3f17c5bc5ee86477e0b66f1fe8822997607df10c814dbd66ef56be28b300f4652d228015a148110ebf45e87c2b701a5724ea6751d5c433ddffa35fa14cab5cdaf1db8dbcd092a1b0da8d9e6dd32134d68f59660665842d7024a4a901645bb93f53c49939a077ca278e8dacf67dfe6e14ef52a473dbb291bd6a53323add91425a41192e01ea6563c4bf18157e6a62c83106edc00000000000000"], 0x29) syz_open_procfs$namespace(0x0, 0x0) r13 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r13, &(0x7f0000000080)={0x1f, 0xffff}, 0x6) r14 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fb0\x00', 0x0, 0x0) r15 = socket$inet(0x2, 0x4000000805, 0x0) dup2(r15, r14) r16 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) dup2(r0, r13) ioctl$sock_inet_SIOCGIFADDR(r13, 0x8915, &(0x7f00000001c0)={'gre0\x00', {0x2, 0x4e22, @local}}) msgget$private(0x0, 0xc00) [ 297.549926][T11353] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=11353 comm=syz-executor.3 15:59:29 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b3c, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:30 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b4c, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:30 executing program 4: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x418000, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x40000001, 0x8b}, 0x0, 0xfffffffffffffffc, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000180)="0503000006003e0000000100c52cf7c25975e605b02f0800eb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) 15:59:30 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b3d, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:30 executing program 3: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40046f41, 0x76006e) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x46002001}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="30000000040a0300000000402de81700000000000c00000009de030073797a3200001f0008000540fffffffe080007006e617400"], 0x30}, 0x1, 0x0, 0x0, 0x24000010}, 0x20040020) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40046f41, 0x76006e) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000001280)=0x7fffffff, 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") getsockopt$IP_SET_OP_VERSION(r4, 0x1, 0x53, &(0x7f0000000100), &(0x7f00000002c0)=0x8) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}], {0x95, 0x0, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x6, 0x0, [], r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 298.202304][T11381] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=11381 comm=syz-executor.3 15:59:30 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b4d, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:30 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b40, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:30 executing program 1: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() pidfd_open(r2, 0x0) syz_open_procfs$namespace(r2, &(0x7f00000000c0)='ns/uts\x00') r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/nvme-fabrics\x00', 0x0, 0x0) pread64(r3, 0x0, 0x0, 0x9) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/nvme-fabrics\x00', 0x0, 0x0) pread64(r4, 0x0, 0x0, 0x9) r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/nvme-fabrics\x00', 0x0, 0x0) pread64(r5, 0x0, 0x0, 0x9) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x20000, 0x0) r7 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/nvme-fabrics\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) sendmmsg$inet6(r8, 0x0, 0x0, 0x20000000) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x59, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000140), 0x10, 0x0, r8}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0x28, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f089061fffffff00003f00632f77fbac141411e934a0a662079f4b4d2f87e5e0ca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0xfffffffffffffea3, 0xfffffffffffffe09}, 0x28) r10 = socket$inet(0x15, 0x5, 0x0) sendto$inet(r10, 0x0, 0xf00, 0x0, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x8}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r10, 0x8982, &(0x7f0000000040)={0x0, 'gretap0\x00', {0x600}, 0xe872}) r11 = socket$inet6(0xa, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000600)='auxv\x00') sendfile(r11, r12, &(0x7f0000000240)=0x202, 0x4000000000dc) write$FUSE_NOTIFY_INVAL_ENTRY(r12, &(0x7f0000000880)=ANY=[@ANYBLOB="29000000180000000000000000000000000000000000000008009daa930300006772657461703000000f611b12d3f17c5bc5ee86477e0b66f1fe8822997607df10c814dbd66ef56be28b300f4652d228015a148110ebf45e87c2b701a5724ea6751d5c433ddffa35fa14cab5cdaf1db8dbcd092a1b0da8d9e6dd32134d68f59660665842d7024a4a901645bb93f53c49939a077ca278e8dacf67dfe6e14ef52a473dbb291bd6a53323add91425a41192e01ea6563c4bf18157e6a62c83106edc00000000000000"], 0x29) syz_open_procfs$namespace(0x0, 0x0) r13 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r13, &(0x7f0000000080)={0x1f, 0xffff}, 0x6) r14 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fb0\x00', 0x0, 0x0) r15 = socket$inet(0x2, 0x4000000805, 0x0) dup2(r15, r14) r16 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) dup2(r0, r13) ioctl$sock_inet_SIOCGIFADDR(r13, 0x8915, &(0x7f00000001c0)={'gre0\x00', {0x2, 0x4e22, @local}}) msgget$private(0x0, 0xc00) 15:59:30 executing program 4: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x418000, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x40000001, 0x8b}, 0x0, 0xfffffffffffffffc, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000180)="0503000006003e0000000100c52cf7c25975e605b02f0800eb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) 15:59:30 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x404e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x20) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) sendfile(r0, r5, 0x0, 0x80001d00c0d0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200000, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r10, 0xc0205649, &(0x7f0000001300)={0x9d0000, 0x8, 0x9, 0xffffffffffffffff, 0x0, &(0x7f00000012c0)={0x9909dd, 0x1f, [], @p_u16=&(0x7f0000001280)=0x2}}) write$capi20(r11, &(0x7f0000001340)={0x10, 0x200, 0x2, 0x81, 0xffff, 0x1}, 0x10) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r8, @ANYBLOB="01000000000100001c0012000c000100626f6e64000000000c000200080001b56b000000c47443b744348f80b07dab16be04fa7941c76799baaad5ff53e379fa1da04695b4d771ebecd97cfb73b138af59b2fbc4245dbe8fa94d3702c0df05721d12976156c38788664d4d907434ea804318d1e3bee29f0ddf"], 0x3c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r13, 0xc0205649, &(0x7f00000014c0)={0x9e0000, 0x6, 0x10001, r6, 0x0, &(0x7f0000001480)={0x990968, 0x6, [], @p_u32=&(0x7f0000001440)}}) sendmsg$nl_route(r14, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_PROTO={0x5, 0x9, 0x29}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x8001}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e24}]}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x60}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = dup(r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000004480)={0xffffffffffffffff, 0x10, &(0x7f0000004440)={&(0x7f0000004340)=""/210, 0xd2, r17}}, 0x10) 15:59:30 executing program 3: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40046f41, 0x76006e) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x46002001}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="30000000040a0300000000402de81700000000000c00000009de030073797a3200001f0008000540fffffffe080007006e617400"], 0x30}, 0x1, 0x0, 0x0, 0x24000010}, 0x20040020) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40046f41, 0x76006e) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000001280)=0x7fffffff, 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") getsockopt$IP_SET_OP_VERSION(r4, 0x1, 0x53, &(0x7f0000000100), &(0x7f00000002c0)=0x8) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}], {0x95, 0x0, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x6, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 15:59:30 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b4e, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:30 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b41, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) [ 298.504076][T11395] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=11395 comm=syz-executor.3 15:59:31 executing program 3: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40046f41, 0x76006e) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x46002001}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="30000000040a0300000000402de81700000000000c00000009de030073797a3200001f0008000540fffffffe080007006e617400"], 0x30}, 0x1, 0x0, 0x0, 0x24000010}, 0x20040020) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40046f41, 0x76006e) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000001280)=0x7fffffff, 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") getsockopt$IP_SET_OP_VERSION(r4, 0x1, 0x53, &(0x7f0000000100), &(0x7f00000002c0)=0x8) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}], {0x95, 0x0, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x6, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 15:59:31 executing program 4: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x418000, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x40000001, 0x8b}, 0x0, 0xfffffffffffffffc, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000180)="0503000006003e0000000100c52cf7c25975e605b02f0800eb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) 15:59:31 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b52, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:59:31 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b60, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x4, 0x0, 0x0}) [ 298.860445][T11416] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=11416 comm=syz-executor.3 [ 298.914229][T11420] ================================================================== [ 298.914385][T11420] BUG: KASAN: global-out-of-bounds in fbcon_get_font+0x2b2/0x5e0 [ 298.914398][T11420] Read of size 32 at addr ffffffff88941480 by task syz-executor.2/11420 [ 298.914403][T11420] [ 298.914420][T11420] CPU: 0 PID: 11420 Comm: syz-executor.2 Not tainted 5.5.0-syzkaller #0 [ 298.914430][T11420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.914436][T11420] Call Trace: [ 298.914459][T11420] dump_stack+0x197/0x210 [ 298.914477][T11420] ? fbcon_get_font+0x2b2/0x5e0 [ 298.914507][T11420] print_address_description.constprop.0.cold+0x5/0x30b [ 298.914520][T11420] ? fbcon_get_font+0x2b2/0x5e0 [ 298.914536][T11420] ? fbcon_get_font+0x2b2/0x5e0 [ 298.914552][T11420] __kasan_report.cold+0x1b/0x32 [ 298.914569][T11420] ? fbcon_get_font+0x2b2/0x5e0 [ 298.914595][T11420] kasan_report+0x12/0x20 [ 298.914612][T11420] check_memory_region+0x134/0x1a0 [ 298.914632][T11420] memcpy+0x24/0x50 [ 298.914651][T11420] fbcon_get_font+0x2b2/0x5e0 [ 298.914674][T11420] ? display_to_var+0x7e0/0x7e0 [ 298.914788][T11420] con_font_op+0x20b/0x1270 [ 298.914821][T11420] ? tomoyo_path_number_perm+0x214/0x520 [ 298.914844][T11420] ? con_write+0xd0/0xd0 [ 298.914872][T11420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.914939][T11420] ? security_capable+0x95/0xc0 [ 298.914967][T11420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.915009][T11420] ? ns_capable_common+0x93/0x100 [ 298.915070][T11420] vt_ioctl+0xd2e/0x26d0 [ 298.915097][T11420] ? complete_change_console+0x3a0/0x3a0 [ 298.915122][T11420] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 298.915161][T11420] ? posix_get_monotonic_timespec+0x75/0x290 [ 298.915194][T11420] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 298.915215][T11420] ? tty_jobctrl_ioctl+0x50/0xd40 [ 298.915235][T11420] ? complete_change_console+0x3a0/0x3a0 [ 298.915277][T11420] tty_ioctl+0xa37/0x14f0 [ 298.915301][T11420] ? tty_vhangup+0x30/0x30 [ 298.915320][T11420] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 298.915343][T11420] ? do_vfs_ioctl+0x11b/0x1350 [ 298.915371][T11420] ? ioctl_file_clone+0x180/0x180 [ 298.915394][T11420] ? selinux_file_mprotect+0x620/0x620 [ 298.915409][T11420] ? __fget_files+0x359/0x520 [ 298.915440][T11420] ? ksys_dup3+0x3e0/0x3e0 [ 298.915479][T11420] ? ns_to_kernel_old_timeval+0x100/0x100 [ 298.915510][T11420] ? tomoyo_file_ioctl+0x23/0x30 [ 298.915529][T11420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.915545][T11420] ? security_file_ioctl+0x8d/0xc0 [ 298.915561][T11420] ? tty_vhangup+0x30/0x30 [ 298.915584][T11420] ksys_ioctl+0x123/0x180 [ 298.915610][T11420] __x64_sys_ioctl+0x73/0xb0 [ 298.915633][T11420] do_syscall_64+0xfa/0x790 [ 298.915660][T11420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.915671][T11420] RIP: 0033:0x45b399 [ 298.915689][T11420] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.915697][T11420] RSP: 002b:00007f12d04f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 298.915712][T11420] RAX: ffffffffffffffda RBX: 00007f12d04f46d4 RCX: 000000000045b399 [ 298.915722][T11420] RDX: 0000000020000100 RSI: 0000000000004b60 RDI: 0000000000000003 [ 298.915731][T11420] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 298.915740][T11420] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 298.915749][T11420] R13: 0000000000000366 R14: 00000000004c48ce R15: 000000000075bf2c [ 298.915784][T11420] [ 298.915789][T11420] The buggy address belongs to the variable: [ 298.915850][T11420] fontdata_8x16+0x1000/0x1120 [ 298.915855][T11420] [ 298.915863][T11420] Memory state around the buggy address: [ 298.915878][T11420] ffffffff88941380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 298.915892][T11420] ffffffff88941400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 298.915908][T11420] >ffffffff88941480: fa fa fa fa 06 fa fa fa fa fa fa fa 05 fa fa fa [ 298.915915][T11420] ^ [ 298.915927][T11420] ffffffff88941500: fa fa fa fa 06 fa fa fa fa fa fa fa 00 00 03 fa [ 298.915939][T11420] ffffffff88941580: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00 [ 298.915944][T11420] ================================================================== [ 298.915951][T11420] Disabling lock debugging due to kernel taint [ 298.916003][T11420] Kernel panic - not syncing: panic_on_warn set ... [ 298.916020][T11420] CPU: 0 PID: 11420 Comm: syz-executor.2 Tainted: G B 5.5.0-syzkaller #0 [ 298.916027][T11420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.916032][T11420] Call Trace: [ 298.916051][T11420] dump_stack+0x197/0x210 [ 298.916096][T11420] panic+0x2e3/0x75c [ 298.916112][T11420] ? add_taint.cold+0x16/0x16 [ 298.916130][T11420] ? fbcon_get_font+0x2b2/0x5e0 [ 298.916145][T11420] ? preempt_schedule+0x4b/0x60 [ 298.916163][T11420] ? ___preempt_schedule+0x16/0x18 [ 298.916182][T11420] ? trace_hardirqs_on+0x5e/0x240 [ 298.916198][T11420] ? fbcon_get_font+0x2b2/0x5e0 [ 298.916214][T11420] end_report+0x47/0x4f [ 298.916226][T11420] ? fbcon_get_font+0x2b2/0x5e0 [ 298.916241][T11420] __kasan_report.cold+0xe/0x32 [ 298.916255][T11420] ? fbcon_get_font+0x2b2/0x5e0 [ 298.916273][T11420] kasan_report+0x12/0x20 [ 298.916290][T11420] check_memory_region+0x134/0x1a0 [ 298.916312][T11420] memcpy+0x24/0x50 [ 298.916330][T11420] fbcon_get_font+0x2b2/0x5e0 [ 298.916348][T11420] ? display_to_var+0x7e0/0x7e0 [ 298.916371][T11420] con_font_op+0x20b/0x1270 [ 298.916451][T11420] ? tomoyo_path_number_perm+0x214/0x520 [ 298.916469][T11420] ? con_write+0xd0/0xd0 [ 298.916491][T11420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.916517][T11420] ? security_capable+0x95/0xc0 [ 298.916538][T11420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.916554][T11420] ? ns_capable_common+0x93/0x100 [ 298.916576][T11420] vt_ioctl+0xd2e/0x26d0 [ 298.916596][T11420] ? complete_change_console+0x3a0/0x3a0 [ 298.916614][T11420] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 298.916631][T11420] ? posix_get_monotonic_timespec+0x75/0x290 [ 298.916652][T11420] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 298.916667][T11420] ? tty_jobctrl_ioctl+0x50/0xd40 [ 298.916682][T11420] ? complete_change_console+0x3a0/0x3a0 [ 298.916698][T11420] tty_ioctl+0xa37/0x14f0 [ 298.916714][T11420] ? tty_vhangup+0x30/0x30 [ 298.916729][T11420] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 298.916743][T11420] ? do_vfs_ioctl+0x11b/0x1350 [ 298.916762][T11420] ? ioctl_file_clone+0x180/0x180 [ 298.916777][T11420] ? selinux_file_mprotect+0x620/0x620 [ 298.916790][T11420] ? __fget_files+0x359/0x520 [ 298.916811][T11420] ? ksys_dup3+0x3e0/0x3e0 [ 298.916832][T11420] ? ns_to_kernel_old_timeval+0x100/0x100 [ 298.916853][T11420] ? tomoyo_file_ioctl+0x23/0x30 [ 298.916870][T11420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.916884][T11420] ? security_file_ioctl+0x8d/0xc0 [ 298.916938][T11420] ? tty_vhangup+0x30/0x30 [ 298.916963][T11420] ksys_ioctl+0x123/0x180 [ 298.916984][T11420] __x64_sys_ioctl+0x73/0xb0 [ 298.917004][T11420] do_syscall_64+0xfa/0x790 [ 298.917025][T11420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.917034][T11420] RIP: 0033:0x45b399 [ 298.917049][T11420] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.917057][T11420] RSP: 002b:00007f12d04f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 298.917070][T11420] RAX: ffffffffffffffda RBX: 00007f12d04f46d4 RCX: 000000000045b399 [ 298.917088][T11420] RDX: 0000000020000100 RSI: 0000000000004b60 RDI: 0000000000000003 [ 298.917096][T11420] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 298.917106][T11420] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 298.917115][T11420] R13: 0000000000000366 R14: 00000000004c48ce R15: 000000000075bf2c [ 298.918778][T11420] Kernel Offset: disabled [ 299.686218][T11420] Rebooting in 86400 seconds..