Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 39.456859] audit: type=1800 audit(1571616002.264:33): pid=7376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 39.478314] audit: type=1800 audit(1571616002.264:34): pid=7376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 41.776087] audit: type=1400 audit(1571616004.584:35): avc: denied { map } for pid=7550 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.225' (ECDSA) to the list of known hosts. 2019/10/21 00:00:11 fuzzer started [ 48.318626] audit: type=1400 audit(1571616011.124:36): avc: denied { map } for pid=7559 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/10/21 00:00:12 dialing manager at 10.128.0.105:38533 2019/10/21 00:00:13 syscalls: 2516 2019/10/21 00:00:13 code coverage: enabled 2019/10/21 00:00:13 comparison tracing: enabled 2019/10/21 00:00:13 extra coverage: extra coverage is not supported by the kernel 2019/10/21 00:00:13 setuid sandbox: enabled 2019/10/21 00:00:13 namespace sandbox: enabled 2019/10/21 00:00:13 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/21 00:00:13 fault injection: enabled 2019/10/21 00:00:13 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/21 00:00:13 net packet injection: enabled 2019/10/21 00:00:13 net device setup: enabled 2019/10/21 00:00:13 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 00:02:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000005c0)={'vlan0\x00', 0xd803}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @local}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r5, 0x0, 0x27, &(0x7f00000000c0)={@multicast1, @local, @local}, 0xc) dup3(r0, r2, 0x0) [ 194.788876] audit: type=1400 audit(1571616157.594:37): avc: denied { map } for pid=7578 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14963 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 194.908796] IPVS: ftp: loaded support on port[0] = 21 00:02:37 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) gettid() fsync(0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x35a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0}) [ 195.062216] chnl_net:caif_netlink_parms(): no params data found [ 195.084164] IPVS: ftp: loaded support on port[0] = 21 00:02:38 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) [ 195.164269] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.174024] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.182150] device bridge_slave_0 entered promiscuous mode [ 195.200127] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.207209] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.220663] device bridge_slave_1 entered promiscuous mode [ 195.330655] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 195.351146] chnl_net:caif_netlink_parms(): no params data found [ 195.363544] bond0: Enslaving bond_slave_1 as an active interface with an up link 00:02:38 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) pipe(0x0) getpgrp(0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x40046109, &(0x7f0000000300)) [ 195.463009] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 195.487950] team0: Port device team_slave_0 added [ 195.494127] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 195.515946] team0: Port device team_slave_1 added [ 195.521268] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.530175] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.547920] device bridge_slave_0 entered promiscuous mode [ 195.567184] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 195.570186] IPVS: ftp: loaded support on port[0] = 21 [ 195.574628] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 195.600204] bridge0: port 2(bridge_slave_1) entered blocking state 00:02:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = getpid() ioprio_set$pid(0x2, r1, 0x0) [ 195.612092] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.619798] device bridge_slave_1 entered promiscuous mode [ 195.654185] IPVS: ftp: loaded support on port[0] = 21 [ 195.697918] device hsr_slave_0 entered promiscuous mode [ 195.755402] device hsr_slave_1 entered promiscuous mode [ 195.795804] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 195.802899] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 195.830872] IPVS: ftp: loaded support on port[0] = 21 00:02:38 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000080)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)='trusted.overlay.nli\ak\x00', 0x0, 0x0, 0x0) [ 195.860101] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 195.908712] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 195.952506] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.959064] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.966158] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.972536] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.991118] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 195.998816] team0: Port device team_slave_0 added [ 196.006341] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 196.013574] team0: Port device team_slave_1 added [ 196.019803] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 196.029302] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 196.107946] device hsr_slave_0 entered promiscuous mode [ 196.145364] device hsr_slave_1 entered promiscuous mode [ 196.187235] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 196.194692] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 196.209076] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.218706] IPVS: ftp: loaded support on port[0] = 21 [ 196.227531] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.304475] chnl_net:caif_netlink_parms(): no params data found [ 196.314031] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 196.461384] chnl_net:caif_netlink_parms(): no params data found [ 196.475628] chnl_net:caif_netlink_parms(): no params data found [ 196.488134] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.494524] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.502267] device bridge_slave_0 entered promiscuous mode [ 196.565076] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.571446] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.579503] device bridge_slave_1 entered promiscuous mode [ 196.590635] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.617089] chnl_net:caif_netlink_parms(): no params data found [ 196.641194] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 196.679600] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.690568] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.697759] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.704814] device bridge_slave_0 entered promiscuous mode [ 196.712854] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 196.732403] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.738921] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.749565] device bridge_slave_0 entered promiscuous mode [ 196.757722] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 196.764973] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 196.774834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.782442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.792534] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.799084] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.806267] device bridge_slave_1 entered promiscuous mode [ 196.813432] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 196.836349] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.843002] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.850150] device bridge_slave_1 entered promiscuous mode [ 196.858773] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 196.883835] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 196.891862] team0: Port device team_slave_0 added [ 196.898641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.909316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.921264] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 196.928204] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.935560] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 196.941654] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.951106] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 196.963017] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.970983] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.978231] device bridge_slave_0 entered promiscuous mode [ 196.984954] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 196.992852] team0: Port device team_slave_1 added [ 196.999254] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 197.010704] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 197.019529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.029217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.037605] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.043943] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.050949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.058958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.068087] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.074713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.082512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.091483] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 197.100954] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.107784] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.115553] device bridge_slave_1 entered promiscuous mode [ 197.122042] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 197.131528] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 197.148935] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 197.160962] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 197.182335] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 197.191552] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 197.199096] team0: Port device team_slave_0 added [ 197.204977] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 197.212491] team0: Port device team_slave_1 added [ 197.221250] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 197.230060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.238361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.247252] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.253814] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.261746] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 197.269331] team0: Port device team_slave_0 added [ 197.291345] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 197.299259] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 197.307396] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 197.314562] team0: Port device team_slave_1 added [ 197.322380] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 197.377026] device hsr_slave_0 entered promiscuous mode [ 197.415890] device hsr_slave_1 entered promiscuous mode [ 197.465877] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 197.472900] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 197.480141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.487994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.495917] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.502338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.515323] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 197.526442] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 197.534782] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 197.550480] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 197.563440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.572773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.584233] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 197.592303] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 197.603171] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 197.621130] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 197.657107] device hsr_slave_0 entered promiscuous mode [ 197.695388] device hsr_slave_1 entered promiscuous mode [ 197.739960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.748075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.756261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.764633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.773155] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.784405] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 197.799484] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 197.808661] team0: Port device team_slave_0 added [ 197.814266] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 197.830243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.838629] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.847904] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 197.858063] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 197.869055] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 197.876859] team0: Port device team_slave_1 added [ 197.882223] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 197.927990] device hsr_slave_0 entered promiscuous mode [ 197.985820] device hsr_slave_1 entered promiscuous mode [ 198.025958] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 198.033606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.044737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.060623] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 198.068613] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 198.082918] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 198.091954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.100783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.109049] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.119165] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 198.127171] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 198.134643] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 198.144460] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 198.159016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.169405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.178376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.186302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.195605] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 198.203813] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 198.210584] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.230607] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 198.239423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.248733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.258948] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 198.306989] device hsr_slave_0 entered promiscuous mode [ 198.345430] device hsr_slave_1 entered promiscuous mode [ 198.406329] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 198.415944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.423598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.436783] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 198.443006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.452041] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 198.464878] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 198.481645] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 198.500811] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 198.511245] audit: type=1400 audit(1571616161.314:38): avc: denied { associate } for pid=7582 comm="syz-executor.1" name="syz1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 198.548506] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 198.563997] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 198.624864] 8021q: adding VLAN 0 to HW filter on device bond0 [ 198.647285] tty_warn_deprecated_flags: 'syz-executor.1' is using deprecated serial flags (with no effect): 00000300 00:02:41 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0x41045508, 0x0) [ 198.701003] tty_warn_deprecated_flags: 'syz-executor.1' is using deprecated serial flags (with no effect): 00000300 [ 198.743688] 8021q: adding VLAN 0 to HW filter on device bond0 [ 198.751732] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 198.772731] 8021q: adding VLAN 0 to HW filter on device bond0 00:02:41 executing program 1: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f0000000240)="b1", 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x8) [ 198.790091] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 198.802355] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 198.811721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.819972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.837373] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 00:02:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x102, 0x0) clock_gettime(0x0, &(0x7f0000000180)) ppoll(&(0x7f0000000140)=[{r2}, {r3}], 0x2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 198.844365] audit: type=1400 audit(1571616161.644:39): avc: denied { map } for pid=7611 comm="syz-executor.1" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=28225 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 198.901245] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 198.908107] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.918297] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 198.927451] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 198.937854] 8021q: adding VLAN 0 to HW filter on device bond0 [ 198.947319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.954521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.962423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.970092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.981923] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 198.988537] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.996142] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 199.006592] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 199.015321] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 199.021422] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.029783] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 199.040253] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 199.046937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.055534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.063326] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.069842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.077279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.085564] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.093172] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.099580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.106950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.113867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.121441] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.137034] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 199.146156] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 199.156251] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 199.165543] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 199.171630] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.181918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.190418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.198750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.206753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.215601] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 199.223823] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 199.239009] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 00:02:42 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) [ 199.250296] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 199.262871] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.271355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.286977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 00:02:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff80000000000000, 0x3626}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) pipe(&(0x7f0000000300)={0xffffffffffffffff}) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) r2 = syz_open_pts(r1, 0x600982) ioctl$KDMKTONE(r2, 0x4b30, 0xffffffff) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r3 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback, 0xfffffffd}], 0x1c) [ 199.297258] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.303656] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.311117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.323538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.331766] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.338193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.345813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.354605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.363010] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.369453] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.383331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.391444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.406331] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.412812] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.424413] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 199.432974] hrtimer: interrupt took 70616 ns [ 199.436687] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 199.448577] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 199.464623] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 199.472305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.480475] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.487863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.495418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.503474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.512194] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.518656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.527755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.535881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.549241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.559581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.571421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.581105] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.587659] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.604658] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 199.616353] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 199.632848] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 199.642708] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 199.656973] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 199.664180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.678763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.689986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 00:02:42 executing program 0: syz_open_dev$sndmidi(0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x23b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x2}}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x8) [ 199.710422] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.723681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.734889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.749204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.758754] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 00:02:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000440)={'vcan0\x00', 0x0}) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, &(0x7f0000000040)=0x40, 0x4) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f00000003c0)={&(0x7f0000000000)=""/17, 0x1000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r5, 0x11b, 0x5, &(0x7f0000000800)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r5, 0x11b, 0x6, &(0x7f0000000080)=0x80, 0x4) bind$xdp(r5, &(0x7f0000000300)={0x2c, 0x0, r4}, 0x10) ppoll(&(0x7f0000000140)=[{r5}], 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x0, 0x0) [ 199.773102] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 199.797734] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 199.831346] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 199.852760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.861264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.874752] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 00:02:42 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.events\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_ifreq(r1, 0x8916, &(0x7f00000001c0)={'ip6gre0\x00', @ifru_map={0x0, 0x8, 0x3ff, 0x4, 0x1, 0x3}}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000300)='y\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') write$P9_RATTACH(r3, &(0x7f00000000c0)={0x14, 0x69, 0x1, {0x40}}, 0x14) close(r3) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FIDEDUPERANGE(r4, 0xc0189436, 0x0) prctl$PR_SET_TSC(0x1a, 0x2) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) [ 199.883309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.898613] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 199.920469] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 199.929381] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 199.939907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.949528] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.957567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.965310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.972923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.973788] audit: type=1400 audit(1571616162.774:40): avc: denied { create } for pid=7643 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 199.980879] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.013728] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 200.021039] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 200.029298] audit: type=1400 audit(1571616162.814:41): avc: denied { write } for pid=7643 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 200.031753] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 200.065910] audit: type=1400 audit(1571616162.814:42): avc: denied { read } for pid=7643 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 200.073434] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 200.102901] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 200.110711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.127187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.135840] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.148715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.159754] ptrace attach of "/root/syz-executor.0"[7645] was attempted by "/root/syz-executor.0"[7648] [ 200.170381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.180594] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 200.194180] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 200.207222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.218891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.229226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.241668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.253362] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 200.263510] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 200.277543] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 200.291708] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 200.298625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.309833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.317982] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.326124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.333871] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.344193] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 200.353287] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 200.362091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.376064] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 200.382717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.390515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.401294] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 200.409981] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 200.422583] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 200.430391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.438223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.448471] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 200.454585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.517056] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 200.524444] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 200.562440] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 200.573879] 8021q: adding VLAN 0 to HW filter on device batadv0 00:02:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x1, 0x0) [ 200.731835] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop2 00:02:43 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) fanotify_init(0x0, 0x0) listen(0xffffffffffffffff, 0x5eb857) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x5, 0x1a1000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x1c) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\n\x00\x14'}) 00:02:43 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000280)={0x4, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup(0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000012c0)={0x1000001c4, 0x0, &(0x7f0000000400)=[@free_buffer], 0x0, 0x0, 0x0}) 00:02:43 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x8, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r0, &(0x7f0000000400)='#', 0x1}]) 00:02:43 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = dup2(r0, r0) ioctl$PPPIOCSFLAGS1(r1, 0x4004743b, &(0x7f0000000100)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x4d, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffffc) r5 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$RTC_EPOCH_SET(r5, 0x40084149, 0x718000) ioctl$KVM_NMI(r4, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:02:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x10) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="480000001500197f09004b0101048c590188ffffcf5d3474ff9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee22600d4ff5bffff9b226452", 0x48}], 0x1) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x100) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, r2, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x27}}}, {0x14, 0x2, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xd}}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'caif0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xb844}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="480000001500197f09004b0101048c590188ffffcf5d3474ff9240e10520613057fff7e0", 0x24}], 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000400)=""/16, &(0x7f0000000440)=0x10) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$inet6_opts(r3, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x4000000032, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f0000002a00)=[{{&(0x7f00000007c0)=@ethernet={0x306, @broadcast}, 0x80, &(0x7f0000000980)=[{&(0x7f00000003c0)="ebbbe0cca54748b57842a5", 0xb}, {&(0x7f0000000840)}, {&(0x7f0000000880)="c1979ea89be8684edf0cd00c0e6e9c37415f1bf9460c70803c007b99f60fbc37cc6b59a7a7096177b46c8b4983f989ff60be01c0c73bbf5ae795586b644bd7d17b8b761bc67fc5c8e3c7d7fd6b875ee8af0f61c06523f6ec34c6f3d178627e81f8edf65b13ac47e4ec77bea1b18379fa7765631551c6abbf6b37fbc75e31527f65717241e8e013c20411b6c5727bda46e4a2fe15fdb62f7e15da458dc5a6c3e8aa09146f0f707eb55251475d3ca5f1730d96bf92639474e3ad82d15888d442eaa84f55fe28b4de43ffbf796e6510bc8c741534aac91543d135cc67d63975718e821a7ee30964c161f49c878a8b68770679d0e6f7240f10b5a65962f424", 0xfd}], 0x3, &(0x7f00000009c0)=[{0x100, 0x1, 0x20, "6d86fe3377c1470a19db3b6eeb9642ba7393eb9a131738ba98877c40e4ad6556c32ef72641f986a7b24c952d212ae202b0e182cd783591b4b3f07bd4ace6ffc55db6d60cdafac9a4e48ac4d6d0068634574943f4d25db343e28428626be9a0fe73bbb2db404a324f7d4d651d4d0fbcf4613973976ae717c12407e099c5ed04174596b97f2254c895927b7d76e51c73daf8c7647a53b0ea9f43915e9a5751b09b288aff9eaaeb632f038035da716f71c64ecbd53ec66e911fad9a09ad0cfe80298c8e1401c06f502af353120f38314081b2bd1fcfb739b4b4d43b73b7bbb45776089a9c9a73cdaeddbc7d8f845dd4"}, {0xc8, 0x10b, 0x2, "844d551e475c8a01795b78fc7ac5cf15740f089726426d5534cda3ebab192b8a22c431e2db1b261b92e18d279e4dc24bb7a537d33fdce6c34083cfa8271a4f857ebf8a5df05eeaab0e9b9c62991d7dda6a2b33200351a289bb5c776eab8296b10c326ad1a6dd14f5d18f8ba20fcca4c0b363c128dd04e0afbaaa871e34e8f23bb0f402d1a89693b57e619a31992baf52807fef75f1315150ee161244f63e1b475b5b5e454de287fa38e17673dc14150e962fc6248d28c9"}, {0x28, 0x8a, 0xffffff81, "21f54049433aa2dcc058ca6d0640a8d35db2"}], 0x1f0}}, {{&(0x7f0000000bc0)=@x25={0x9, @null=' \x00'}, 0x80, 0x0, 0x0, &(0x7f0000000f00)=[{0xa0, 0x11, 0x7fff, "c80e3fe6547233c1a7508152d07bc213b9d676bddb3423457de1dfd8c590d2e2972e2b8e459e0d7254ddf35ec5283fef0acd91a8fe2b9f624e7acf6bba5274bc86757d68b2b937bbd89c3d37bd7866032ca8c3414c25a92c5f35b4a7eacdc4463d21942d991f2c30351f6cc592ea9c4ba46dbc742fc629914bcdbd8a4a43a3a1577c545eadec0c41e3"}, {0x1010, 0x1, 0x80, "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"}, {0x110, 0x114, 0xf298, "27f24d6c914bc54e3a33049485a147b5551ebdf966dc33caa1590b2c6d809597e39ac8c6f1e4a38c6dbfe46b25329a21e3af7c956aed00a39131a35301e665636d5a33c10ff4bf21451a06720f8e77640f1bb0cd6db2cba31a0efdbf64e32fa34a4e9da403e1bd8571a81552e57e33269f4f8e1178de8ef43e03c5cd318260f32aa60192f8807aeb4467fffe2bed0847f33c79bd32018e0501c6a2cd91ae15eff1193de917073b5cc97586f6811d28c2266155454f03ab9a0a39756d218d11e081a613a0e4e14685b044cf922793007a19d02439fb30da8f507a32e392cbb86a72ba041e7d0219f3f7e8e2abdc50f7bd3b837230fdcaa8516c"}, {0xf8, 0x107, 0xfffff701, "4ddc50a9640240bfdbd2f24fe5d62d64200f3c73526d57961b79e7532ea797b79eac05d57d513a0933e9a1191dea3a3e50412c0fffa8bc1f8b792c1f4b351c5e9f894d7c64fd4005305c46cd5886af382192ee04484a6e28d6b8e8b756d45eeb7c286e27253440825a28b87f691b5c3dbed8bfc2b4cd2f16c2b0d73c1f839c367ad6bff3fc88e4c27a6c10288266fb926e939a39a4b455c4285d2f695a33c36edd69798e47a115b85d0d67eae2698847137a366e75573485740c5b88203562dd4f4dfe8bae27858f58a723f031e630d36b8ca8491c8670294d49adbea10d54575722be"}, {0x90, 0x104, 0x40, "824b8d467bd71b9188383023b0d869197459fc24d34096beafe26b628320ea53813bac9047b5e86f7787549b8d6ca0125ccb0591f72583f83df76123608ad3c57a8defa355b24fded60b211a6210bd8691ddd4a2937bd1c631bcab9a97cc800cb271d81d8d8d4bf668f77ec9d8191ed5e96c262774a69000c44794b24e93"}, {0x28, 0x10f, 0x2, "c53f4641291f262e671e2ac1d961eb521d"}, {0xc0, 0x103, 0x0, "c81c1964e0d92a9d1c26d6de7cdb29dd7277446007fab16acca0effaf028cc1ceda87ed4d5021dd466af29a0e1151b300e0e1bb03659391b71acd2743a6b8bd33724ce6365c607e0bf2f13551dfaf04fad8bcd2e97a405e9dc061158f8d184c798ffdeb7e98d7672b3840424aece69466051763f55f60b4664667004c60a3eb7dab5638848ac8d97be462f63d6fde924c3dded6af8fb80a163a3c7bc63709b7fa6a90c1a5a7d52182d"}], 0x1430}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000002340)="5a42020584ca7a53901efb63598ec2828290cd0ad23beacdaeae4782f6f9a99979e2fe261c3d2ee8e0f52b413dab4a5dd22de1c4fe0dbe3d0d949e4cf80b29b1438db16e7b8cf25e9277467ec5b8b59a8ebe1a671caf637b85a5cc7aa9d39b7a4ff43645f01dc89080727a115307eb024f12b2fa9f89bf7a1b8628ddadd3b0eb80ea1cbf4185ad3f3c5703e5a477a00917b9f2d1951c4782bc816c3e4008d4a530888ce9f6c095306213839ef1bf978937f1c3442a3cfe8ee853654e24d22e40f91fcd8552c4451697a716615472ac5a186ee5e1cfe779e63c2d9539dc916e545b3e4adfb0d2f56a2ea5129d878595fc5f0100", 0xf3}, {&(0x7f0000002440)="cad04b55f226124aa9eb729b3832454b7d2d2a81472c67ef755633f000b2e8ef2cfe737b727d9e061e09376aff459226d6773a4fc0a34dfb8ba0bffdda3b1e7d618f72b3bba6ce2c4ea00f210cb8cf2028214dca1a3029cdadbd2d1454e32a2626892b1283f9f09dd54328dab4835e9b783b95a37bb6e7cffb0f20dff4fa8c85d017240a117956", 0x87}, {&(0x7f0000002500)="a909ddd617c37968df292ff2da4f1795dfcfda2f8480cbee685c7e314dc2a161e279a545ee434966a0fd09adebb60f7e6d4ca1f1cad0eb324c88ea621acce875fbae36244b24ee695b88425f3e4d9f4b2da19da15b55e1197d46d1b6426a8ddd682789961729209458e9ff0a74471c428b800cae4476d9d52a5eb867bb8175e5aaeacf2ff2f98db3ac51664b1ee4ce7184727af01c", 0x95}, {&(0x7f0000002600)="7a77093ec7ce47b92d27134c72404f06d80d82adc108", 0x16}, {&(0x7f0000002640)="d8ada57ab7a82776dd87b22057d3f5e587be486827e9dc2671b0", 0x1a}, {0x0}, {&(0x7f0000002700)="16c427401249ed4ccb1769036edaa63ce9aefca926520aadd76d2ef96bf088760611a08b1e4d24c79052f8ccb461e95997f710dbde8890712a9d66372780c537a1f813c807b1fda0152ecc7d5a83aae213481e06a90f4843b164f83fccfee94958e53d8dc1b32a3a697fec7272907a9dc2963240fdf804f4f9ffe202c7daa3ed331aa415e3a6bc57c1d23b77ad94c0a376aa7f736c3c312873cb5a248e9a4ae064c7f51a7b7441484f01449dfc0cf84e5017af9ff5aac22e707775687ce2000a70e9a8cae1bf46840ad4803f5c6c8d537387235f827d95503e679f1e", 0xdc}, {&(0x7f0000002800)="8576b641f119c5cc78416584c09926737e321f76413f4a8419ee1079e55ff2f7fd7aefb27a38cf44561e3b9fe761fcc54cda207212f621c75a996d0834d4590df3c4d41017760fc7055b0d917a1e5959e3fe4871dfd9bd9952682df35422957b669f69ae52456b65f899b3337d6048151d20a002870f24f4882021dd11f33359d441cbb0d9871ff4f22e8093ea385ab1969bbe305c718f24afade36f084534805c4b48020e7756b4bb", 0xa9}, {&(0x7f00000028c0)="e9e0c14e06c71f91e7be287ca0458f5ac8b76102f623f5cdf9bf51eb95c55d108e3e8c9c3cf6df3fff59434288027c2957ea6e4c47542825314db6b2c15e8a", 0x3f}, {&(0x7f0000002900)="f69aa832e6c6307d0117197af0", 0xd}], 0xa}}], 0x3, 0x4000080) [ 200.773385] BTRFS error (device loop2): superblock checksum mismatch [ 200.782155] BTRFS error (device loop2): open_ctree failed [ 200.838520] audit: type=1400 audit(1571616163.644:43): avc: denied { map } for pid=7680 comm="syz-executor.1" path="/dev/binder1" dev="devtmpfs" ino=15813 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 200.883533] binder: 7680:7681 unknown command 0 [ 200.897032] BTRFS error (device loop2): superblock checksum mismatch [ 200.910501] binder: 7680:7681 ioctl c0306201 200012c0 returned -22 [ 200.920894] audit: type=1400 audit(1571616163.674:44): avc: denied { set_context_mgr } for pid=7680 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 00:02:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x12) connect$inet6(r0, &(0x7f0000000000), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_group_source_req(r2, 0x0, 0x2e, &(0x7f0000000600)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty}}}, 0x108) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 00:02:43 executing program 1: capget(0x0, 0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) getuid() getegid() lchown(0x0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) keyctl$link(0x8, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f00000000c0)) write$P9_RUNLINKAT(0xffffffffffffffff, 0x0, 0xfffffffffffffe63) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDSKBMODE(r1, 0x4b45, 0x0) tkill(r0, 0x1000000000016) [ 200.996107] BTRFS error (device loop2): open_ctree failed [ 201.018666] bond0: Releasing backup interface bond_slave_1 00:02:43 executing program 2: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004840)=[{{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000000400)=""/255, 0xff}, {0x0}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000007c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x15e, 0x0) 00:02:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000004000"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000000000000010000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100f5000000000000020000000005000500000000000a000000000000000000000000000000001700"/128], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x4000000000004b1, 0x0) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 201.070263] audit: type=1400 audit(1571616163.754:45): avc: denied { create } for pid=7687 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 201.098589] audit: type=1400 audit(1571616163.754:46): avc: denied { ioctl } for pid=7687 comm="syz-executor.3" path="socket:[28417]" dev="sockfs" ino=28417 ioctlcmd=0x8991 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 00:02:44 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000002600)={{0x3}, 0x0, [], {0x0, 0x989680}}) 00:02:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 201.383476] ptrace attach of "/root/syz-executor.4"[7711] was attempted by "/root/syz-executor.4"[7712] 00:02:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x8) 00:02:44 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x44}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000001380)=""/4111, 0x100f) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000240)={{&(0x7f00006b5000/0x4000)=nil, 0x4000}, 0x1}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 00:02:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50000}]}) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfffffffffffffe68, 0x84, 0x0, 0x296) [ 201.604688] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 201.647659] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 00:02:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/softnet_stat\x00') sendfile(r0, r0, &(0x7f00000002c0)=0x202, 0xdd) 00:02:44 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85512, &(0x7f0000002600)={{}, 0x0, [], {0x0, 0x989680}}) 00:02:44 executing program 5: 00:02:44 executing program 4: 00:02:44 executing program 1: 00:02:44 executing program 5: 00:02:44 executing program 2: 00:02:44 executing program 3: [ 201.968905] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 00:02:44 executing program 5: 00:02:44 executing program 1: 00:02:44 executing program 2: 00:02:44 executing program 4: 00:02:44 executing program 0: 00:02:45 executing program 3: 00:02:45 executing program 1: 00:02:45 executing program 5: 00:02:45 executing program 2: 00:02:45 executing program 4: 00:02:45 executing program 3: 00:02:45 executing program 1: 00:02:45 executing program 0: 00:02:45 executing program 5: 00:02:45 executing program 2: 00:02:45 executing program 3: 00:02:45 executing program 1: 00:02:45 executing program 4: 00:02:45 executing program 0: 00:02:45 executing program 2: 00:02:45 executing program 5: 00:02:45 executing program 3: 00:02:45 executing program 1: 00:02:45 executing program 0: 00:02:45 executing program 4: 00:02:45 executing program 2: 00:02:45 executing program 0: 00:02:45 executing program 5: 00:02:45 executing program 1: 00:02:45 executing program 3: 00:02:45 executing program 4: 00:02:45 executing program 2: 00:02:45 executing program 0: 00:02:45 executing program 3: 00:02:45 executing program 1: 00:02:45 executing program 2: 00:02:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x800000000000003, 0x0) ioctl$sock_ifreq(r2, 0x89f3, &(0x7f0000000000)={'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x00\x06', @ifru_data=&(0x7f00000000c0)="a325d3c91116bf66fed2b246a94500aa6593352d29be1746fd84168b6ef37b32"}) 00:02:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="a48b12f728db4b2b5d2f2fba4fad273b1ea3e46f905080af4cf9f43b1136655aae84d1d2ce90ccb15322e200000000000000960f53691a655eb6989d32772cf2eebb1f6c785d6382fa7776ea267d32109a56", 0x52}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:02:46 executing program 3: 00:02:46 executing program 2: 00:02:46 executing program 1: 00:02:46 executing program 4: 00:02:46 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mlock(&(0x7f00001d7000/0x1000)=nil, 0x1000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 00:02:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x7d) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x100000c, 0x31, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=0x8001, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bc6844e3273d26ce5e5256014b6e94e117245ea7a23d7e7efff7000000000000200000000000000000004000000000cadf00", "0ec832aa37c991831eb25895d52dc4092a46931c5c1959d6b4be05e571a62983"}) 00:02:46 executing program 5: exit(0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'syz_tun\x00'}, 0x18) pipe2(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'bpq0\x00'}, 0x18) 00:02:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f0000000040)=""/46, 0x194798ef) 00:02:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\xd8o\"\xbcQ\xefNF%\xc3\x0e\xc7_:\x0fF\x9b\x1b?\x8c\xde\xda\xdb?~\xdbw\xe84\x9f\xafEm\xfcsM\x91\x87\x8e\x00\xfb\xfa\x86\x96\x91l\xc3\xaf2\xcc\xde\x0e\x11\xed5\x9e\xd4;2\xde\x8b\xdc\'>E\xc5\xf4\xcc71~\xb5J\xa4\xa2\x91\x9fTtI\xf2\xd7\x00\xac\xeb\x18P\x01\x8d\xc2\b\xd5\xd4\xb5`9+\xa5o\xa31;\x1fN\xf2(\xfd\xeb\xfe\xbdk\xcd\xed\x10\xfb\x89\x181*\xae*.\x9eK\x86\x1a\xb1\x99\x1b\x19\xc0\xc0C\x90v\xeaR\xed\xc5\xbb') getdents(r0, &(0x7f0000000040)=""/46, 0x194798ef) getdents64(r0, 0x0, 0x0) 00:02:46 executing program 1: r0 = socket$inet(0x2, 0x100000000805, 0x0) listen(r0, 0x800000000000d111) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100), 0x1a7) [ 203.458199] IPVS: sync thread started: state = BACKUP, mcast_ifn = syz_tun, syncid = 0, id = 0 [ 203.459529] IPVS: stopping backup sync thread 7874 ... 00:02:46 executing program 3: syz_open_procfs(0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") [ 204.242081] IPVS: stopping backup sync thread 7895 ... [ 204.247563] IPVS: sync thread started: state = BACKUP, mcast_ifn = syz_tun, syncid = 0, id = 0 00:02:49 executing program 2: mmap(&(0x7f00009d4000/0x4000)=nil, 0x4000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 00:02:49 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') sendfile(r0, r1, 0x0, 0x88002) write(r0, 0x0, 0x24b) 00:02:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000040)={0x7b, 0x5, [0x560], [0xc1]}) 00:02:49 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000000080000000006"]) 00:02:49 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000200)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1}) unshare(0x40600) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="99", 0x1}], 0x1, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) dup2(r1, r0) 00:02:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000000000000001739f486a0ef063f58e57c4f3c167972fc5489a4ef75c6020d447d9d0070d52bafd9c4365dde7f3bbfcb8129a6ef0ba516b4f002e9e67ef97a9029fd336949c2aba9c74e66b880084c49dc9d0654d6538094d26a9eacb2ae39233f0494a84bee05438afb2c0c710cdaee6d1639c8a46f7f20161953d412002048bf8f117b054e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r4, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x1}], 0x1, 0x0, 0x0, 0x3}}], 0x1, 0x0) [ 206.240191] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:02:49 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0xb7}, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943", 0x59, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000280)={'\x16yz', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x17, 0xb, 0x0, "1ce71f571449ea0bc11cb83dd6621ad0dbe76da63b20d86370d495ae9e118f6bb2104a6d8922e528ed1add1f9ddde7e2f317cd67a7c5f0a9ebc1590ebccbd32b", "7b7a31ba7107dfec8cc62580cc9121ddf971f988461013c0a5751ce0330d1a5a", [0x40, 0xd70]}) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="1400001c0600"/20], 0x14}}, 0x0) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="5448b18463f7124bd8016bb9e8e6683708b28bc36e06000000000000bffaefdb0000c29ededc591a08f35891d4f1e6cc0765"], 0x14}}, 0x0) sendto$inet(r8, 0x0, 0x0, 0x80dd, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r10, 0x80003) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e20, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20}, {0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, 0x0, 0x0, 0x1, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 00:02:49 executing program 2: pipe(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xc) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80400) fstat(r3, &(0x7f0000000580)) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) perf_event_open(0x0, 0xffffffffffffffff, 0xc, r1, 0x1) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x0, 0x8}) fallocate(0xffffffffffffffff, 0x2, 0x388f2924, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/tcp6\x00') syz_genetlink_get_family_id$tipc2(0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00\xe4\xe6O\x9b4\xf4[P\x13\x80\x06\x19\x0e\x99\fMIN\xf7l\xa9A\xee\x894\r\x01_\x9f\x9b\xc2\b~\xa5\xe4\xe9\x1b4\x9a\xa8\xa9G\xf0\x0f\xf8v.\xca\xfb\xfadS\xd4\xd4\xf6zl\x18\xf1\xee:\xe0\xee\xad\xff\xa7\x97\x7fw\xb8)\xe0H\x96\x1d\x97\xefp\xa3!\xba.\xca\x15\x85 V\xd4@m\xe8O$N\xd66\xa5\xcf\x15\x13\xb8\xbb\x14B\xd9u=\xc2\xe1\xba\xa9\xae\xe8##\xc0\b\xa8#.)\xf8+\xf5i\xac\xd5\xd1g4\xbb&\xbe/,\xaan\xe8\xc5\xe2\xd9\xaf\x04\xdf\x9d[:Auc[\xaf\xe3A8s\xeasy\xa5\x83\x19A}\x8f\xae\xd8\xc1\xc2\x80-\xcb\x8f^g\xbah\'q9*\xe5-O\x98') lseek(r4, 0x0, 0x0) ioctl$RTC_WKALM_RD(r4, 0x80287010, &(0x7f0000000240)) socket$inet_tcp(0x2, 0x1, 0x0) [ 206.309025] audit: type=1400 audit(1571616169.114:47): avc: denied { prog_load } for pid=7902 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:02:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000040)={0x7b, 0x5, [0xe1], [0xc1]}) [ 206.410782] audit: type=1400 audit(1571616169.184:48): avc: denied { prog_run } for pid=7902 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:02:49 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000367fe4)=""/91, 0x275) 00:02:49 executing program 3: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x12) connect$inet6(r1, &(0x7f0000000000), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f0000000600)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty}}}, 0x108) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x5) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 00:02:49 executing program 5: 00:02:49 executing program 0: [ 206.655285] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pig=7922 comm=syz-executor.4 [ 206.687361] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=63331 sclass=netlink_route_socket pig=7922 comm=syz-executor.4 00:02:49 executing program 5: [ 206.729448] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:02:49 executing program 0: 00:02:49 executing program 5: 00:02:49 executing program 0: 00:02:49 executing program 5: [ 207.037596] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pig=7954 comm=syz-executor.4 [ 207.125207] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=63331 sclass=netlink_route_socket pig=7958 comm=syz-executor.4 [ 207.180926] audit: type=1800 audit(1571616169.984:49): pid=7955 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16568 res=0 00:02:50 executing program 4: 00:02:50 executing program 2: 00:02:50 executing program 0: 00:02:50 executing program 1: 00:02:50 executing program 5: 00:02:50 executing program 3: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x12) connect$inet6(r1, &(0x7f0000000000), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f0000000600)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty}}}, 0x108) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x5) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 00:02:50 executing program 5: 00:02:50 executing program 0: 00:02:50 executing program 4: 00:02:50 executing program 5: 00:02:50 executing program 1: 00:02:50 executing program 2: 00:02:50 executing program 0: 00:02:50 executing program 4: 00:02:50 executing program 5: 00:02:50 executing program 0: 00:02:50 executing program 2: 00:02:53 executing program 3: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x12) connect$inet6(r1, &(0x7f0000000000), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f0000000600)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty}}}, 0x108) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x5) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 00:02:53 executing program 1: 00:02:53 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8982, &(0x7f0000000040)={'\x06\x00'}) 00:02:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0xffff, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 00:02:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x4000, 0x0, 0x0, {0x0, 0x8001, 0x0, 0x51b4}, 0x0, 0x0}}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffffc) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:02:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000000)={{0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, {@dev}}, 0x44) 00:02:53 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:02:53 executing program 0: syz_open_dev$mouse(0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 00:02:53 executing program 2: 00:02:53 executing program 5: [ 210.582062] audit: type=1400 audit(1571616173.384:50): avc: denied { name_bind } for pid=8026 comm="syz-executor.1" src=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 210.643871] kvm: emulating exchange as write [ 210.670529] audit: type=1400 audit(1571616173.384:51): avc: denied { node_bind } for pid=8026 comm="syz-executor.1" src=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 210.698180] audit: type=1400 audit(1571616173.414:52): avc: denied { name_connect } for pid=8026 comm="syz-executor.1" dest=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 00:02:53 executing program 2: 00:02:53 executing program 5: 00:02:56 executing program 3: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x12) connect$inet6(r1, &(0x7f0000000000), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f0000000600)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty}}}, 0x108) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x5) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 00:02:56 executing program 0: 00:02:56 executing program 2: 00:02:56 executing program 5: 00:02:56 executing program 1: 00:02:56 executing program 4: 00:02:56 executing program 1: 00:02:56 executing program 5: 00:02:56 executing program 2: 00:02:56 executing program 4: 00:02:56 executing program 0: 00:02:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x1d, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 213.831875] can: request_module (can-proto-0) failed. [ 213.917538] can: request_module (can-proto-0) failed. 00:02:59 executing program 3: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x12) connect$inet6(r1, &(0x7f0000000000), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f0000000600)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty}}}, 0x108) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 00:02:59 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = fanotify_init(0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) listen(0xffffffffffffffff, 0x5eb857) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x5, 0x1a1000) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) fcntl$getownex(r0, 0x10, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x1c) unshare(0x2040400) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa400}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, 0x0, 0x0, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r4, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) 00:02:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x6f, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 00:02:59 executing program 2: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x11) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x7ff) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b04, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r3 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r2, r3, 0x0, 0x1) ioctl$VIDIOC_G_FBUF(r3, 0x8030560a, &(0x7f0000000000)={0x50, 0x2, &(0x7f00000000c0)="3dc91535947c6864d7602001b89db940380dd17775306da23f25d2ba29f5b6aa3ba99e7821d2a5275cf4eca71d2966e7842b31a2e379d772752201d80b7fc833cd558fb1631a4948885179ed1caa0b1a67fb2961eee18ce187fd764f46bfc096107d3c23185861c9ea49b43c99ef974ed53d81842323cf97f84a842a034e02dc02e5d545b4da179e6241c16d59d01178a7ad2622509275c5a640b965f9b802e3a96164f5db88693e6d16b328cf00e4054e07e627cabee751f889e8d1c284e583d772f41abe5e3708b4e2fe9ac4b2538c40a4d25ac1e511c95ec0fc567a", {0x5, 0x9, 0xcc25ff7455fa99f7, 0x5, 0x5, 0x6, 0xa, 0x3}}) 00:02:59 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r6 = dup2(r4, r5) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r6, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000001040)={0x1c, r7, 0x400, 0x70bd26, 0x0, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40060}, 0x10) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r7, 0x300, 0x70bd2b, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r1, r8, 0x0, 0x1) r9 = getpid() tkill(r9, 0x1000000000015) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r11 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r10, r11, 0x0, 0x1) r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r13 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r12, r13, 0x0, 0x1) r14 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r15 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r14, r15, 0x0, 0x1) clock_gettime(0x0, &(0x7f0000000240)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r8, 0xc1105517, &(0x7f0000000400)={{0xa, 0x0, 0x4, 0x80000001, 'syz0\x00', 0x8}, 0x2, 0x0, 0x2, r9, 0x8, 0x80, 'syz0\x00', &(0x7f0000000040)=['{}eth1wlan1ppp1\xb2user\x00', '\x00', '\x00', ')\x00', '\x00', ']vmnet1cpuset-self-keyring\x00', '*,![@\x00', '.\x00'], 0x3d, [], [0x85d, 0x5, 0x6, 0x6]}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x10120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:02:59 executing program 5: r0 = gettid() tgkill(r0, 0x0, 0x2000006) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000001780)='./file0\x00', 0x0, 0x92) fchdir(r1) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x0, @local, 0x80}}, [0x12, 0x0, 0x40, 0x2, 0x7fff, 0x1dad, 0x8, 0xfff, 0xad8, 0x0, 0x768, 0x4, 0x4a6, 0x3, 0x1f]}, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x8000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000280)=@assoc_value, &(0x7f00000004c0)=0x8) write(r2, &(0x7f0000000600)="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", 0x200) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) truncate(&(0x7f0000001740)='./file0\x00', 0x5) sendfile(r2, r3, 0x0, 0x7fffffa7) r4 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write(r4, &(0x7f0000000800)="220000002000070700be000009000701020000000000000000200000050013809a774902f371c8fded9993cfd89cb99b1609a388cebf6373ab93b2b69b261d9d2135daa5df337c21d54eb9a43003cec41bc86248b2a2234ed4853ef36112747e8f3c35aafed6766229679b4e17e6549340d179ab5c739255f2f5f34679fd3fe746", 0xfffffffffffffee7) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000980)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000d1d3c0ba0b63c10b2dbc3ca8dce13f5e8e130590d7e7b1e289e6792a811c6b076f372d1d15a09214ff7da2cd8863f7a30a35db06fbd8309e420a424b2d16c980eaaee3e363b3464640c5914f5d5055c65b98e99c13c083c83247e0fa78004ece0000006cfd8670a825ee92844af99bee5b451fd6c40f78547b7e020000008a3f8a0d25eda6f0287bb5369151fae5ccc7c7f80ea949abec9921aa1dc34973fa10fc12112ce074ee5eeb4567397a0e12160654a4d2a590c722370c77c5cf0062bde6053d5873f55bf3c00288743e11516bef239b0221e5f9143925d0c832d111ca72547dcd33137a428025d6f52263b76bb6e4788078c94b76390eb776a2ad3bff5f6e1accf6b297b84fd7113974db9fac96072a362342262b2e83c4b99b4f4c2f84fe151a09609f12da24d49dc0d1c28800e3c26b8e34c2f97c5b10b0c830d51feaa1fcf96700cf66c5925b14f82fa187c2203058c9"]) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f00000008c0)={{0x7, 0x81, 0x0, 0x9, 0x7f, 0xef}, 0x7fffffff, 0x40, 0x3, 0x4, 0x1, "1c0441abe8d67cbf5b62d74dafa29b5b6cd66651809531fb64967802e85850a80f0de5343ab4a33a3c9a12b01dbace58e373d24c78fb1834c9c154e59b85f91b3984221e1290034070000736d7110e0bd9743b57a8107c386b4d727c4ed38f4c5cdde784d474dbc549d3f50b281d78c3ab9d9f4b60ef164ba95efdf48395787a"}) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r9 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$chown(0x4, r9, r7, 0x0) r10 = request_key(&(0x7f0000000300)='cifs.idmap\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)='\x00', r8) r11 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r13 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'s\a\x00', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r13, r12, 0x0) keyctl$search(0xa, r10, &(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={'syz', 0x3}, r13) read(r6, &(0x7f0000000b00)=""/74, 0xfffffffffffffde3) [ 216.602711] audit: type=1800 audit(1571616179.404:53): pid=8097 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16621 res=0 [ 216.658145] bond0: Releasing backup interface bond_slave_1 00:02:59 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff}, 0x188c00) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @ib={0x1b, 0x1, 0xffff, {"594bac3b537653aa7cede84fd36d321f"}, 0x8, 0x1, 0x5}}}, 0x90) fsetxattr$security_ima(r1, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0x9, "79cde3324c"}, 0x7, 0x3) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 216.738453] audit: type=1804 audit(1571616179.404:54): pid=8097 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir838187052/syzkaller.o6JgP4/26/file0/file0" dev="sda1" ino=16621 res=1 [ 216.805700] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 00:02:59 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x805, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000000)) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff2d8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 216.900828] audit: type=1804 audit(1571616179.534:55): pid=8084 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir838187052/syzkaller.o6JgP4/26/file0/file0" dev="sda1" ino=16621 res=1 [ 216.977989] audit: type=1804 audit(1571616179.644:56): pid=8097 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir838187052/syzkaller.o6JgP4/26/file0/file0" dev="sda1" ino=16621 res=1 [ 217.163656] input: syz1 as /devices/virtual/input/input5 [ 217.364589] input: syz1 as /devices/virtual/input/input6 00:03:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000001380)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf32(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="11"], 0x1) close(r3) ftruncate(r2, 0x2081ff) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x8, &(0x7f0000000180)=0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x46600) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r7 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r6, r7, 0x0, 0x1) ioctl$VHOST_VSOCK_SET_GUEST_CID(r7, 0x4008af60, &(0x7f0000000000)) io_submit(r5, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) [ 217.589278] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 00:03:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000090000003c00030014000600ff0200000000000000000000000000010800030000000000140002007663616e3000000000000000000000000800010002000000"], 0x50}}, 0x0) [ 217.892216] device 0 entered promiscuous mode 00:03:00 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xffffffffffffff7a}], 0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x3f, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) [ 217.943116] device 1 entered promiscuous mode 00:03:00 executing program 2: mlockall(0x5) ioperm(0x0, 0x65, 0x0) clone(0x1100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:03:02 executing program 3: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x12) connect$inet6(r1, &(0x7f0000000000), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f0000000600)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty}}}, 0x108) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 00:03:02 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000040), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') getsockopt$bt_hci(r2, 0x0, 0x1, &(0x7f0000000080)=""/169, &(0x7f0000000140)=0xa9) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r2, r3, 0x0, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r3, 0x40405515, &(0x7f0000000000)={0x7, 0x2, 0x8, 0xfffffa25, 'syz1\x00', 0x94}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:03:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = getpid() tkill(r1, 0x1000000000015) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000040)) r4 = getpid() tkill(r4, 0x1000000000015) write$cgroup_pid(r0, &(0x7f0000000080)=r4, 0x9) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 00:03:02 executing program 2: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000003c0)='./file0\x00') r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xffffffff80000001, 0x200000) connect$vsock_stream(r2, &(0x7f0000000240)={0x28, 0x0, 0x2711, @host}, 0x10) 00:03:02 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r4 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r3, r4, 0x0, 0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000001d000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000140)="66470f61a1faffffff660fc777a5263e366566430fd5bdde000000c4e2c907b5060000006744f4440f20c03507000000440f22c066ba200066edf30fc7b0b3000000c4e1e9de73000f01c4", 0x4b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000004c0)={[0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5e, 0x4], 0x1f004, 0x401}) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 00:03:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x6ffe39bcc3863c8) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 00:03:02 executing program 0: socket$bt_rfcomm(0x1f, 0x1, 0x3) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe52, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1400000022000104000000a6000000001e0000008f139814a2b0bf0b6511932bfa21a9ba617b5f6d34b71406822da78af61121be129ca86ecd55927a3d6d4ee9a5910000000000000010"], 0x14}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@delsa={0x28, 0x11, 0x1, 0x0, 0x0, {@in6=@loopback, 0x0, 0x0, 0x33}}, 0x28}, 0x8, 0x0, 0x0, 0x20000814}, 0x0) 00:03:02 executing program 2: request_key(0x0, 0x0, &(0x7f0000000180)='usercpusetGPL\x00', 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r0, r1, 0x0, 0x1) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f0000000100)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r3 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') signalfd(r1, &(0x7f0000000140)={0xcc1}, 0x8) sendfile(r2, r3, 0x0, 0x1) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201fdffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 00:03:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000004c0)='nv\x00', 0x270) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r4, r3, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r6) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000080)={{}, {}, [{0x2, 0x1, r3}], {0x4, 0x7}, [{0x8, 0x8, r6}], {0x10, 0x2}, {0x20, 0x3}}, 0x34, 0x7) [ 219.976360] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 220.086502] loop2: p1 p2[EZD] p3 p4 [ 220.110830] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 220.137517] loop2: p3 size 1912633224 extends beyond EOD, truncated 00:03:03 executing program 3: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x12) connect$inet6(r1, &(0x7f0000000000), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f0000000600)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty}}}, 0x108) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 220.184762] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 00:03:03 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) chdir(&(0x7f0000000000)='./file0\x00') write$P9_RREADDIR(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00'], 0x1) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x18180, 0x0) ioctl$KVM_GET_ONE_REG(r3, 0x4010aeab, &(0x7f00000000c0)={0x1, 0x3ff}) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fc000000) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 220.369572] loop2: p1 p2[EZD] p3 p4 [ 220.389683] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 220.400287] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 220.426038] loop2: p3 size 1912633224 extends beyond EOD, truncated 00:03:03 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) write$UHID_INPUT2(r1, &(0x7f0000000240)={0xc, 0x1, 'r'}, 0x7) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r3 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r2, &(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, r3) r4 = add_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="cdb7f1d29063c65bbd0c82c174c1c2771240062cbca3b3f4bd7cc2b20bfc562a4c89", 0x22, r2) keyctl$KEYCTL_PKEY_QUERY(0x18, r4, 0x0, &(0x7f00000001c0)='/dev/ion\x00', &(0x7f0000000200)) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000000)=""/59, 0x3b}], 0x1, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x9, 0x1}) 00:03:03 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000780)=[{{&(0x7f00000002c0)=@ax25={{0x3, @netrom}, [@default, @default, @remote, @default, @bcast, @null, @null]}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000540)=""/110, 0x6e}, {&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000700)=""/126, 0x7e}], 0x1000000000000137, 0x0, 0x4c0}, 0x8}], 0x1, 0x0, 0x0) pipe(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x160) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000180)=0x0) io_submit(r4, 0xc3, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f00000001c0)="1000004004ffffffffff600000000000b22025285db74192e7576d9062ec6e2fe8ffff3ff248691861d03a71091d334252afb1af5b8f0274c2ed58338226131291198f3d70dcf797ac42d0eeed042c06b56b89f02f92b12ebe4c45948a362a76def2f4955f100a13131f474b140942110257e173cea102775e1b3873ebf98dac6421f6d449544114b8ce29f4b48d1738b5be127a96f24c9d3c130e1a6c2eb5b3f12eb6a1f5051594545cbb895e65d83c08d2d6cd56694e5a6c00f54aceaf498f57b2a56634a23ae7", 0x40000010}]) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x44db, 0x165, 0x7fffffff, 0x200, 0x1, 0x1}, 0x3c) r6 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x0, 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) io_submit(r4, 0x3, &(0x7f0000000500)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x8000, r5, &(0x7f00000000c0)="82ea034aead64156314ca5f7d7e5650e04f1bd34cf681804dd6f9c4d5cbb68f82c9bb73e070eca12a81fce3e536f6a4189726f223f222080db944fbe7d586966beb419728611c748762137bfb40825fe449e3a51faf2294861159023e69ea6463f763c372ce1abee66855a5227ba189c2db75cac87724bf3b4f6a57f5dfb14cc749f642e835d2f3e9ba78fc0029139731b3ffa463a687cbb3e177d908fabd8a64ea4aabe8d7bd1203ad8852e0e7027907a03970c6d24c7f1650cdbbaa1e7a5e082d3ed2c2c95ecdb910e8136fb29553670906e4d8451bbc3ec", 0xd9, 0xdf6, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x1f, 0xffffffffffffffff, &(0x7f0000000340)="f786229b6a24b14bda90873d54d1e09c155af4a50676a938f901895ffb9d7b147e34a0573d009f17aaee08644ae98d4d8bb753c059e24eea9b2479eadd045d17bf056beceb8b59995c65dff4e3dfa103742098c0edf820234f507a2fad1b7cba689ca9e4ccdc09332db0a2359ff7b6b5f3738c4ce7c5ca6b3623ea7a9da88c0eb316083618fadcc28354ee785fdc88d4d2d668110363ab", 0x97, 0x800, 0x0, 0x3, r6}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, &(0x7f0000000440)="48281bfb1e9ae08276edb38a960355f7027a2ab3d6b099d1a0bc9fb3b8043e941ded9ce3d010029bfa3f904449b4b863f0ec08acc8b637f6795e", 0x3a, 0x1, 0x0, 0x3, r9}]) io_destroy(r4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r10 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r10, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) ioctl$KVM_RUN(r10, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) ioctl$KVM_RUN(r10, 0xae80, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 00:03:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f00000000c0)="3aaab257007f0b07efe54c89033856e46d089921") ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000040)=0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x12, &(0x7f0000000080)=""/59, &(0x7f0000000100)=0x3b) perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x6b, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8100, 0x10000, 0x0, 0x1, 0x0, 0xfffffffb}, r3, 0x0, r1, 0x0) ioctl$TIOCCONS(r1, 0x541d) bind$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$PIO_UNISCRNMAP(r5, 0x4b6a, &(0x7f00000000c0)="3aaab257007f0b07efe54c89033856e46d08") getsockopt$inet_tcp_buf(r4, 0x6, 0x0, &(0x7f0000000080)=""/59, &(0x7f0000000100)=0x3b) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x6b, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1a6, 0x10000, 0x0, 0x1}, 0x0, 0x0, r4, 0x0) ioctl$PIO_CMAP(r4, 0x4b71, 0x0) writev(r0, &(0x7f0000001380)=[{&(0x7f0000001100)="d2", 0x1}], 0x1) recvmmsg(r0, &(0x7f0000000300), 0x40000000000049e, 0x1000000000fe, 0x0) [ 220.680076] audit: type=1400 audit(1571616183.484:57): avc: denied { map_create } for pid=8212 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:03:05 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x2) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x2000000) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x1000000000e2) accept4$unix(r2, &(0x7f0000000080), &(0x7f0000000140)=0x6e, 0x0) 00:03:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x840c2, 0x12) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x0, r0}) socketpair(0x2, 0x80000, 0x3, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() tkill(r3, 0x1000000000015) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000300)={{0x2, 0x4, 0x1f, 0x8, '\x00', 0xc6}, 0x5, 0x410, 0x1, r3, 0x1, 0x40, 'syz1\x00', &(0x7f00000001c0)=['vfat\x00'], 0x5, [], [0xf21f, 0x800, 0x1ff, 0x2]}) getsockopt$inet_tcp_int(r2, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) statfs(&(0x7f0000000280)='./file0\x00', 0x0) write(r1, 0x0, 0x0) 00:03:05 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x80000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x8, 0xbc, 0x7f, 0x0, 0x9}, 0x14) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000240)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000000)={0x8, 0xff80, 0x9, 0x3, 0x1b, 0xf2, 0x8, 0x8, 0x0, 0xcb}) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c00000010003b0e040001000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c001200f1000100626f6e64000000000c00020008000c0000000000691580382412639232dbd7bb21d36c3809f00a52f892c390c3c88a8812a98de155c88ab88b7b78d7378adba086b2107b13eb2e63def055bc7741060ebeda3182f854be886c9e9c044b18efc9dd5be9779a82f6c07e3c3f982e7c4b2345c9795e06779274ed0548c3884ef3df8760ae01"], 0x3c}}, 0x0) 00:03:05 executing program 3: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x12) connect$inet6(r1, &(0x7f0000000000), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f0000000600)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty}}}, 0x108) tkill(r2, 0x5) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 00:03:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000440)={0x2, 0x1}, 0xc) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000040)={0x7, {{0xa, 0x4e24, 0xfff, @mcast1, 0x2}}}, 0x88) 00:03:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000115000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f000048c000/0x1000)=nil) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_mreqn(r5, 0x0, 0x59, &(0x7f0000000040)={@rand_addr, @local, 0x0}, &(0x7f0000000080)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xe8) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r9 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r8, r9, 0x0, 0x1) r10 = fcntl$dupfd(r8, 0x0, 0xffffffffffffffff) r11 = syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r11, 0x200, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) sendmsg$NET_DM_CMD_STOP(r10, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x14, r11, 0x8, 0x70bd28, 0x25dfdbfc, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in=@remote, @in6=@ipv4={[], [], @local}, 0x4e20, 0x1, 0x4e23, 0x4, 0xa, 0xa0, 0xc0, 0x23, r6, r7}, {0x0, 0x4, 0xffffffff, 0x8, 0x54de, 0x3, 0x9, 0x6}, {0x40000000000000, 0x70000000, 0xfffffffffffffffc, 0x3}, 0x10001, 0x6e6bb7, 0x2, 0x0, 0x2, 0x2}, {{@in6=@mcast1, 0x4d2, 0x32}, 0xa, @in=@broadcast, 0x3503, 0x3, 0x2, 0xf9, 0x7ff, 0x1, 0x62}}, 0xe8) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r12, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r13, @ANYBLOB="01012d65f7e8f2911258e8b2e627cf55e68f881db5bfd801a76c348932307c69b737b30e05dd7428f7b0cd59393e4fd1fb5083"], 0x14}}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xffffffffffffff17, &(0x7f0000000400)={&(0x7f0000000340)={0x88, r13, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5d7}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_ADDR={0x7ff, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x800}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1f}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000080}, 0x4046800) read$char_usb(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r14 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r14, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0}}], 0x4000000000000d0, 0x0) [ 222.744945] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 00:03:05 executing program 4: seccomp(0x1, 0x0, &(0x7f00000005c0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x100000000000001}, {}, {0x6, 0x0, 0x0, 0x7fffffff}]}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) futex(&(0x7f0000000000)=0x2, 0x9, 0x0, &(0x7f00000000c0)={r0, r1+10000000}, &(0x7f0000000100)=0x2, 0x2) [ 222.778378] audit: type=1800 audit(1571616185.584:58): pid=8233 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=3 res=0 [ 222.809629] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=8249 comm=syz-executor.1 [ 222.917311] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=8249 comm=syz-executor.1 00:03:05 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffffff1f0600000020000000a400000000000000a4000000000000000000", 0xffffffe5}], 0x2) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x80000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r3 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r2, r3, 0x0, 0x1) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r5 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r4, r5, 0x0, 0x1) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f00000000c0)={0x6, r4, 0x1}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r6, &(0x7f0000000140)={0x40000000}) 00:03:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r3 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r2, r3, 0x0, 0x1) getsockopt$rose(r2, 0x104, 0x0, &(0x7f0000000100), &(0x7f0000000200)=0x4) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x80, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r6 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r5, r6, 0x0, 0x1) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r6, 0xc008551a, &(0x7f00000001c0)={0x3f, 0xc, [0x8, 0x6, 0x4]}) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100636273001c65020018000100020000000000000000000000000000000000000050bc920e5d4d1a1532195cf292b5c20aab9ad755ff8302a395c30e71d585c6fb266ab352c06395578317fdab2bc88b23e2142a59e6daedd5cc9bafb3c34ac3fdf765805fdd320977b2ca1ef332d32dd51eb87c47512d503217d478e13b1b9104c3ed97c727518e805a6c2eb069f2f682adcb6c5c589f446da10a05596c3df6bb3b"], 0x48}}, 0x0) [ 223.051507] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 00:03:05 executing program 3: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x12) connect$inet6(r1, &(0x7f0000000000), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f0000000600)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty}}}, 0x108) tkill(r2, 0x5) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 00:03:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000100)) ptrace(0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x59d0863404f7dd9a, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x3f000000, 0x4004400}) [ 223.230036] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 223.255213] kasan: CONFIG_KASAN_INLINE enabled [ 223.260467] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 223.268012] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 223.274274] CPU: 1 PID: 8269 Comm: syz-executor.1 Not tainted 4.19.80 #0 [ 223.281123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.290888] RIP: 0010:hrtimer_active+0x11e/0x230 [ 223.295839] Code: 48 39 c3 0f 84 d3 00 00 00 e8 2e 22 0f 00 48 8b 45 c8 80 38 00 0f 85 06 01 00 00 49 8b 5d 30 4c 8d 63 10 4c 89 e0 48 c1 e8 03 <42> 0f b6 14 38 4c 89 e0 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 [ 223.314766] RSP: 0018:ffff88804dd77350 EFLAGS: 00010202 [ 223.320123] RAX: 0000000000000002 RBX: 0000000000000000 RCX: ffffc90008080000 [ 223.327383] RDX: 000000000000c258 RSI: ffffffff815ba512 RDI: ffff88807ae90300 [ 223.334642] RBP: ffff88804dd773a8 R08: ffff8880502a6380 R09: 0000000000000000 [ 223.341901] R10: ffffed100f5d2014 R11: ffff88807ae900a7 R12: 0000000000000010 [ 223.349159] R13: ffff88807ae90300 R14: ffff8880a8420c80 R15: dffffc0000000000 [ 223.356417] FS: 00007f4fdcff7700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 223.364630] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 223.370501] CR2: 000000000075c000 CR3: 000000009e064000 CR4: 00000000001406e0 [ 223.377761] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 223.385035] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 223.392291] Call Trace: [ 223.394892] hrtimer_try_to_cancel+0x74/0x5b0 [ 223.399390] ? hrtimer_run_softirq+0x270/0x270 [ 223.403974] ? __lock_is_held+0xb6/0x140 [ 223.408026] hrtimer_cancel+0x20/0x40 [ 223.411819] qdisc_watchdog_cancel+0x16/0x20 [ 223.416218] cbs_destroy+0x5e/0xd0 [ 223.419751] ? cbs_dequeue_soft+0x400/0x400 [ 223.424064] qdisc_create+0xaa6/0x1230 [ 223.427947] ? tc_get_qdisc+0xbb0/0xbb0 [ 223.431914] ? nla_parse+0x1fc/0x2f0 [ 223.435616] tc_modify_qdisc+0x51b/0x1bdc [ 223.439760] ? qdisc_create+0x1230/0x1230 [ 223.443903] ? find_held_lock+0x35/0x130 [ 223.447961] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 223.453488] ? qdisc_create+0x1230/0x1230 [ 223.457641] rtnetlink_rcv_msg+0x463/0xb00 [ 223.461873] ? rtnetlink_put_metrics+0x560/0x560 [ 223.466620] ? netdev_pick_tx+0x300/0x300 [ 223.470798] ? netlink_deliver_tap+0x22d/0xc20 [ 223.475380] ? find_held_lock+0x35/0x130 [ 223.479437] netlink_rcv_skb+0x17d/0x460 [ 223.483491] ? rtnetlink_put_metrics+0x560/0x560 [ 223.488241] ? netlink_ack+0xb30/0xb30 [ 223.492119] ? kasan_check_read+0x11/0x20 [ 223.496260] ? netlink_deliver_tap+0x254/0xc20 [ 223.500834] rtnetlink_rcv+0x1d/0x30 [ 223.504536] netlink_unicast+0x537/0x720 [ 223.508589] ? netlink_attachskb+0x770/0x770 [ 223.512987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 223.519389] netlink_sendmsg+0x8ae/0xd70 [ 223.523444] ? netlink_unicast+0x720/0x720 [ 223.527683] ? selinux_socket_sendmsg+0x36/0x40 [ 223.532340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 223.537895] ? security_socket_sendmsg+0x8d/0xc0 [ 223.542663] ? netlink_unicast+0x720/0x720 [ 223.546893] sock_sendmsg+0xd7/0x130 [ 223.550613] ___sys_sendmsg+0x803/0x920 [ 223.554574] ? copy_msghdr_from_user+0x430/0x430 [ 223.559320] ? lock_downgrade+0x880/0x880 [ 223.563459] ? kasan_check_read+0x11/0x20 [ 223.567600] ? __fget+0x367/0x540 [ 223.571047] ? iterate_fd+0x360/0x360 [ 223.574836] ? lock_downgrade+0x880/0x880 [ 223.578978] ? __fget_light+0x1a9/0x230 [ 223.582943] ? __fdget+0x1b/0x20 [ 223.586313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 223.591864] __sys_sendmsg+0x105/0x1d0 [ 223.595763] ? __ia32_sys_shutdown+0x80/0x80 [ 223.600169] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 223.604913] ? do_syscall_64+0x26/0x620 [ 223.608878] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 223.614233] ? do_syscall_64+0x26/0x620 [ 223.618196] __x64_sys_sendmsg+0x78/0xb0 [ 223.622247] do_syscall_64+0xfd/0x620 [ 223.626038] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 223.631217] RIP: 0033:0x459a59 [ 223.634414] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 223.653403] RSP: 002b:00007f4fdcff6c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 223.661116] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 223.668377] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 00:03:06 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000080)={0x0, 0x332, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000180007041dfffd946f6105000a00000a1f000007000f08000800084004000304280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_BASE(r4, 0x4008af12, &(0x7f0000000000)={0x8a7282d8670b8daf, 0xfffffc00}) [ 223.675725] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 223.682984] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fdcff76d4 [ 223.690263] R13: 00000000004c7c0c R14: 00000000004ddad8 R15: 00000000ffffffff [ 223.697619] Modules linked in: [ 223.707558] ---[ end trace 9b30462bd67220f2 ]--- [ 223.714732] RIP: 0010:hrtimer_active+0x11e/0x230 [ 223.723381] kobject: 'loop4' (000000000b48d016): kobject_uevent_env [ 223.734146] kobject: 'loop4' (000000000b48d016): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 223.747951] Code: 48 39 c3 0f 84 d3 00 00 00 e8 2e 22 0f 00 48 8b 45 c8 80 38 00 0f 85 06 01 00 00 49 8b 5d 30 4c 8d 63 10 4c 89 e0 48 c1 e8 03 <42> 0f b6 14 38 4c 89 e0 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 [ 223.774284] RSP: 0018:ffff88804dd77350 EFLAGS: 00010202 [ 223.782294] RAX: 0000000000000002 RBX: 0000000000000000 RCX: ffffc90008080000 [ 223.801308] RDX: 000000000000c258 RSI: ffffffff815ba512 RDI: ffff88807ae90300 [ 223.811005] RBP: ffff88804dd773a8 R08: ffff8880502a6380 R09: 0000000000000000 [ 223.818694] R10: ffffed100f5d2014 R11: ffff88807ae900a7 R12: 0000000000000010 [ 223.830698] R13: ffff88807ae90300 R14: ffff8880a8420c80 R15: dffffc0000000000 [ 223.838857] FS: 00007f4fdcff7700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 223.859720] kobject: 'nullb0' (0000000073866b11): kobject_uevent_env [ 223.862320] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 223.867433] kobject: 'nullb0' (0000000073866b11): fill_kobj_path: path = '/devices/virtual/block/nullb0' [ 223.873172] CR2: 0000000000c09df8 CR3: 000000009e064000 CR4: 00000000001406f0 [ 223.904970] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 223.915481] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 223.916021] kobject: 'nullb0' (0000000073866b11): kobject_uevent_env [ 223.923252] Kernel panic - not syncing: Fatal exception [ 223.932030] kobject: 'nullb0' (0000000073866b11): fill_kobj_path: path = '/devices/virtual/block/nullb0' [ 223.938366] Kernel Offset: disabled [ 223.959832] Rebooting in 86400 seconds..