[ 36.468693] audit: type=1800 audit(1569835397.629:32): pid=7324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 37.295752] audit: type=1800 audit(1569835398.529:33): pid=7324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.2' (ECDSA) to the list of known hosts. 2019/09/30 09:23:26 fuzzer started syzkaller login: [ 45.595049] kauditd_printk_skb: 2 callbacks suppressed [ 45.595063] audit: type=1400 audit(1569835406.829:36): avc: denied { map } for pid=7509 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/09/30 09:23:28 dialing manager at 10.128.0.105:33829 2019/09/30 09:23:28 syscalls: 2489 2019/09/30 09:23:28 code coverage: enabled 2019/09/30 09:23:28 comparison tracing: enabled 2019/09/30 09:23:28 extra coverage: extra coverage is not supported by the kernel 2019/09/30 09:23:28 setuid sandbox: enabled 2019/09/30 09:23:28 namespace sandbox: enabled 2019/09/30 09:23:28 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/30 09:23:28 fault injection: enabled 2019/09/30 09:23:28 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/30 09:23:28 net packet injection: enabled 2019/09/30 09:23:28 net device setup: enabled 09:26:26 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x0, 0x0, 0x1a6}}], 0x4000000000000f6, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) [ 224.911632] audit: type=1400 audit(1569835586.149:37): avc: denied { map } for pid=7527 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14977 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 225.031202] IPVS: ftp: loaded support on port[0] = 21 09:26:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xff7d) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000080)="b9f0080000b8f9000000ba000000000f30b9800000c00f3235008000000f3067360f01c32e3e0f79350000000066b88a008ee86d0f72f71c6626f36e360f788fb3000000f4", 0x45}], 0xaaaaaaaaaaaaa01, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 225.172380] chnl_net:caif_netlink_parms(): no params data found [ 225.242577] IPVS: ftp: loaded support on port[0] = 21 [ 225.256264] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.269554] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.277248] device bridge_slave_0 entered promiscuous mode 09:26:26 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000200)={{0x9, 0x9}, {0x2, 0x100}, 0x7fff, 0x3, 0x9}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r3 = accept(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000005c0)=""/77) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8000000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r4, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000]}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r6 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r6, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40505330, &(0x7f0000000140)={{}, {0x20000000000080}, 0x0, 0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) fcntl$getownex(r7, 0x10, &(0x7f00000012c0)={0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) r10 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={r8, r9, r10}, 0xc) getuid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) fcntl$getownex(r11, 0x10, &(0x7f00000012c0)={0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) r14 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={r12, r13, r14}, 0xc) fstat(r2, &(0x7f0000000300)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) fcntl$getownex(r15, 0x10, &(0x7f00000012c0)={0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) r18 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={r16, r17, r18}, 0xc) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) r20 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={0x0, r19, r20}, 0xc) getgid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) fcntl$getownex(r21, 0x10, &(0x7f00000012c0)) getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000001240)) getgid() getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000001240)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), 0xc) [ 225.299546] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.306007] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.319566] device bridge_slave_1 entered promiscuous mode [ 225.388264] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 225.410633] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 225.483319] IPVS: ftp: loaded support on port[0] = 21 [ 225.489867] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.497559] team0: Port device team_slave_0 added 09:26:26 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92f2, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8001103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf24cb08948dd94ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x6c102, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="afa6d9dbf025faeae83b657c24d55953e90019f4027f9e02ffd36725a2e7d4be4479500dc3db0729910f21e36bf8ae7021f36a76cf42f734f2", 0x39}, {0x0}, {&(0x7f0000000040)="38bead979bda2bea18ecd6b1fc4cbf74d51c5a93871a4ce813ad98c4", 0x1c}, {0x0}], 0x4, 0x2) mkdirat(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000280)=ANY=[@ANYBLOB="0800f6878b1d00"/16]) [ 225.525260] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.535148] team0: Port device team_slave_1 added [ 225.560846] chnl_net:caif_netlink_parms(): no params data found [ 225.572548] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 225.584352] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.680762] device hsr_slave_0 entered promiscuous mode [ 225.718100] device hsr_slave_1 entered promiscuous mode 09:26:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, 0x0) [ 225.783636] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 225.822061] IPVS: ftp: loaded support on port[0] = 21 [ 225.830179] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 225.837189] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.851517] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.861927] device bridge_slave_0 entered promiscuous mode [ 225.913277] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.923002] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.940651] device bridge_slave_1 entered promiscuous mode 09:26:27 executing program 5: mkdirat(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8002) pipe(0x0) prctl$PR_SET_FPEXC(0xc, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x0, 0x0, 0x1a6}}], 0x4000000000000f6, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x80, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) fcntl$addseals(0xffffffffffffffff, 0x409, 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) [ 225.977331] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.983902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.991010] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.997392] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.035635] chnl_net:caif_netlink_parms(): no params data found [ 226.062316] IPVS: ftp: loaded support on port[0] = 21 [ 226.102956] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 226.116053] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 226.175985] IPVS: ftp: loaded support on port[0] = 21 [ 226.195900] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 226.203637] team0: Port device team_slave_0 added [ 226.209543] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 226.216828] team0: Port device team_slave_1 added [ 226.235716] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.242283] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.249315] device bridge_slave_0 entered promiscuous mode [ 226.256976] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.264363] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.275793] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 226.290498] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.296911] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.304231] device bridge_slave_1 entered promiscuous mode [ 226.322676] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 226.389569] device hsr_slave_0 entered promiscuous mode [ 226.428128] device hsr_slave_1 entered promiscuous mode [ 226.478438] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 226.486290] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 226.495914] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 226.506649] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 226.526716] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 226.535173] team0: Port device team_slave_0 added [ 226.542837] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 226.550913] team0: Port device team_slave_1 added [ 226.559853] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 226.580037] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 226.621323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.702763] device hsr_slave_0 entered promiscuous mode [ 226.748407] device hsr_slave_1 entered promiscuous mode [ 226.788624] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 226.811599] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 226.819690] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 226.827399] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 226.836942] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 226.850259] chnl_net:caif_netlink_parms(): no params data found [ 226.864344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.871990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.879535] chnl_net:caif_netlink_parms(): no params data found [ 226.913152] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 226.919513] 8021q: adding VLAN 0 to HW filter on device team0 [ 226.935188] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.942938] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.949986] device bridge_slave_0 entered promiscuous mode [ 226.971178] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.977615] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.986291] device bridge_slave_1 entered promiscuous mode [ 226.994209] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 227.010147] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 227.018602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.029043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.036922] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.043306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.082750] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.097669] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 227.124777] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 227.140950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.149386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.156936] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.163326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.172609] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 227.185417] chnl_net:caif_netlink_parms(): no params data found [ 227.196110] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.203321] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.210835] device bridge_slave_0 entered promiscuous mode [ 227.226042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 227.252484] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.259028] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.265945] device bridge_slave_1 entered promiscuous mode [ 227.284902] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 227.293205] team0: Port device team_slave_0 added [ 227.313183] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 227.321416] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.331791] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.339838] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 227.347012] team0: Port device team_slave_1 added [ 227.357877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 227.371558] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 227.382439] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 227.389534] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 227.406824] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 227.415874] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 227.429324] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 227.436586] team0: Port device team_slave_0 added [ 227.443308] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.450365] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.457325] device bridge_slave_0 entered promiscuous mode [ 227.464668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 227.472664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.480338] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 227.493645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.501456] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 227.509630] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 227.522676] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 227.530665] team0: Port device team_slave_1 added [ 227.536161] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 227.543617] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.550307] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.557264] device bridge_slave_1 entered promiscuous mode [ 227.564216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 227.572335] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.580201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.587154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.595729] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 227.611481] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 227.620418] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 227.635154] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 227.641581] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.648241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 227.655746] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 227.700881] device hsr_slave_0 entered promiscuous mode [ 227.758220] device hsr_slave_1 entered promiscuous mode [ 227.879667] device hsr_slave_0 entered promiscuous mode [ 227.918120] device hsr_slave_1 entered promiscuous mode [ 227.958880] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 227.965902] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 227.978657] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 227.985938] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.996696] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 228.004414] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 228.013858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.021722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.029397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.036309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.043736] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 228.052622] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 228.058941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.068940] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 228.084395] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 228.104727] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 228.112766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.120748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.128659] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.135013] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.142915] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 228.152091] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.163109] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 228.169912] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 228.177160] team0: Port device team_slave_0 added [ 228.183554] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 228.191151] team0: Port device team_slave_1 added [ 228.198469] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.207693] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 228.216529] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 228.225079] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 228.235114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.243207] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.251273] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.257601] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.265832] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 228.277478] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 228.310206] device hsr_slave_0 entered promiscuous mode [ 228.348142] device hsr_slave_1 entered promiscuous mode [ 228.388830] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 228.396384] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 228.407552] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.415627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.423612] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.430018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.437360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.449693] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 228.456693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.470637] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 228.470978] audit: type=1400 audit(1569835589.709:38): avc: denied { associate } for pid=7528 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 228.521623] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 228.535513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.544993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.553305] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.559735] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.574896] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 228.585680] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 228.593985] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 228.617259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.626443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.640173] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.653372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.663058] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.676286] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 228.687649] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.696393] hrtimer: interrupt took 25155 ns [ 228.703722] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 228.715018] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 228.722432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.733517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.744464] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.758989] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 228.776977] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 228.785760] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 228.799269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.812727] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.822279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.833656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 09:26:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x0, 0x0, 0x1a6}}], 0x4000000000000f6, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) [ 228.844354] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.859499] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 228.867552] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 228.883556] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 228.904091] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.917380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.932105] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.941975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.954045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.964114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.975599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.987433] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 228.999622] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.010576] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 229.028664] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 229.034794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 09:26:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xd, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) [ 229.050076] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 229.057450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.071836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.084312] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 229.096308] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 229.120828] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.137007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.148354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:26:30 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='tmpfs\x00', 0x0, 0x0) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='user.syz\x00') [ 229.157399] audit: type=1400 audit(1569835590.389:39): avc: denied { prog_load } for pid=7557 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 229.181176] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.187572] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.195039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.203723] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 09:26:30 executing program 0: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r3, &(0x7f0000000040), 0xe) listen(r3, 0x0) poll(&(0x7f0000000300)=[{r3}, {r2}], 0x2, 0x0) [ 229.225492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.233186] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.240517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.253048] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 229.260820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.272993] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 229.279335] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.289656] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 229.301710] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 229.313055] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 229.332746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.348281] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.356251] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.362748] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.370043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.378094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.385664] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.392075] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.402301] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 229.413777] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.425198] 8021q: adding VLAN 0 to HW filter on device bond0 09:26:30 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000340)='/dev/binder#\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000004c0)={0x4c, 0x0, &(0x7f00000005c0)=[@reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) [ 229.432823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.448563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 229.459010] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 229.479662] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 229.488563] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 229.503280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.518312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.526450] bridge0: port 2(bridge_slave_1) entered blocking state 09:26:30 executing program 0: unshare(0x14010000) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') [ 229.533341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.557404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.566526] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 229.577618] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 229.590617] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 229.600291] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.607143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 229.618648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.626629] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.635021] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 229.646477] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 229.656236] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.665965] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready 09:26:30 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000280)={@multicast2, @loopback}, 0xc) getsockopt$inet_mreqn(r0, 0x0, 0x3, 0x0, &(0x7f0000000000)) [ 229.680872] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 229.696399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.706200] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.715282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.728476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.735528] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.760419] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 229.777394] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 229.785128] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.800822] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 229.814215] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 229.826872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.835711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.852201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.861641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.872307] audit: type=1400 audit(1569835591.099:40): avc: denied { map_create } for pid=7587 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 229.874104] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.901628] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.916061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.924348] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.937854] audit: type=1400 audit(1569835591.139:41): avc: denied { map_read map_write } for pid=7587 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 229.940760] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 229.988898] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 230.027478] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 230.045577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.055002] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 230.068677] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 230.076525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.088303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.099001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.107229] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.113839] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.127192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.138779] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 230.144899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 230.157538] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 230.182065] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 230.204108] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 230.212734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.221817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.230652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 230.239145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.246571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 09:26:31 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000200)={{0x9, 0x9}, {0x2, 0x100}, 0x7fff, 0x3, 0x9}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r3 = accept(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000005c0)=""/77) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8000000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r4, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000]}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r6 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r6, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40505330, &(0x7f0000000140)={{}, {0x20000000000080}, 0x0, 0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) fcntl$getownex(r7, 0x10, &(0x7f00000012c0)={0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) r10 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={r8, r9, r10}, 0xc) getuid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) fcntl$getownex(r11, 0x10, &(0x7f00000012c0)={0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) r14 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={r12, r13, r14}, 0xc) fstat(r2, &(0x7f0000000300)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) fcntl$getownex(r15, 0x10, &(0x7f00000012c0)={0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) r18 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={r16, r17, r18}, 0xc) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) r20 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={0x0, r19, r20}, 0xc) getgid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) fcntl$getownex(r21, 0x10, &(0x7f00000012c0)) getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000001240)) getgid() getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000001240)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), 0xc) 09:26:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x400000000080803, 0x0) write(r0, &(0x7f0000000040)="240000003a00d17da53a7436fef7001d0a0b49ffed000009000028000800030001000000", 0x24) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001680), 0x0, 0x0) [ 230.259586] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 230.266764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 230.283184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.314331] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 230.332729] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 230.355054] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 230.364203] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 230.382747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.391767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.405296] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 230.415178] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 230.423849] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 230.431569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.439866] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.462585] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 230.482150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 230.498921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.518211] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 230.532170] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 230.541704] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 230.568325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 230.576013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.594923] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 230.602642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 230.629070] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 230.641022] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 230.717350] audit: type=1400 audit(1569835591.949:42): avc: denied { create } for pid=7617 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 230.718848] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 09:26:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x1000000000000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 09:26:32 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 230.751332] audit: type=1400 audit(1569835591.949:43): avc: denied { write } for pid=7617 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 09:26:32 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) ppoll(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)={0x7}, 0x8) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0}) inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 09:26:32 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000200)={{0x9, 0x9}, {0x2, 0x100}, 0x7fff, 0x3, 0x9}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r3 = accept(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000005c0)=""/77) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8000000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r4, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000]}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r6 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r6, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40505330, &(0x7f0000000140)={{}, {0x20000000000080}, 0x0, 0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) fcntl$getownex(r7, 0x10, &(0x7f00000012c0)={0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) r10 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={r8, r9, r10}, 0xc) getuid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) fcntl$getownex(r11, 0x10, &(0x7f00000012c0)={0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) r14 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={r12, r13, r14}, 0xc) fstat(r2, &(0x7f0000000300)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) fcntl$getownex(r15, 0x10, &(0x7f00000012c0)={0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) r18 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={r16, r17, r18}, 0xc) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) r20 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={0x0, r19, r20}, 0xc) getgid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) fcntl$getownex(r21, 0x10, &(0x7f00000012c0)) getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000001240)) getgid() getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000001240)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), 0xc) 09:26:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x249, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 09:26:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='scalable\x00', 0x9) write$binfmt_elf64(r0, &(0x7f0000000a80)=ANY=[@ANYBLOB="7f454c46000000040180000000000300add2ad015e0d00c41e8161940000000000000020259eb8d19e00004008000000000000000000000800007f000000040008000000007e9f000300000004000000770000000000008104d759ade57a9715d59ce0e0a835a4d6b9fe56447cb80074f9ed4f3e449b0026d0ea4dba20c687b44020e148cfcfc1e59841d9da552401b4cbfb66eca1967585bb442e14d0acf02614d2352cffb6bb9624b482c6413c48f5e6bf889f34b0d6befa47f0a4b88c9fea473b6556b5da18d9f4"], 0xc9) sendto$inet(r0, &(0x7f00000012c0)="03", 0x1, 0x9, 0x0, 0x0) 09:26:32 executing program 1: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x12) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t5,\xffx\xf0\xde\xc4\xa8M*\xe4;~y\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_6\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x930xffffffffffffffff}) fcntl$getownex(r7, 0x10, &(0x7f00000012c0)={0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) r10 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={r8, r9, r10}, 0xc) getuid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) fcntl$getownex(r11, 0x10, &(0x7f00000012c0)={0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) r14 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={r12, r13, r14}, 0xc) fstat(r2, &(0x7f0000000300)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) fcntl$getownex(r15, 0x10, &(0x7f00000012c0)={0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) r18 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={r16, r17, r18}, 0xc) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) r20 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={0x0, r19, r20}, 0xc) getgid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) fcntl$getownex(r21, 0x10, &(0x7f00000012c0)) getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000001240)) getgid() getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000001240)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), 0xc) 09:26:32 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="0000000062b8dd", 0x7) 09:26:32 executing program 0: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}, {}], {}, [{}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 09:26:32 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = memfd_create(&(0x7f0000000080)='\xae\'\xd1\x93E=i\x86\a\xf1\x17\xfa\x861\x13uc\xb2\x06\x93i\x878\xb1\xf0\x8c\xae\xd6\xdb*\xcf7\xc7\\^\xcb(\xb1L\x1f!\x16\xd3D;\bh\xb0\xce\x15Y\x8d\x9f\xad\x87C\xc6A\x03.\xd8\nH\x9f0\x00\x00\x00\x00\x00\x00\xde+^\xc4\x90QA\x94\xda\nbS\xc8\xd5 bx\xe7\x11r@\x94\xffb0\xbe\x1e3\xc6\xab\xa8\x1b', 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)=ANY=[], 0x291) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r1, 0x0) write$P9_RWRITE(r0, &(0x7f0000000040)={0xb}, 0xb) 09:26:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x249, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) [ 231.316642] audit: type=1400 audit(1569835592.549:44): avc: denied { map } for pid=7668 comm="syz-executor.4" path=2F6D656D66643AAE27D193453D698607F117FA8631137563B20693698738B1F08CAED6DB2ACF37C75C5ECB28B14C1F2116D3443B0868B0CE15598D9FAD8743C641032ED80A489F30202864656C6574656429 dev="tmpfs" ino=28759 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 09:26:32 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x0, 0x0, 0x1a6}}], 0x4000000000000f6, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 09:26:32 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x400000000080803, 0x0) write(r0, &(0x7f0000000040)="240000003a00d17da53a7436fef7001d0a0b49ffed000009000028000800030001000000", 0x24) [ 231.512391] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 09:26:32 executing program 2: 09:26:32 executing program 5: [ 231.693295] overlayfs: filesystem on './file0' not supported as upperdir 09:26:33 executing program 4: 09:26:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f00000000c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) ppoll(&(0x7f0000000000)=[{}, {r0}, {0xffffffffffffffff, 0x4000}], 0x3, &(0x7f0000000040), &(0x7f0000000080), 0x8) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f0000000400)}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) socket$inet(0x2, 0x80001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 09:26:33 executing program 3: 09:26:33 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8001103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) setxattr(0x0, &(0x7f0000000200)=@known='system.posix_acl_access\x00', 0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 09:26:33 executing program 4: 09:26:33 executing program 1: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x12) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t5,\xffx\xf0\xde\xc4\xa8M*\xe4;~y\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_6\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x930x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) inotify_init1(0x0) ptrace$getsig(0x4202, 0x0, 0x80, &(0x7f0000000280)) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x10', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\x10rist\xe3cusgrVid:De', 0x0) 09:26:34 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) 09:26:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000440)={0x0, 0x2, 0x1, [0x2]}, 0xa) 09:26:34 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x0) 09:26:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="b40800002c000107f1ff58980000000000000000", @ANYRES32, @ANYBLOB="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"], 0x8b4}}, 0x0) 09:26:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x249, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) [ 233.338854] ptrace attach of "/root/syz-executor.0"[7528] was attempted by "/root/syz-executor.0"[7750] [ 233.365116] audit: type=1400 audit(1569835594.599:45): avc: denied { prog_run } for pid=7752 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 09:26:34 executing program 5: unshare(0x20600) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, 0x0, 0x0) [ 233.409767] ptrace attach of "/root/syz-executor.0"[7528] was attempted by "/root/syz-executor.0"[7770] 09:26:34 executing program 1: clone(0x9000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000000)='./bus\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000240)='./bus\x00', &(0x7f0000000280)='iso9660\x00', 0x0, 0x0) 09:26:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='scalable\x00', 0x9) write$binfmt_elf64(r0, &(0x7f0000000a80)=ANY=[@ANYBLOB="7f454c46000000040180000000000300add2ad015e0d00c41e8161940000000000000020259eb8d19e00004008000000000000000000000800007f000000040008000000007e9f000300000004000000770000000000008104d759ade57a9715d59ce0e0a835a4d6b9fe56447cb80074f9ed4f3e449b0026d0ea4dba20c687b44020e148cfcfc1e59841d9da552401b4cbfb66eca1967585bb442e14d0acf02614d2352cffb6bb9624b482c6413c48f5e6bf889f34b0d6befa47f0a4b88c9fea473b6556b5da18d9f4"], 0xc9) recvmmsg(r0, &(0x7f00000085c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="03", 0x1, 0x9, 0x0, 0x0) 09:26:34 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{}, "8f2cb530c4c5131d", "3a6bc8cbf5f0c26e95c106070f435ee6", '\x00', "73d2aaccb759e14d"}, 0x28) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000040)="0c3a4553964d3357433048217a3841576838a27d40386a0c36ebc19c561cb33aae7bdb3847175973dc828c96f6b93f03652d", 0x32}, {0x0}, {&(0x7f00000002c0)="14cb491b44adebf8cc141a3de341175bee72d881cf6df8148b805dd1bd5f966241418302669be759d408d6f3a1006402f316c1d00c1ecd77ca96ab", 0x3b}, {&(0x7f0000000740)="942906", 0x3}, {&(0x7f0000000840)="c10c6febc95c30bbeead2e4d7da49b7e78ac7590963f562d4fa4a07e7474cbfed7ec748cae1bd2df5e009f792b0f46705524e729b39f7d79ef975151b776f7dd0f44a1ab5414784438a55e7bdecb54b4cbb347164216c2de910c2582fb7dec76f36fe8d04d21fdf1d0062434b9b31d1cc381fd4073a2ab9124f5c18479d4cae9d53fc5b285c9af4a897e43848e2884c34ad2dd5ef044c8ccc6beae59c298c3e3f867ac2edc19e97751d594dca725a52e23a2944724ef9aa23719a4d8669fa0b68ccdce384fbff9b036aa30de46dd3b8899b56ce9e5baa0983705f864eeb9a00b43cf98b87fb359", 0xe7}, {&(0x7f00000009c0)="f31ce82ad74ef9d70d6f8c92228a75cc940179501c814a474c25b625c6517f43621e303792121f0263d7246bda71f458b964383e40f19a2ce7240b71789d", 0x3e}], 0x6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg$inet(r0, &(0x7f0000000b40)=[{{0x0, 0x0, &(0x7f0000000980)=[{0x0}], 0x1}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 09:26:34 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 09:26:34 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000240)="8907040000", 0x5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000280)={@multicast2, @loopback}, 0xc) getsockopt$inet_mreqn(r0, 0x0, 0x3, 0x0, &(0x7f0000000000)) [ 233.564415] print_req_error: I/O error, dev loop1, sector 64 [ 233.572254] isofs_fill_super: bread failed, dev=loop1, iso_blknum=16, block=32 [ 233.584091] print_req_error: I/O error, dev loop1, sector 64 [ 233.590337] isofs_fill_super: bread failed, dev=loop1, iso_blknum=16, block=32 09:26:34 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f00000000c0)) times(0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) semget$private(0x0, 0x3, 0x23) r1 = getuid() setreuid(r1, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100)) getuid() tkill(r0, 0x1000000000016) [ 233.667410] ptrace attach of "/root/syz-executor.5"[7542] was attempted by "/root/syz-executor.5"[7795] [ 233.715785] ptrace attach of "/root/syz-executor.5"[7542] was attempted by "/root/syz-executor.5"[7795] 09:26:35 executing program 4: r0 = socket$inet(0x2, 0x3, 0x80) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @remote}, {0x1, @dev={[], 0x22}}, 0xa}) 09:26:35 executing program 0: unshare(0x14010000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, 0x0, 0x0) prctl$PR_GET_SECCOMP(0x15) rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(0x0) 09:26:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) 09:26:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 09:26:35 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x170, 0x0) 09:26:35 executing program 5: 09:26:35 executing program 5: 09:26:35 executing program 0: 09:26:35 executing program 3: 09:26:35 executing program 4: 09:26:35 executing program 0: 09:26:35 executing program 5: 09:26:35 executing program 0: 09:26:35 executing program 4: 09:26:35 executing program 5: 09:26:36 executing program 1: 09:26:36 executing program 3: 09:26:36 executing program 4: 09:26:36 executing program 5: 09:26:36 executing program 0: 09:26:36 executing program 2: 09:26:36 executing program 0: 09:26:36 executing program 5: 09:26:36 executing program 2: 09:26:36 executing program 4: 09:26:36 executing program 3: 09:26:36 executing program 1: 09:26:36 executing program 2: 09:26:36 executing program 0: 09:26:36 executing program 4: 09:26:36 executing program 5: 09:26:36 executing program 1: 09:26:36 executing program 3: 09:26:36 executing program 0: 09:26:36 executing program 4: 09:26:36 executing program 2: pipe(&(0x7f0000000680)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000000)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfeac) pipe(&(0x7f0000000080)) r3 = socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x20000000010005, 0x0) open(&(0x7f0000000540)='./bus\x00', 0x100, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe2(&(0x7f00000001c0), 0x80000) creat(&(0x7f0000000400)='./file0\x00', 0xbdb5d3710f2144a0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x5, 0x0, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x5) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') unlinkat(r6, &(0x7f0000000100)='./bus\x00', 0xd2607ddf1aa24bdd) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d353ff072d68b2e4dc14aa5fa8b3d94c22") fcntl$addseals(0xffffffffffffffff, 0x409, 0xd) mknod(&(0x7f0000000080)='./bus\x00', 0xa88, 0x0) 09:26:36 executing program 5: 09:26:36 executing program 1: 09:26:36 executing program 3: 09:26:36 executing program 0: 09:26:36 executing program 1: 09:26:36 executing program 4: 09:26:36 executing program 5: 09:26:36 executing program 3: 09:26:36 executing program 0: clone(0x3102003bfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x2, 0x10000000000080, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x20002}, 0x3c) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x31) wait4(0x0, 0x0, 0x0, 0x0) 09:26:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 09:26:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x50, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x50}}, 0x0) [ 235.651901] audit: type=1400 audit(1569835596.889:46): avc: denied { create } for pid=7894 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 235.777858] audit: type=1400 audit(1569835596.929:47): avc: denied { write } for pid=7894 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 235.837418] ptrace attach of "/root/syz-executor.0"[7922] was attempted by "/root/syz-executor.0"[7923] [ 235.923257] audit: type=1400 audit(1569835596.939:48): avc: denied { read } for pid=7894 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 09:26:37 executing program 2: 09:26:37 executing program 3: 09:26:37 executing program 5: 09:26:37 executing program 0: 09:26:37 executing program 1: 09:26:37 executing program 5: 09:26:37 executing program 1: clone(0x808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) inotify_init1(0x0) ptrace$getsig(0x4202, 0x0, 0x80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000000)) 09:26:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 09:26:37 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000000)={0xf0f043}) 09:26:37 executing program 3: socket$key(0xf, 0x3, 0x2) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000140)=0x7, 0xfffffffffffffee7) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_int(r0, 0x29, 0x42, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, &(0x7f0000000040)) close(0xffffffffffffffff) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 09:26:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00'/203, 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 09:26:37 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='syscall\x00') sendfile(r0, r1, 0x0, 0x1) [ 236.178619] ptrace attach of "/root/syz-executor.1"[7531] was attempted by "/root/syz-executor.1"[7949] [ 236.276193] ptrace attach of "/root/syz-executor.1"[7531] was attempted by "/root/syz-executor.1"[7949] 09:26:37 executing program 4: mkdirat(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8002) pipe(0x0) prctl$PR_SET_FPEXC(0xc, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x0, 0x0, 0x1a6}}], 0x4000000000000f6, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={'\x00', 0x1}, &(0x7f0000000180)='user\x00', r1) fcntl$addseals(0xffffffffffffffff, 0x409, 0x3) socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20002, 0x1c6) write$P9_RUNLINKAT(r2, 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x1}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) 09:26:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x249, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x1ff) sched_setaffinity(0x0, 0x3, &(0x7f0000000600)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execve(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) 09:26:37 executing program 1: 09:26:37 executing program 5: 09:26:37 executing program 1: 09:26:37 executing program 4: 09:26:37 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) socket$kcm(0x10, 0x2, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x202240) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="72d3207b1bcf0e14f62342e893ccdc8c99e5a20b4147fa62946280332c1fe1e989866498fbd33c1d7dc1acf8fa468847d2a9dd15e329e41c32da60ece92417eaf7d1b9b1afab6284db6ce2aceaf5114f8daf25fb704272efbcd58992f0dcd90138d5ef2fad57f08f030b19174579891e6161103c0621faee007dc2ee5fef5a15f115e3fb4a666074e7527aa8409bf829ac59bfcf9648e52bc8196703ebaba0cf2d0f0c67d6c5caec8096712ee71aa1f3db4cfa8af456da80a507179a8ca50f2bc0d09e7b45a92143bb4e701f74a189e99eb850126ed54d207bd7977bc920a34e01d0df"], 0xfdef) 09:26:38 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000040)=0x40, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup3(r2, r1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000300)={0x2c, 0x3, r3}, 0x10) 09:26:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0xfffffffffffffd4f, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000200007041dfffd946f6105000200000a1f0000030028080008000c0004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 09:26:38 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) socket$kcm(0xa, 0x20000000000003, 0x11) socket$kcm(0x10, 0x2, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="72d3207b1bcf0e14f62342e893ccdc8c99e5a20b4147fa62946280332c1fe1e989866498fbd33c1d7dc1acf8fa468847d2a9dd15e329e41c32da60ece92417eaf7d1b9b1afab6284db6ce2aceaf5114f8daf25fb704272efbcd58992f0dcd90138d5ef2fad57f08f030b19174579891e6161103c0621faee007dc2ee5fef5a15f115e3fb4a666074e7527aa8409bf829ac59bfcf9648e52bc8196703ebaba0cf2d0f0c67d6c5caec8096712ee71aa1f3db4cfa8af456da80a507179a8ca50f2bc0d09e7b45a92143bb4e701f74a189e99eb850126ed54d207bd7977bc920a34e01d0df"], 0xfdef) 09:26:38 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 09:26:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00'/203, 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 09:26:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r3 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000440)=0x19) dup3(r3, r0, 0x0) [ 237.217335] audit: type=1400 audit(1569835598.449:49): avc: denied { set_context_mgr } for pid=8014 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 237.250572] binder: 8014:8016 ioctl c018620c 20000180 returned -22 09:26:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) pipe(0x0) syz_emit_ethernet(0xfe8a, &(0x7f0000000180)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0xfde3, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x7000000]}, {[], @tcp={{0x2c00, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:26:38 executing program 3: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x12) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t5,\xffx\xf0\xde\xc4\xa8M*\xe4;~y\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_6\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x930xffffffffffffffff}) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, 0x0) ioctl$KVM_SIGNAL_MSI(r4, 0x4020aea5, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r7 = creat(0x0, 0xbc9dc8fbd81cb4b1) write$P9_RCREATE(r7, &(0x7f0000000000)={0x18}, 0xfdef) ioctl$UI_DEV_DESTROY(r7, 0x5502) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:26:39 executing program 5: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000001ec0)={0x0, 0x12}, &(0x7f00009b1ffc)) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) unlink(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) tkill(r0, 0x15) 09:26:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) pipe(0x0) syz_emit_ethernet(0xfe8a, &(0x7f0000000180)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0xfde3, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x7000000]}, {[], @tcp={{0x2c00, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 237.781240] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 09:26:39 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x48) 09:26:39 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r0, &(0x7f000000c6c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 237.919752] SELinux: failed to load policy [ 237.925400] audit: type=1804 audit(1569835599.159:50): pid=8046 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir223555315/syzkaller.LODSYI/27/file0" dev="sda1" ino=16607 res=1 09:26:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00'/203, 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 09:26:39 executing program 5: 09:26:39 executing program 1: [ 238.153005] audit: type=1804 audit(1569835599.189:51): pid=8049 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir223555315/syzkaller.LODSYI/27/file0" dev="sda1" ino=16607 res=1 09:26:39 executing program 0: 09:26:39 executing program 5: 09:26:39 executing program 1: 09:26:39 executing program 3: 09:26:41 executing program 4: 09:26:41 executing program 5: 09:26:41 executing program 0: 09:26:41 executing program 1: 09:26:41 executing program 3: 09:26:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00'/203, 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 09:26:42 executing program 3: 09:26:42 executing program 1: 09:26:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) 09:26:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000180)={0xa920, 0x1, 0x0, 0xffffffffffffffff}) r2 = dup(r1) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x40000012, r2, 0x0) 09:26:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a00000088033cfb0a000200030ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 09:26:42 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x0, 0x0, 0x1a6}}], 0x4000000000000f6, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 09:26:42 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) getegid() open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) close(r0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) write$P9_RRENAME(r1, 0x0, 0x0) [ 240.909571] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. [ 240.963117] x86/PAT: syz-executor.0:8098 map pfn RAM range req write-combining for [mem 0x843e6000-0x843e6fff], got write-back 09:26:42 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000001500)='/dev/vcsa#\x00', 0x1, 0x141001) write$UHID_INPUT(r3, &(0x7f00000015c0)={0x8, "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", 0x1000}, 0x1006) 09:26:42 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x5000008912, &(0x7f0000001600)="11dca50d5e0bcfe47bf070") 09:26:42 executing program 3: r0 = eventfd2(0x0, 0x0) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/42, 0x2a}], 0x20000000000001f3) io_setup(0x1fe, &(0x7f00000000c0)=0x0) r2 = creat(&(0x7f00001c0000)='./file0\x00', 0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000928fc0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) 09:26:42 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in=@dev, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb9, 0x1}, {{@in=@multicast2, 0x0, 0x2b}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x4}}, 0xe8) [ 241.102622] audit: type=1800 audit(1569835602.339:52): pid=8117 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16620 res=0 [ 241.166843] audit: type=1804 audit(1569835602.369:53): pid=8117 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir399589721/syzkaller.n1G0zv/28/file0" dev="sda1" ino=16620 res=1 09:26:42 executing program 2: mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t5,\xffx\xf0\xde\xc4\xa8M*\xe4;~y\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_6\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x930xffffffffffffffff}) r2 = dup(r1) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x40000012, r2, 0x0) 09:26:42 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x0, 0x0, 0x1a6}}], 0x4000000000000f6, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) [ 241.605139] x86/PAT: syz-executor.0:8137 map pfn RAM range req write-combining for [mem 0x9f251000-0x9f251fff], got write-back 09:26:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000180)={0xa920, 0x1, 0x0, 0xffffffffffffffff}) r2 = dup(r1) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x40000012, r2, 0x0) 09:26:42 executing program 3: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x0, 0x0, 0x0) readv(r0, &(0x7f0000001540)=[{0x0, 0x2e3}, {&(0x7f0000000000)=""/25, 0x19}], 0x2) [ 241.750034] x86/PAT: syz-executor.0:8146 map pfn RAM range req write-combining for [mem 0x843e6000-0x843e6fff], got write-back 09:26:43 executing program 3: clone(0x808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) inotify_init1(0x0) ptrace$getsig(0x4202, 0x0, 0x80, &(0x7f0000000280)) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x10', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\x10rist\xe3cusgrVid:De', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@broadcast, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) 09:26:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xf6) read(r0, 0x0, 0x0) [ 241.905334] audit: type=1804 audit(1569835603.139:54): pid=8125 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir399589721/syzkaller.n1G0zv/28/file0" dev="sda1" ino=16620 res=1 09:26:43 executing program 5: 09:26:43 executing program 1: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x12) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t5,\xffx\xf0\xde\xc4\xa8M*\xe4;~y\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_6\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x930xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xff7d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000080)="66b829018ec0b9800000c00f3235002000000f3066baf80cb8c8f61a8eef66bafc0ced0f787e0036400fc75a00c4e1f9e601c4018575504f0f87d485a71b64440f01c43e662666470f38804185", 0x4d}], 0x1, 0x0, 0x0, 0xfffffffffffffe96) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x40, 0x0, 0xfffffffffffffdd4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:26:45 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xc9ed630435a4b410}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2}}, 0xe8) write$binfmt_aout(r0, 0x0, 0x0) 09:26:45 executing program 0: 09:26:45 executing program 1: 09:26:45 executing program 3: 09:26:45 executing program 2: 09:26:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x8001103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:26:45 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) poll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 09:26:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000040)="0c3a4553964d3357433048217a3841576838a27d40386a0c36ebc19c561cb33aae7bdb3847175973dc828c96f6b93f03652d", 0x32}, {&(0x7f0000000200)="2e14040b242d54738f3f1c49a0eab1eac1374c7da639bc65a016d5708b926ff9", 0x20}, {&(0x7f00000002c0)="14cb491b44adebf8cc141a3de341175bee72d881cf6df8148b805dd1bd5f966241418302669be759d408d6f3a1006402f316c1d00c1ecd77ca96ab", 0x3b}, {&(0x7f0000000740)="942906c800e3b96c36ec97e64f0cff0e0d5f124c701f498e0bcc447863d048e39712b178d2d5832df4943e7dab62341b85d591a18c53f2e2ddf814b326274d918e01c1fe1bdb660a486ff36f0d308d04b328f1c1d77288105fd76b8ea0f016f64c81663411a90f89826bde922ad131c2770d662722ab64a2e67c97c6c2af9047033eabcdf0d8f5564f9d370233ee14ab12a49d295b69b8033b4b1648dbefd74b063ae28b7e14737131ba29dc96e313d1c077d4635b2b3a1a187cdf73ba310f0bda00ef", 0xc3}, {&(0x7f0000000840)="c10c6febc95c30bbeead2e4d7da49b7e78ac7590963f562d4fa4a07e7474cbfed7ec748cae1bd2df5e009f792b0f46705524e729b39f7d79ef975151b776f7dd0f44a1ab5414784438a55e7bdecb54b4cbb347164216c2de910c2582fb7dec76f36fe8d04d21fdf1d0062434b9b31d1cc381fd4073a2ab9124f5c18479d4cae9d53fc5b285c9af4a897e43848e2884c34ad2dd5ef044c8ccc6beae59c298c3e3f867ac2edc19e97751d594dca725a52e23a2944724ef9aa23719a4d8669fa0b68ccdce384fbff9b036aa30de46dd3b8899b56ce9e5baa0983705f864eeb9a00b43cf98b87fb359", 0xe7}, {&(0x7f00000009c0)="f31ce82ad74ef9d70d6f8c92228a75cc940179501c814a474c25b625c6517f43621e303792121f0263d7246bda71f458b964383e40f19a2ce7240b71789d45a8187c01000ac2b716efd9bac191f20e7305aa9e5964ba00954031ca9e50683b27e4cef7f1325c7e25191136e68471", 0x6e}, {&(0x7f0000000300)="eb2eea25c52b291ba2a6044620a3704e757d5a51fad4e7d77c43eb02b663534deddafb289cfc812430c4e3ec78d5569883820eeb210f88696fa09bda585aef1c06fd578d93a7f9f5d677fe6de6604fe84be2fa0880157e33e9d119b550a5a5c3cfebd90efa849fd4191120a485cf60741527d33f8fd8f468ed11e36e67a2721ef3c35e17e2a55f45d8474153818aa24ac026dc88c1d2d5a95879318f", 0x9c}], 0x7) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 244.146830] ================================================================== [ 244.154728] BUG: KASAN: null-ptr-deref in kvm_write_guest_virt_system+0x64/0x90 [ 244.162224] Write of size 24 at addr 0000000000000000 by task syz-executor.4/8324 [ 244.169856] [ 244.171511] CPU: 0 PID: 8324 Comm: syz-executor.4 Not tainted 4.19.75 #0 [ 244.178882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.188234] Call Trace: [ 244.190879] dump_stack+0x172/0x1f0 [ 244.194505] ? kvm_write_guest_virt_system+0x64/0x90 [ 244.199641] kasan_report.cold+0x199/0x2ba [ 244.203899] check_memory_region+0x123/0x190 [ 244.208385] memset+0x24/0x40 [ 244.211483] kvm_write_guest_virt_system+0x64/0x90 [ 244.216566] handle_vmread+0x7fe/0xa10 [ 244.220448] ? handle_invpcid+0xa80/0xa80 [ 244.224632] ? __lock_is_held+0xb6/0x140 [ 244.228692] ? __lock_is_held+0xb6/0x140 [ 244.232755] ? handle_invpcid+0xa80/0xa80 [ 244.236897] vmx_handle_exit+0x276/0x16b0 [ 244.241036] ? lock_acquire+0x16f/0x3f0 [ 244.245034] ? vcpu_enter_guest+0xf15/0x5ed0 [ 244.249449] vcpu_enter_guest+0x10ca/0x5ed0 [ 244.253767] ? emulator_read_emulated+0x50/0x50 [ 244.258437] ? lock_acquire+0x16f/0x3f0 [ 244.262436] ? kvm_check_async_pf_completion+0x2d8/0x440 [ 244.267959] kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 244.272817] ? kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 244.277837] kvm_vcpu_ioctl+0x4dc/0xf90 [ 244.281810] ? kvm_vcpu_block+0xcc0/0xcc0 [ 244.285950] ? mark_held_locks+0x100/0x100 [ 244.290237] ? __might_fault+0x12b/0x1e0 [ 244.294334] ? __fget+0x340/0x540 [ 244.297890] ? find_held_lock+0x35/0x130 [ 244.301942] ? __fget+0x340/0x540 [ 244.305399] ? kvm_vcpu_block+0xcc0/0xcc0 [ 244.309648] do_vfs_ioctl+0xd5f/0x1380 [ 244.313580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.319174] ? selinux_file_ioctl+0x125/0x5e0 [ 244.323665] ? ioctl_preallocate+0x210/0x210 [ 244.328070] ? selinux_file_mprotect+0x620/0x620 [ 244.332824] ? iterate_fd+0x360/0x360 [ 244.336648] ? nsecs_to_jiffies+0x30/0x30 [ 244.340802] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.346336] ? security_file_ioctl+0x8d/0xc0 [ 244.350735] ksys_ioctl+0xab/0xd0 [ 244.354184] __x64_sys_ioctl+0x73/0xb0 [ 244.358109] do_syscall_64+0xfd/0x620 [ 244.361916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.367539] RIP: 0033:0x459a29 [ 244.370809] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 244.389701] RSP: 002b:00007fb47a817c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 09:26:45 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000380)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@fat=@errors_continue='errors=continue'}]}) 09:26:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x8001103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 244.397412] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 244.404759] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 244.412025] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 244.419290] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb47a8186d4 [ 244.426547] R13: 00000000004c2ddb R14: 00000000004d6618 R15: 00000000ffffffff [ 244.433831] ================================================================== [ 244.441189] Disabling lock debugging due to kernel taint [ 244.481355] Kernel panic - not syncing: panic_on_warn set ... [ 244.481355] [ 244.483761] FAT-fs (loop5): bogus number of reserved sectors [ 244.489122] CPU: 0 PID: 8324 Comm: syz-executor.4 Tainted: G B 4.19.75 #0 [ 244.489129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.489133] Call Trace: [ 244.489152] dump_stack+0x172/0x1f0 [ 244.489168] ? kvm_write_guest_virt_system+0x64/0x90 [ 244.489247] panic+0x263/0x507 [ 244.489257] ? __warn_printk+0xf3/0xf3 [ 244.489274] ? kvm_write_guest_virt_system+0x64/0x90 [ 244.504765] kobject: 'loop2' (000000007c7ad6b6): kobject_uevent_env [ 244.512661] ? preempt_schedule+0x4b/0x60 [ 244.512675] ? ___preempt_schedule+0x16/0x18 [ 244.512777] ? trace_hardirqs_on+0x5e/0x220 [ 244.517814] FAT-fs (loop5): Can't find a valid FAT filesystem [ 244.518892] ? kvm_write_guest_virt_system+0x64/0x90 [ 244.518911] kasan_end_report+0x47/0x4f [ 244.537311] kobject: 'loop2' (000000007c7ad6b6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 244.542546] kasan_report.cold+0xa9/0x2ba [ 244.542560] check_memory_region+0x123/0x190 [ 244.542572] memset+0x24/0x40 [ 244.542589] kvm_write_guest_virt_system+0x64/0x90 [ 244.596334] handle_vmread+0x7fe/0xa10 [ 244.600247] ? handle_invpcid+0xa80/0xa80 [ 244.604384] ? __lock_is_held+0xb6/0x140 [ 244.608437] ? __lock_is_held+0xb6/0x140 [ 244.612563] ? handle_invpcid+0xa80/0xa80 [ 244.616700] vmx_handle_exit+0x276/0x16b0 [ 244.620857] ? lock_acquire+0x16f/0x3f0 [ 244.624818] ? vcpu_enter_guest+0xf15/0x5ed0 [ 244.629228] vcpu_enter_guest+0x10ca/0x5ed0 [ 244.633545] ? emulator_read_emulated+0x50/0x50 [ 244.638231] ? lock_acquire+0x16f/0x3f0 [ 244.642278] ? kvm_check_async_pf_completion+0x2d8/0x440 [ 244.647722] kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 244.652552] ? kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 244.657564] kvm_vcpu_ioctl+0x4dc/0xf90 [ 244.661526] ? kvm_vcpu_block+0xcc0/0xcc0 [ 244.665659] ? mark_held_locks+0x100/0x100 [ 244.670142] ? __might_fault+0x12b/0x1e0 [ 244.674192] ? __fget+0x340/0x540 [ 244.677633] ? find_held_lock+0x35/0x130 [ 244.681688] ? __fget+0x340/0x540 [ 244.685133] ? kvm_vcpu_block+0xcc0/0xcc0 [ 244.689268] do_vfs_ioctl+0xd5f/0x1380 [ 244.693240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.698861] ? selinux_file_ioctl+0x125/0x5e0 [ 244.703439] ? ioctl_preallocate+0x210/0x210 [ 244.707846] ? selinux_file_mprotect+0x620/0x620 [ 244.712607] ? iterate_fd+0x360/0x360 [ 244.716494] ? nsecs_to_jiffies+0x30/0x30 [ 244.720632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.726155] ? security_file_ioctl+0x8d/0xc0 [ 244.730565] ksys_ioctl+0xab/0xd0 [ 244.734042] __x64_sys_ioctl+0x73/0xb0 [ 244.737919] do_syscall_64+0xfd/0x620 [ 244.741712] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.746896] RIP: 0033:0x459a29 [ 244.750077] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 244.768977] RSP: 002b:00007fb47a817c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 244.776673] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 244.783964] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 244.791222] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 244.798484] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb47a8186d4 [ 244.805739] R13: 00000000004c2ddb R14: 00000000004d6618 R15: 00000000ffffffff [ 244.814670] Kernel Offset: disabled [ 244.818303] Rebooting in 86400 seconds..