[ 43.175355] audit: type=1800 audit(1582352032.058:29): pid=8064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 43.223549] audit: type=1800 audit(1582352032.068:30): pid=8064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.54' (ECDSA) to the list of known hosts. 2020/02/22 06:14:02 fuzzer started syzkaller login: [ 53.913694] kauditd_printk_skb: 5 callbacks suppressed [ 53.913710] audit: type=1400 audit(1582352042.798:36): avc: denied { map } for pid=8248 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/02/22 06:14:04 dialing manager at 10.128.0.105:41975 2020/02/22 06:14:04 syscalls: 2955 2020/02/22 06:14:04 code coverage: enabled 2020/02/22 06:14:04 comparison tracing: enabled 2020/02/22 06:14:04 extra coverage: extra coverage is not supported by the kernel 2020/02/22 06:14:04 setuid sandbox: enabled 2020/02/22 06:14:04 namespace sandbox: enabled 2020/02/22 06:14:04 Android sandbox: /sys/fs/selinux/policy does not exist 2020/02/22 06:14:04 fault injection: enabled 2020/02/22 06:14:04 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/02/22 06:14:04 net packet injection: enabled 2020/02/22 06:14:04 net device setup: enabled 2020/02/22 06:14:04 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/02/22 06:14:04 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 232.579254] audit: type=1400 audit(1582352221.468:37): avc: denied { map } for pid=8267 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:17:15 executing program 0: [ 246.259448] audit: type=1400 audit(1582352235.148:38): avc: denied { map } for pid=8269 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=17145 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 246.477283] IPVS: ftp: loaded support on port[0] = 21 06:17:15 executing program 1: [ 246.588052] chnl_net:caif_netlink_parms(): no params data found [ 246.747061] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.754363] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.762086] device bridge_slave_0 entered promiscuous mode [ 246.777758] IPVS: ftp: loaded support on port[0] = 21 [ 246.785269] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.791868] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.805495] device bridge_slave_1 entered promiscuous mode 06:17:15 executing program 2: [ 246.854101] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 246.873036] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 246.981153] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 246.999303] team0: Port device team_slave_0 added [ 247.010479] chnl_net:caif_netlink_parms(): no params data found [ 247.030930] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 247.038580] team0: Port device team_slave_1 added [ 247.084377] IPVS: ftp: loaded support on port[0] = 21 [ 247.107616] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 247.123495] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 06:17:16 executing program 3: [ 247.151108] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 247.186787] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 247.197296] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 247.225015] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 247.262075] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 247.289921] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 247.309617] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.317433] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.326957] device bridge_slave_0 entered promiscuous mode [ 247.365607] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.373503] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.383640] device bridge_slave_1 entered promiscuous mode 06:17:16 executing program 4: [ 247.441865] device hsr_slave_0 entered promiscuous mode [ 247.480376] device hsr_slave_1 entered promiscuous mode [ 247.542085] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 247.599516] IPVS: ftp: loaded support on port[0] = 21 [ 247.625111] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 247.668499] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 247.695012] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 247.733777] chnl_net:caif_netlink_parms(): no params data found [ 247.759156] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 247.763566] IPVS: ftp: loaded support on port[0] = 21 [ 247.775876] team0: Port device team_slave_0 added 06:17:16 executing program 5: [ 247.840627] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 247.853556] team0: Port device team_slave_1 added [ 247.977117] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 247.985953] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 248.014067] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 248.028442] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 248.036598] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 248.061993] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 248.075055] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 248.084740] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 248.145758] audit: type=1400 audit(1582352237.028:39): avc: denied { create } for pid=8270 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 248.170327] audit: type=1400 audit(1582352237.028:40): avc: denied { write } for pid=8270 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 248.195160] audit: type=1400 audit(1582352237.028:41): avc: denied { read } for pid=8270 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 248.240550] device hsr_slave_0 entered promiscuous mode [ 248.279156] device hsr_slave_1 entered promiscuous mode [ 248.319741] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 248.327206] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 248.347312] IPVS: ftp: loaded support on port[0] = 21 [ 248.373354] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.381755] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.390055] device bridge_slave_0 entered promiscuous mode [ 248.401302] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 248.423413] chnl_net:caif_netlink_parms(): no params data found [ 248.441607] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.448022] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.456444] device bridge_slave_1 entered promiscuous mode [ 248.531963] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 248.545748] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 248.618551] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 248.627366] team0: Port device team_slave_0 added [ 248.633367] chnl_net:caif_netlink_parms(): no params data found [ 248.671192] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 248.679228] team0: Port device team_slave_1 added [ 248.727434] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 248.744312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 248.769760] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 248.782871] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 248.789544] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 248.815283] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 248.838382] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 248.867646] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.874527] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.882082] device bridge_slave_0 entered promiscuous mode [ 248.890949] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 248.921422] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.927878] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.936049] device bridge_slave_1 entered promiscuous mode [ 249.000554] device hsr_slave_0 entered promiscuous mode [ 249.039425] device hsr_slave_1 entered promiscuous mode [ 249.082666] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 249.090571] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 249.105798] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 249.140613] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.154386] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 249.179178] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 249.223473] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.230043] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.237611] device bridge_slave_0 entered promiscuous mode [ 249.245612] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.252381] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.260231] device bridge_slave_1 entered promiscuous mode [ 249.269956] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 249.284919] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 249.294005] team0: Port device team_slave_0 added [ 249.300780] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 249.309010] team0: Port device team_slave_1 added [ 249.321360] chnl_net:caif_netlink_parms(): no params data found [ 249.381288] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 249.399070] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 249.405381] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 249.431626] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 249.444818] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 249.455196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.466124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.494165] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 249.501182] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 249.527546] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 249.540153] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 249.548034] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 249.551742] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 249.561934] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.579027] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 249.615326] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 249.623541] team0: Port device team_slave_0 added [ 249.636902] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 249.652118] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.658792] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.665888] device bridge_slave_0 entered promiscuous mode [ 249.673519] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 249.683575] team0: Port device team_slave_1 added [ 249.704978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.713649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.721490] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.728189] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.735802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 249.748566] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 249.768363] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.775682] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.783352] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.793253] device bridge_slave_1 entered promiscuous mode [ 249.851132] device hsr_slave_0 entered promiscuous mode [ 249.899085] device hsr_slave_1 entered promiscuous mode [ 249.945027] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 249.952560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.960505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.968084] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.974518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.985055] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 250.005398] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 250.013242] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 250.022782] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 250.049139] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 250.059483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 250.069676] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 250.077066] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 250.089259] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 250.108223] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 250.115113] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 250.144511] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 250.155111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 250.168529] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 250.181328] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 250.194648] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 250.203826] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 250.212183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 250.220936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 250.228575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.235811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.242913] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 250.258163] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 250.270102] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 250.284820] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 250.302478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 250.311649] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 250.332976] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 250.339863] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.366161] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 250.386687] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 250.395228] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 250.403006] team0: Port device team_slave_0 added [ 250.408538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 250.417886] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 250.425811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.434687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.443220] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.449696] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.456666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.530587] device hsr_slave_0 entered promiscuous mode [ 250.589169] device hsr_slave_1 entered promiscuous mode [ 250.634662] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 250.642354] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 250.661546] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 250.669338] team0: Port device team_slave_1 added [ 250.691858] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 250.703739] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 250.730178] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 250.743363] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 250.752841] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 250.778884] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 250.791919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 250.804037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 250.812703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.824137] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 250.837974] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 250.856246] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 250.864218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 250.873531] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 250.902563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.914744] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.922894] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.929305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.940509] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 251.010724] device hsr_slave_0 entered promiscuous mode [ 251.049212] device hsr_slave_1 entered promiscuous mode [ 251.099871] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.120868] 8021q: adding VLAN 0 to HW filter on device bond0 [ 251.131373] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 251.162782] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 251.174472] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 251.182737] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 251.190350] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 251.203212] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 251.211408] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 251.229492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.237626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 251.246979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 251.255082] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 251.278246] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 251.287601] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 251.297049] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 251.314530] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 251.323212] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 251.341279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.348417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.355634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 251.363649] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 251.380392] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 251.387106] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.399793] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 251.416841] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 251.426217] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 251.437175] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 251.453251] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 251.459841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 251.467684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.475739] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.482354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.489732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 251.497319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.505236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 251.513324] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.556881] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 251.564995] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 251.574046] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 251.583016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 251.591564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 251.600168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.608327] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.615107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.642637] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 251.657202] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 251.666020] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 251.683853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.697573] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 251.711387] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 251.718393] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 251.729655] 8021q: adding VLAN 0 to HW filter on device bond0 [ 251.738337] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 251.747855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.756408] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 251.763854] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 251.771347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 251.780157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 251.793873] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 251.810191] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 251.821951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 251.834935] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 251.843570] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 251.858934] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 251.887918] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 251.901018] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 251.911394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 251.920868] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 251.929507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.936748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.951912] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 251.961944] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 251.968052] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.979442] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 251.987026] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 251.994075] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 252.007898] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 252.021126] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 252.034236] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 252.043297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 252.057788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 252.066351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.074465] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.082440] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.088835] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.095922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 252.103984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.112783] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 252.125126] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 252.139975] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 252.147690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.162416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 252.171365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 252.179551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.190834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.198498] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.204943] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.212468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 252.220947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.231404] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.238072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 252.245318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 252.261091] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 252.267157] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 252.277967] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 252.292562] device veth0_vlan entered promiscuous mode [ 252.310169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 252.330146] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 252.345468] device veth1_vlan entered promiscuous mode [ 252.352224] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 252.366563] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 252.375900] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 252.389480] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 252.395715] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.408560] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 252.416015] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 252.423332] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 252.430043] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 252.437438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 252.445575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.452701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.463191] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 252.474510] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 252.491549] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 252.499846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.507912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.517238] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 252.526148] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 252.536439] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 252.546041] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.554462] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 252.562573] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 252.571023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.579088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.601489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.610043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.627473] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.633904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.640963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 252.648546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 252.657803] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 252.667815] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 252.677802] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 252.696473] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 252.704354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.712052] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 252.719243] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 252.726391] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 252.734470] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 252.742043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 252.750185] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.757615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.765665] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.773535] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.779959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.793062] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 252.801619] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 252.812931] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 252.825568] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 252.840661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 252.848422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.856474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 252.865405] device veth0_vlan entered promiscuous mode [ 252.878028] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 252.889849] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 252.898446] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 252.905461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 252.914865] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 252.925187] device veth0_macvtap entered promiscuous mode [ 252.933181] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 252.940708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 252.952095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.959290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.966166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 252.974872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 252.982803] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 252.995619] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 253.007351] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 253.014816] 8021q: adding VLAN 0 to HW filter on device team0 [ 253.021839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.031296] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.043510] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 253.056914] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 253.067241] device veth1_macvtap entered promiscuous mode [ 253.074909] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 253.082455] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 253.090686] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 253.097894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.106237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.115396] device veth1_vlan entered promiscuous mode [ 253.127823] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 253.138603] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 253.150694] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 253.166146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 253.180883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.189598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.197427] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.205673] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.212131] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.219817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 253.227735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 253.237565] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 253.255464] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 253.264428] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 253.274129] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 253.283288] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.301967] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 253.309692] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 253.318649] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 253.327060] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 253.342118] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 253.354713] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 253.363495] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 253.372905] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.386161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 253.394225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 253.402302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.410348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.418486] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.424987] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.435330] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 253.441793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 253.452358] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 253.460642] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 253.470144] device veth0_macvtap entered promiscuous mode [ 253.476617] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 253.490434] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 253.497643] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 253.505356] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 253.513034] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 253.521509] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 253.530905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 253.543018] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 253.552643] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 253.560237] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 253.569348] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 253.581630] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 253.593073] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 253.601667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 253.610216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.618158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 253.626664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.641649] device veth1_macvtap entered promiscuous mode [ 253.648037] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 253.657148] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 253.672379] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 253.680217] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.689199] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 253.696767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.710812] device veth0_vlan entered promiscuous mode [ 253.718231] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 253.737368] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 253.752883] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 253.770289] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 253.778511] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 253.792764] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 253.817999] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 253.867087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.884798] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.898151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.913288] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.921940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 253.931167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 253.939874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 253.950231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 253.960610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.970727] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 253.977650] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 253.985697] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 253.994856] device veth1_vlan entered promiscuous mode [ 254.005094] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 254.018571] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 254.033358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 254.044228] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 254.051266] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.058006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.065877] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.076353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 254.090622] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.100910] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 254.107999] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 254.121941] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 254.129993] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 254.147087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 254.164524] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 254.184291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.199482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.210414] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 254.216660] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 254.236302] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 254.248590] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 254.256560] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 254.264035] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 254.276499] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 254.292844] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 254.311059] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 254.341981] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 254.349898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 254.357881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 254.367817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.375624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.383304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 254.391438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.399790] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.406995] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.420828] device veth0_vlan entered promiscuous mode [ 254.432145] device veth0_macvtap entered promiscuous mode [ 254.438584] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 254.474949] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 254.498349] device veth1_vlan entered promiscuous mode [ 254.505492] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 254.528849] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 254.538235] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 254.556048] device veth1_macvtap entered promiscuous mode [ 254.564208] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 254.571415] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 254.579379] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 254.589045] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 254.597438] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 254.606039] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 254.614160] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.628015] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 254.639179] audit: type=1400 audit(1582352243.528:42): avc: denied { associate } for pid=8270 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 254.663165] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 254.671293] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 254.678671] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 254.697774] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 254.709878] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 254.718358] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 254.729717] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 254.741241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 254.755411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.763844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.774713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.791227] device veth0_macvtap entered promiscuous mode [ 254.797739] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 254.808195] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 254.824692] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.842777] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.859701] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 254.869114] device veth0_vlan entered promiscuous mode 06:17:23 executing program 0: [ 254.886854] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 254.903318] device veth1_macvtap entered promiscuous mode [ 254.921220] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 06:17:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x3082}, 0x1c) [ 254.944072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.963852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 06:17:23 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x3d, 0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x8, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x41}}, 0xfffffffffffffe0e) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 254.987487] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.017311] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 255.029379] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 255.032023] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 255.040388] device veth1_vlan entered promiscuous mode [ 255.080008] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 255.091183] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 255.103314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.114891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 255.130671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 255.142733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 255.153399] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.163732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.172977] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.184442] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.195542] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 255.202675] batman_adv: batadv0: Interface activated: batadv_slave_1 06:17:24 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x14, 0x4, 0x8, 0xf1a, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x40) [ 255.225757] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 255.243228] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 255.251750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.274792] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 255.306999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.319485] audit: type=1400 audit(1582352244.208:43): avc: denied { map_create } for pid=8403 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 255.333776] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.353293] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.363442] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.373844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.384708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.395420] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 255.402593] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 255.427677] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.448209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 255.460285] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 06:17:24 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x3d, 0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x8, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x41}}, 0xfffffffffffffe0e) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 255.474532] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.514827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 06:17:24 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r3, r2, 0x0, 0xb39) [ 255.528530] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.565613] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.579942] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.595710] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 255.603413] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 255.614942] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 255.629942] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 255.637958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.657174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 255.665589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 255.682184] device veth0_macvtap entered promiscuous mode [ 255.688666] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 255.699934] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 255.707606] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 255.716595] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 255.730972] device veth1_macvtap entered promiscuous mode [ 255.737333] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 255.755571] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 255.763906] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 255.774021] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 255.796471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 255.808123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 255.822055] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 255.830916] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 255.872068] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 255.882277] device veth0_vlan entered promiscuous mode [ 255.901740] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 255.914839] device veth1_vlan entered promiscuous mode [ 255.932942] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.957175] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.967307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 06:17:24 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioperm(0x0, 0x7fff, 0xadfb) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000200)={0x1e, 0x37, 0x2, {0x0, 0x0, 0xffffffffffffc2ce}}, 0x1e) tkill(0x0, 0x0) [ 255.977265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.992015] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.015734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.027333] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.037785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.048255] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 256.055367] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 256.074661] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 06:17:25 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x2}) [ 256.076084] hrtimer: interrupt took 50247 ns [ 256.099556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 256.108574] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 256.132894] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.152285] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 256.175085] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.186949] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 256.202280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.215693] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 256.226615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.243572] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 256.252176] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 256.282387] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 256.297082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 256.312434] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 256.348428] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 256.368187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 256.378142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 256.389931] device veth0_macvtap entered promiscuous mode [ 256.397951] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 256.418628] device veth1_macvtap entered promiscuous mode [ 256.433326] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 256.444872] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 256.471235] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 256.491930] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.508078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.517869] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.528213] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.537970] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.547781] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.556952] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.566734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.576767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.587716] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.598020] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 256.605128] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 256.614477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 256.624863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.634197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 256.650397] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.659697] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 256.669493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.678606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 256.689104] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.699251] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 256.709233] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.720157] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 256.727179] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 256.735824] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 256.744258] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 256.752319] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 256.760644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 256.768505] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 256.776583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 06:17:25 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) fsync(r0) 06:17:25 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 06:17:26 executing program 4: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0504000000005135f5c7872dace30000000000000000"], 0x1c}}, 0x0) r2 = memfd_create(&(0x7f0000000040)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000004, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000100)='net/anycast6\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') 06:17:26 executing program 5: unshare(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xde, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = open(0x0, 0x141042, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44000}, 0x44) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) io_submit(r3, 0x1867f, &(0x7f0000000540)=[&(0x7f00000000c0)={0x80510000000000, 0xff0f, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @local, @local}, &(0x7f0000000300)=0xc) r4 = socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x20000, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e2d, 0x0, @ipv4={[], [], @dev}, 0xffffffff}, 0x1c) write$binfmt_elf64(r1, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x18) creat(&(0x7f0000000680)='./bus\x00', 0x0) 06:17:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r5, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 06:17:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@remote, 0x19}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x1000001b9}, {&(0x7f0000000180)=""/72}], 0x3, 0x0, 0xba58, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 06:17:26 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 06:17:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000040), 0x10) sendto$inet(r0, &(0x7f00000000c0)='\x00', 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), 0x14) recvfrom$inet(r0, &(0x7f0000000b40)=""/4096, 0x1000, 0x2, 0x0, 0xfffffffffffffe33) [ 257.355280] audit: type=1400 audit(1582352246.238:44): avc: denied { map } for pid=8521 comm="syz-executor.4" path=2F6D656D66643A2F6465762F61757473202864656C6574656429 dev="tmpfs" ino=30605 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 257.430259] device bridge1 entered promiscuous mode 06:17:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000600)=@updpolicy={0xc0, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@XFRMA_IF_ID={0x8}]}, 0xc0}}, 0x0) 06:17:26 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast1, 0xb6}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0, 0xfffffffffffffca5}, {&(0x7f00000012c0)=""/69, 0x45}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 257.491226] device bridge_slave_0 left promiscuous mode [ 257.511963] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.531353] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 06:17:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "001c00"}) r2 = syz_open_pts(r1, 0x4000000000000005) dup3(r2, r0, 0x0) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000340)="b35c4d1b4a00e53b398125833490ce9f3293fee68b59d364d137e0a0e05bb05c1a278a562292a5f5eb047635b226809ec4afe7f34799ec7eb45d5dc9a13b191659e640437952c0788bd5f9e559f70300108d0d26179297e42ed10299a87d6bd64fdce845bac3a51116da27b72a64da6a7ff0a7a5cbfc8be2a2ab37c5f097070e2655a3678309aef3038569778336cbbeebd5e3899fef17f43e700ee52f293f5573b6fa34c5ced506faa4a1f0b665f370f9b7c03b79090d", 0xb7}], 0x1) [ 257.647824] bridge1: port 1(bridge_slave_0) entered blocking state [ 257.687991] bridge1: port 1(bridge_slave_0) entered disabled state 06:17:26 executing program 4: 06:17:26 executing program 2: [ 257.715089] audit: type=1804 audit(1582352246.598:45): pid=8541 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir870343092/syzkaller.h9bd3b/1/bus" dev="sda1" ino=16521 res=1 [ 257.788452] device bridge_slave_0 entered promiscuous mode [ 257.820436] bridge1: port 1(bridge_slave_0) entered blocking state [ 257.826888] bridge1: port 1(bridge_slave_0) entered forwarding state 06:17:26 executing program 2: 06:17:26 executing program 4: [ 257.859365] audit: type=1804 audit(1582352246.648:46): pid=8555 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir870343092/syzkaller.h9bd3b/1/bus" dev="sda1" ino=16521 res=1 [ 257.965087] device bridge_slave_0 left promiscuous mode [ 257.976322] audit: type=1804 audit(1582352246.818:47): pid=8543 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir870343092/syzkaller.h9bd3b/1/bus" dev="sda1" ino=16521 res=1 [ 257.989257] bridge1: port 1(bridge_slave_0) entered disabled state 06:17:26 executing program 5: [ 258.146253] audit: type=1804 audit(1582352246.818:48): pid=8555 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir870343092/syzkaller.h9bd3b/1/bus" dev="sda1" ino=16521 res=1 06:17:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r5, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 06:17:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@remote, 0x72}) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/65, 0x41}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x3c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 06:17:27 executing program 2: [ 258.280566] ptrace attach of "/root/syz-executor.0"[8579] was attempted by "/root/syz-executor.0"[8581] [ 258.366070] device bridge2 entered promiscuous mode [ 258.388108] bridge2: port 1(bridge_slave_0) entered blocking state [ 258.422066] bridge2: port 1(bridge_slave_0) entered disabled state [ 258.459586] device bridge_slave_0 entered promiscuous mode [ 258.466038] bridge2: port 1(bridge_slave_0) entered blocking state [ 258.472520] bridge2: port 1(bridge_slave_0) entered forwarding state [ 258.534800] device bridge_slave_0 left promiscuous mode [ 258.545785] bridge2: port 1(bridge_slave_0) entered disabled state 06:17:27 executing program 3: 06:17:27 executing program 4: 06:17:27 executing program 5: 06:17:27 executing program 2: 06:17:27 executing program 0: 06:17:27 executing program 1: 06:17:27 executing program 5: 06:17:28 executing program 0: 06:17:28 executing program 4: 06:17:28 executing program 2: 06:17:28 executing program 1: 06:17:28 executing program 3: 06:17:28 executing program 5: 06:17:28 executing program 1: 06:17:28 executing program 2: 06:17:28 executing program 4: 06:17:28 executing program 3: 06:17:28 executing program 0: 06:17:28 executing program 5: 06:17:28 executing program 4: 06:17:28 executing program 2: 06:17:28 executing program 1: 06:17:28 executing program 3: 06:17:28 executing program 2: 06:17:28 executing program 1: 06:17:28 executing program 0: 06:17:28 executing program 4: 06:17:28 executing program 5: 06:17:28 executing program 3: 06:17:28 executing program 0: 06:17:28 executing program 2: 06:17:28 executing program 5: 06:17:28 executing program 1: 06:17:28 executing program 3: 06:17:28 executing program 4: 06:17:28 executing program 1: 06:17:28 executing program 0: 06:17:29 executing program 2: 06:17:29 executing program 5: 06:17:29 executing program 4: 06:17:29 executing program 3: 06:17:29 executing program 2: 06:17:29 executing program 1: 06:17:29 executing program 0: 06:17:29 executing program 5: 06:17:29 executing program 4: 06:17:29 executing program 3: 06:17:29 executing program 0: 06:17:29 executing program 2: 06:17:29 executing program 1: 06:17:29 executing program 5: 06:17:29 executing program 3: 06:17:29 executing program 4: 06:17:29 executing program 0: 06:17:29 executing program 2: 06:17:29 executing program 5: 06:17:29 executing program 3: 06:17:29 executing program 1: 06:17:29 executing program 4: 06:17:29 executing program 0: 06:17:29 executing program 1: 06:17:29 executing program 2: 06:17:29 executing program 3: 06:17:29 executing program 5: 06:17:29 executing program 2: 06:17:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) 06:17:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000120, 0x0) 06:17:29 executing program 3: syz_emit_ethernet(0x5e, &(0x7f0000000000)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x28, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "de0ef2a82a0e28f9bdcd5bb497a05d0a"}]}}}}}}}}, 0x0) 06:17:30 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{}]}) 06:17:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0x0) 06:17:30 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000d00)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 06:17:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 06:17:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0x0, 0x0}) getsockopt$sock_int(r0, 0x1, 0x2b, 0x0, &(0x7f0000000040)) 06:17:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 06:17:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt(r0, 0x0, 0x43, 0x0, &(0x7f0000000040)) [ 261.333833] audit: type=1326 audit(1582352250.218:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8731 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f26a code=0xffff0000 06:17:30 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0xfc, 0x4) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e20}, 0x1c) 06:17:30 executing program 3: r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080011000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:17:30 executing program 1: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x1000f3) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) fadvise64(r2, 0x0, 0x0, 0x4) 06:17:30 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, r0, 0x0, 0x3ff) [ 261.558118] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 06:17:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500197f09004b0101048c590188ffffcf5d3474ff9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee22600d4ff5bffff9b226452", 0x48}], 0x1) [ 261.606465] audit: type=1804 audit(1582352250.488:50): pid=8763 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir015787351/syzkaller.irysNR/18/bus" dev="sda1" ino=16571 res=1 [ 261.667744] audit: type=1804 audit(1582352250.488:51): pid=8763 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir015787351/syzkaller.irysNR/18/bus" dev="sda1" ino=16571 res=1 06:17:30 executing program 1: syz_emit_ethernet(0x4a, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd6020920000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="d82cfeaea22dbc4cd0bf2aa0ee"], 0x0) [ 261.762611] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29231 sclass=netlink_route_socket pig=8766 comm=syz-executor.2 [ 261.851856] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29231 sclass=netlink_route_socket pig=8771 comm=syz-executor.2 [ 262.086157] audit: type=1326 audit(1582352250.968:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8731 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f26a code=0xffff0000 06:17:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r2, 0xa, 0x11) fcntl$setlease(r2, 0x400, 0x1) open(0x0, 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) 06:17:31 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) dup2(r1, r0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000080)='pstore\x00', 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000680)=ANY=[@ANYBLOB="080000000000000002004e24e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000300000002004e21e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac14142f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e29594780a581fb8d9c8653ca33bbd344a584cd5611a4cc6c4f23d443188acad9c859bcea48bc7cce8f181f8d1ed4c012aa7a"], 0x210) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x9) r2 = socket(0x100000000011, 0x2, 0x0) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0xa}, 0x4) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x3ff) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006}]}) 06:17:31 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000000c0), 0x4) 06:17:31 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) lgetxattr(&(0x7f0000003340)='./file0\x00', &(0x7f0000003840)=@random={'osx.', '$\x00'}, 0x0, 0x0) 06:17:31 executing program 0: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$setstatus(r3, 0x4, 0x6900) ftruncate(r3, 0x800) socket$packet(0x11, 0x0, 0x300) lseek(r3, 0x0, 0x2) r4 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendfile(r3, r4, &(0x7f0000000380), 0x8001) sendfile(r3, r4, 0x0, 0x8400fffffffa) 06:17:31 executing program 3: creat(&(0x7f0000000000)='./bus\x00', 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) [ 262.277031] audit: type=1804 audit(1582352251.158:53): pid=8791 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir235417398/syzkaller.EuP1iq/22/bus" dev="sda1" ino=16585 res=1 06:17:31 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, 0x0) 06:17:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:17:31 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001540)={0x14, 0x16, 0xa01, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 06:17:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0x8004ae98, 0x0) [ 262.441633] audit: type=1804 audit(1582352251.258:54): pid=8805 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir377096293/syzkaller.HLQ2Tn/17/bus" dev="sda1" ino=16589 res=1 06:17:31 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000140)={0xc, 0x0, "d56dcc6d"}, 0x0) 06:17:31 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) fchdir(0xffffffffffffffff) 06:17:31 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000002) r1 = open(&(0x7f0000000700)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000740)={0x0, 0x3, 0x0, 0x0, 0x1, [{}]}) [ 262.795242] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29231 sclass=netlink_route_socket pig=8785 comm=syz-executor.1 [ 262.868317] audit: type=1804 audit(1582352251.748:55): pid=8835 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir535265714/syzkaller.aVZYDK/19/file0" dev="sda1" ino=16579 res=1 [ 262.934083] audit: type=1326 audit(1582352251.818:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8783 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f26a code=0x0 [ 263.053460] audit: type=1804 audit(1582352251.938:57): pid=8791 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir235417398/syzkaller.EuP1iq/22/bus" dev="sda1" ino=16585 res=1 [ 263.118872] audit: type=1804 audit(1582352251.938:58): pid=8791 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir235417398/syzkaller.EuP1iq/22/bus" dev="sda1" ino=16585 res=1 [ 263.270654] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29231 sclass=netlink_route_socket pig=8839 comm=syz-executor.1 06:17:32 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) socket$packet(0x11, 0x0, 0x300) lseek(r0, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8001) sendfile(r0, r2, 0x0, 0x8400fffffffa) sendfile(r0, r2, 0x0, 0xffffffff) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) 06:17:32 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000080)='pstore\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, r0, 0x0, 0x3ff) 06:17:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) 06:17:32 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000640)=@updpolicy={0xfc, 0x19, 0x305, 0x0, 0x0, {{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@tmpl={0x44, 0x5, [{{@in=@broadcast}, 0x0, @in=@loopback}]}]}, 0xfc}}, 0x0) 06:17:32 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000003c0)) 06:17:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="4570541d13053c07bc3376950036020000000000000000000000ae4fa825d86800278dcfc6f007878c13b3bca21e4e640d7465a8da4d783e682bd4f2acba8073d23d1455aa63298be72ef53948816d66990086e1047e9fadf30e3b08c2ead466ac583640db84c7645cfe98ca6c03fce1937e0aa857824e9c80de5b2fab0678fb8d1af6799905e03fbd24ae603932648f90f077f0d4b7525097f9e7a175294f223046b045960790d3adda29662612550d636450f79c863062c0da98a644fa24dc61a2b5", 0xc3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:17:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY={0x8}]}, 0x1c}}, 0x0) 06:17:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="4570541d13053c07bc3376950036020000000000000000000000ae4fa825d86800278dcfc6f007878c13b3bca21e4e640d7465a8da4d783e682bd4f2acba8073d23d1455aa63298be72ef53948816d66990086e1047e9fadf30e3b08c2ead466ac583640db84c7645cfe98ca6c03fce1937e0aa857824e9c80de5b2fab0678fb8d1af6799905e03fbd24ae603932648f90f077f0d4b7525097f9e7a175294f223046b045960790d3adda29662612550d636450f79c863062c0da98a644fa24dc", 0xc0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:17:32 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006}]}) [ 264.010059] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29231 sclass=netlink_route_socket pig=8865 comm=syz-executor.3 06:17:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r3 = getpid() tkill(r3, 0x9) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb], 0xd000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:17:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) shutdown(r0, 0x1) 06:17:33 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8001) sendfile(r0, r2, 0x0, 0x8400fffffffa) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) 06:17:33 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, 0x0) 06:17:33 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000380), 0x8001) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) 06:17:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0x0, 0x0}) getsockopt$sock_int(r0, 0x1, 0xb, 0x0, &(0x7f0000000500)) 06:17:33 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) getpgrp(0xffffffffffffffff) 06:17:33 executing program 3: io_setup(0x20000000002, &(0x7f0000000240)=0x0) r1 = socket$unix(0x1, 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) r2 = socket(0x40000000002, 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r0, 0x1, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) 06:17:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt(r0, 0x40, 0x0, 0x0, 0x0) 06:17:35 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000003c0)) 06:17:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="4570541d13053c07bc3376950036020000000000000000000000ae4fa825d86800278dcfc6f007878c13b3bca21e4e640d7465a8da4d783e682bd4f2acba8073d23d1455aa63298be72ef53948816d66990086e1047e9fadf30e3b08c2ead466ac583640db84c7645cfe98ca6c03fce1937e0aa857824e9c80de5b2fab0678fb8d1af6799905e03fbd24ae603932648f90f077f0d4b7525097f9e7a175294f223046b045960790d3adda29662612550d636450f79c863062c0da98a644fa24dc", 0xc0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:17:35 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;!\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x1) write$sndseq(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) pselect6(0x40, &(0x7f0000000240), 0x0, &(0x7f0000000140)={0x1b0}, &(0x7f0000000200), 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = open(0x0, 0x0, 0x6) fchdir(r1) getpgrp(0xffffffffffffffff) 06:17:35 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x3c}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 06:17:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000001c0)={0x0, 0x0, 0x0}) 06:17:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 06:17:35 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup2(r0, r0) recvmmsg(r1, &(0x7f0000000000), 0x4000223, 0x0, 0x0) 06:17:36 executing program 4: select(0x24, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x76bd3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 06:17:36 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup2(r0, r0) recvmmsg(r1, &(0x7f0000000000), 0x4000223, 0x0, 0x0) 06:17:36 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000003c0)=0x4200c1) 06:17:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, "f5a31469b7acaa8c43983050712a3ff800a2d6c85713b903c32a52b8a0f16abdf13be4ff72e201910a01f8ffffffffffffe64e5dc984fd137c71f752408a1ad5", "b40386ae4dd8aa5ae6100d0e5a1888d3cb8e726a70c3ae9d6aa89dfecd94a96d6461ff0300000000000797270000000000000000000000000000000000001000", "c66dfe43510a0952c767f4da20020dece3bd539a32457d07f096af10f96f6f58"}) 06:17:36 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) truncate(&(0x7f0000000280)='./file0\x00', 0x0) 06:17:36 executing program 5: msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/147}, 0x9b, 0xd6d0c418f59fe7d3, 0x0) 06:17:38 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="4570541d13053c07bc3376950036020000000000000000000000ae4fa825d86800278dcfc6f007878c13b3bca21e4e640d7465a8da4d783e682bd4f2acba8073d23d1455aa63298be72ef53948816d66990086e1047e9fadf30e3b08c2ead466ac583640db84c7645cfe98ca6c03fce1937e0aa857824e9c80de5b2fab0678fb8d1af6799905e03fbd24ae603932648f90f077f0d4b7525097f9e7a175294f223046b045960790d3adda29662612550d636450f79c863062c0da98a644fa24dc", 0xc0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:17:38 executing program 5: setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000680)=ANY=[], 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006}]}) 06:17:38 executing program 1: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 06:17:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) getsockopt$sock_int(r0, 0x1, 0x1, 0x0, &(0x7f0000000500)) 06:17:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) writev(r0, &(0x7f0000001900)=[{0x0}, {&(0x7f0000000700)="c3", 0x1}], 0x2) 06:17:38 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000140)={0x8}, 0x0) 06:17:39 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rename(0x0, 0x0) 06:17:39 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000bc0)='2', 0x1, 0x0, 0x0, 0x0) [ 270.153544] kauditd_printk_skb: 14 callbacks suppressed [ 270.153560] audit: type=1326 audit(1582352259.038:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8992 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f26a code=0x0 06:17:39 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0xe00) 06:17:39 executing program 2: 06:17:39 executing program 2: 06:17:39 executing program 3: 06:17:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="4570541d13053c07bc3376950036020000000000000000000000ae4fa825d86800278dcfc6f007878c13b3bca21e4e640d7465a8da4d783e682bd4f2acba8073d23d1455aa63298be72ef53948816d66990086e1047e9fadf30e3b08c2ead466ac583640db84c7645cfe98ca6c03fce1937e0aa857824e9c80de5b2fab0678fb8d1af6799905e03fbd24ae603932648f90f077f0d4b7525097f9e7a175294f223046b045960790d3adda29662612550d636450f79c863062c0da98a644fa24dc", 0xc0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:17:42 executing program 1: 06:17:42 executing program 4: 06:17:42 executing program 3: 06:17:42 executing program 2: 06:17:42 executing program 5: 06:17:42 executing program 4: 06:17:42 executing program 2: 06:17:42 executing program 3: 06:17:42 executing program 1: 06:17:42 executing program 5: 06:17:42 executing program 1: 06:17:45 executing program 0: 06:17:45 executing program 2: 06:17:45 executing program 3: 06:17:45 executing program 4: 06:17:45 executing program 5: 06:17:45 executing program 1: 06:17:45 executing program 3: 06:17:45 executing program 5: 06:17:45 executing program 4: 06:17:45 executing program 1: 06:17:45 executing program 2: 06:17:45 executing program 0: 06:17:45 executing program 5: 06:17:45 executing program 2: 06:17:45 executing program 4: 06:17:45 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x3c}, [@ldst={0x7, 0x0, 0x2}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe29}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000140)=0xe8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r2, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x17, 0x1ff, 0x9, 0xffffffff, 0x24, r0, 0x800, [], r1, r2, 0x1, 0x0, 0x1}, 0x40) 06:17:45 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x90400, 0x0) accept$unix(r1, &(0x7f0000000100), &(0x7f0000000080)=0x6e) r2 = fanotify_init(0x0, 0x0) semget(0x2, 0x0, 0x210) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 06:17:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x7) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0xe9ffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r2, &(0x7f0000000100)="7af2f7f4f30abd68d20af6fcf140da4aacbd28ccb8cf631c7ab6d3bd864980d780cbae31558a91134bc8b575c2438669a8750237519ab8908a7f357bbdeba4a4e4a3ffb9", &(0x7f0000000180)=""/174, 0x4}, 0x20) close(0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000280)={{0xa, 0x4e20, 0xbd11, @local, 0x9}, {0xa, 0x4e21, 0x3, @ipv4={[], [], @remote}, 0x3f}, 0x4, [0x8, 0x8001, 0x80000000, 0x8001, 0x40, 0x401, 0x0, 0x7]}, 0x5c) [ 276.719111] audit: type=1400 audit(1582352265.598:74): avc: denied { prog_load } for pid=9075 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 06:17:45 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000040)=0xc) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast1}, r2}}, 0x48) 06:17:45 executing program 5: r0 = inotify_init() r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="5e78d51792ad"]) 06:17:45 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000300)={0x8f, 0x0, 0x5}, 0xe) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="ff01c02cd00fda1585f25e4ca22fc72446d5", 0x12, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000140)="b480b574e287d8f6cc54521c40d510d30977281b522c0470179a683344a5c8401822cc7f", 0x24) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0xf0800, 0x0) openat$cgroup_ro(r4, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(r4, 0x4008556c, &(0x7f0000000180)='syz0\x00') keyctl$KEYCTL_MOVE(0x1e, r0, r1, r2, 0x1) 06:17:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "00001000800000010000000000803fdc00"}) r3 = syz_open_pts(r2, 0x1) fcntl$setstatus(r3, 0x4, 0x102800) write(r3, &(0x7f0000000000)="d5", 0xfffffdc9) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x7) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x806000) dup3(0xffffffffffffffff, r2, 0x0) [ 276.892550] audit: type=1400 audit(1582352265.738:75): avc: denied { prog_run } for pid=9075 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 276.931819] sp0: Synchronizing with TNC 06:17:45 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x90400, 0x0) accept$unix(r1, &(0x7f0000000100), &(0x7f0000000080)=0x6e) r2 = fanotify_init(0x0, 0x0) semget(0x2, 0x0, 0x210) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) [ 277.011612] gfs2: invalid mount option: ^xÕ’­ [ 277.085370] gfs2: can't parse mount arguments 06:17:46 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000300)={0x8f, 0x0, 0x5}, 0xe) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="ff01c02cd00fda1585f25e4ca22fc72446d5", 0x12, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000140)="b480b574e287d8f6cc54521c40d510d30977281b522c0470179a683344a5c8401822cc7f", 0x24) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0xf0800, 0x0) openat$cgroup_ro(r4, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(r4, 0x4008556c, &(0x7f0000000180)='syz0\x00') keyctl$KEYCTL_MOVE(0x1e, r0, r1, r2, 0x1) [ 277.139332] sp0: Synchronizing with TNC [ 277.173843] sp0: Synchronizing with TNC [ 277.211052] gfs2: invalid mount option: ^xÕ’­ 06:17:46 executing program 1: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x7) r2 = dup(0xffffffffffffffff) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000140)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040)=0x80000001, 0x4) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$bt_hci_HCI_DATA_DIR(r5, 0x0, 0x1, &(0x7f0000000240)=0x6, 0x4) ioctl$KVM_INTERRUPT(r5, 0x4004ae86, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {0x0, 0x0, 0x1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x81, 0x0, 0xfffffffe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7ff], [0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x20000]}, 0x45c) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x101c00, 0x0) syz_kvm_setup_cpu$x86(r7, 0xffffffffffffffff, &(0x7f0000447000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000180)="c421a557a402fdffffff0f01b429d5000000c4e18960f866b8b4000f00d88f68609e7e8400400f210eb9ee0800000f32b9e00b00000f3266ba2000b800000080ef66baf80cb8a66c1f8def66bafc0c66ed", 0x51}], 0x1, 0x0, &(0x7f0000000200)=[@dstype0={0x6, 0x2}, @cr0={0x0, 0x80010018}], 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x806000) ioctl$sock_SIOCGSKNS(r4, 0x894c, &(0x7f0000000000)=0x7) syncfs(r8) 06:17:46 executing program 0: open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socket(0x10, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) pipe(0x0) write$eventfd(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r7, 0x84, 0x0, &(0x7f00000000c0)={r6}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000280)={r6, 0x0, 0x10}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000040)={r6, 0x6, 0x30}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x7a, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup3(0xffffffffffffffff, r9, 0x0) [ 277.287208] gfs2: can't parse mount arguments 06:17:46 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000001800)=""/207, 0xcf}], 0x1}}], 0x1, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x490100, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x45, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r3, 0x1, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'vlan1\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x8000, 0x1, 0x7, 0x2}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0xc000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448dd, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe2(&(0x7f0000000000), 0x4000) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, 0x0) 06:17:46 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x2b, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000180)={0x0, 0xfffffff8, 0x0, 0x0, 0x0, [], [], [], [0x0, 0x9, 0x400]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="07010000060000000000000000000000000000000000100008000000000000000506"], 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000080)=0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 277.407681] audit: type=1400 audit(1582352266.268:76): avc: denied { map } for pid=9136 comm="syz-executor.1" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=33588 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 06:17:46 executing program 4: pipe(&(0x7f0000000500)) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = dup(0xffffffffffffffff) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) getpgrp(0x0) capget(0x0, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) pipe(&(0x7f0000000240)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) r3 = getpid() sched_setscheduler(r3, 0x0, 0x0) waitid(0x2, 0x0, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000400)='que\xc6\x9d\xba\xa7/\xd0\xff+\x00\x00\x001;\x10\x00\x00\x00\x00\x00w;\xa9\xdf\x031\xf0u\xff\xc3\x8f\x12\xca\x1ct\xcb\x85\xc6\xb5\xfa\x18&\xe7\x00\x00\r\x00\xa4\x04\xefm5>\xfb|\xdd\x10\xf0\x00\x00\x00\x00\x00\x00\x00\x00\xe8\xff\xff\xb1%\x1e\x1b\xdfF9_UM\xa7\xf3N\xfc', 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r5 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x8) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000300)=0x80000001fe, 0x4) ftruncate(r6, 0x80006) dup2(0xffffffffffffffff, r4) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, &(0x7f0000000780)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0xc) 06:17:46 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r2, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f00000000c0)={r5}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000280)={r5, 0x0, 0x10}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={r5, 0x1}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x80, 0x1, 0x4, 0x80, r7}, &(0x7f0000000180)=0x10) r8 = socket$inet(0x2, 0x3, 0x8) setsockopt$inet_int(r8, 0x0, 0x31, &(0x7f0000000000), 0x4) [ 277.744997] audit: type=1804 audit(1582352266.548:77): pid=9166 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir235417398/syzkaller.EuP1iq/31/bus" dev="sda1" ino=16650 res=1 [ 277.964525] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 06:17:46 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000005a001f001007f4f9002304000a04f59108000400020100df0700038005000000", 0x24) [ 278.077043] audit: type=1804 audit(1582352266.928:78): pid=9166 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir235417398/syzkaller.EuP1iq/31/bus" dev="sda1" ino=16650 res=1 [ 278.231487] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 06:17:47 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18}}], 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000100)=""/213) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000f) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) [ 278.312640] audit: type=1804 audit(1582352267.078:79): pid=9166 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir235417398/syzkaller.EuP1iq/31/bus" dev="sda1" ino=16650 res=1 06:17:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x4082, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x242400, 0x1a) r3 = geteuid() ioctl$TUNSETOWNER(r2, 0x400454cc, r3) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000040)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x806000) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x401, 0x8000, 0x0, {0x0, 0x0, 0x0, r1, 0x1010}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_COST={0x8, 0x22, 0x3}]}}}]}, 0x44}}, 0x0) 06:17:47 executing program 0: open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socket(0x10, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) pipe(0x0) write$eventfd(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r7, 0x84, 0x0, &(0x7f00000000c0)={r6}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000280)={r6, 0x0, 0x10}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000040)={r6, 0x6, 0x30}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x7a, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup3(0xffffffffffffffff, r9, 0x0) 06:17:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = getpid() r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000480)='/dev/video36\x00', 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x24040, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000500)={0x4, 0x8, 0x4, 0x100000, 0x7fffffff, {0x77359400}, {0x4, 0x2, 0x1, 0xff, 0x1, 0x80, "dac7dec7"}, 0xa6b6, 0x3, @offset=0x1ff, 0x3, 0x0, r2}) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1a1100, 0x0) r5 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r5, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) sendmsg$nl_netfilter(r4, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000001640)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="7e008080891e698c9bc119e36ba90838cd5076d862ba955e1ac938a8c5c0d4e7bc6cea2a1d0200bfb1791d3f37b3356552b422beebcfd38afb54523e10540502c954ff9302c871016a834134c16750e5da0f85d19c3b1aa6aff87b6ea0d942af3444db1562410e53a0a5b91b4f61dbf43a9aed4586c33e13d4cedd81f98336999bf9e20216000000008cd2e78ca02b940e4aea2eafee370b305033"], 0x258}, 0x1, 0x0, 0x0, 0x4000000}, 0x44) r6 = socket$inet6(0xa, 0x6, 0x0) ioctl$NBD_SET_FLAGS(r4, 0xab0a, 0x6f9) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r3, 0x0, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r9, 0xc08c5332, &(0x7f00000003c0)={0xa6, 0x780, 0x0, 'queue1\x00', 0x861}) write$cgroup_int(r8, &(0x7f0000000200), 0x806000) ioctl$USBDEVFS_BULK(r8, 0xc0185502, &(0x7f0000000300)={{{0x9}}, 0xbc, 0x100, &(0x7f00000000c0)="c2da81dfd0c23d54a07257ae2d375629a8dc9c7b229e765429bc93ea85f43ae233cc523a324f0329cc1b46e1012667cd6ec9497ae1d3c67ad9b804fe25bc9010ec4cc2869f24d9b21b30f28cccc184335d67f61db46d89c8479bdb3a6a08d75fbfaa41085cf91bcc18c7d0504bcd2bd44e35624683315a286f32cba8daa0270e8e653536965a9db0722d2ef0a88cb749085a55cf975ab9fffcc33960499aac8d8ee0352dd1a2a16792e15677ba0f9f79efb5de47e2547fed41080d05"}) sendmmsg(r7, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 278.658386] audit: type=1804 audit(1582352267.128:80): pid=9180 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir235417398/syzkaller.EuP1iq/31/bus" dev="sda1" ino=16650 res=1 [ 278.723190] Started in network mode [ 278.780039] [ 278.782995] ================================ [ 278.788954] WARNING: inconsistent lock state [ 278.795135] 4.19.105-syzkaller #0 Not tainted [ 278.800663] -------------------------------- [ 278.806180] inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. [ 278.813689] ksoftirqd/1/18 [HC0[0]:SC1[1]:HE1:SE0] takes: [ 278.819339] 0000000001bc6a90 (rxrpc_conn_id_lock){+.?.}, at: rxrpc_put_client_connection_id.part.0+0x19/0x70 [ 278.831208] {SOFTIRQ-ON-W} state was registered at: [ 278.836906] lock_acquire+0x16f/0x3f0 [ 278.840899] _raw_spin_lock+0x2f/0x40 [ 278.844827] rxrpc_connect_call+0x948/0x4920 [ 278.849351] rxrpc_new_client_call+0x8e7/0x1880 [ 278.854636] rxrpc_do_sendmsg+0xfc3/0x1ca3 [ 278.859110] rxrpc_sendmsg+0x4a0/0x5b0 [ 278.863224] sock_sendmsg+0xd7/0x130 [ 278.867197] ___sys_sendmsg+0x3e2/0x920 [ 278.871289] __sys_sendmmsg+0x1bf/0x4e0 [ 278.871301] __x64_sys_sendmmsg+0x9d/0x100 [ 278.871315] do_syscall_64+0xfd/0x620 [ 278.871327] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.871332] irq event stamp: 650810 [ 278.871346] hardirqs last enabled at (650810): [] _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 278.871359] hardirqs last disabled at (650809): [] _raw_spin_lock_irqsave+0x6f/0xcd [ 278.871374] softirqs last enabled at (650014): [] __do_softirq+0x633/0x921 [ 278.871389] softirqs last disabled at (650021): [] run_ksoftirqd+0x8e/0x110 [ 278.871393] [ 278.871393] other info that might help us debug this: [ 278.871396] Possible unsafe locking scenario: [ 278.871396] [ 278.871398] CPU0 [ 278.871400] ---- [ 278.871403] lock(rxrpc_conn_id_lock); [ 278.871411] [ 278.871413] lock(rxrpc_conn_id_lock); [ 278.871419] [ 278.871419] *** DEADLOCK *** [ 278.871419] [ 278.871427] 1 lock held by ksoftirqd/1/18: [ 278.871430] #0: 00000000b5c99b14 (rcu_callback){....}, at: rcu_process_callbacks+0xc79/0x1a30 [ 278.871452] [ 278.871452] stack backtrace: [ 278.871464] CPU: 1 PID: 18 Comm: ksoftirqd/1 Not tainted 4.19.105-syzkaller #0 [ 278.871470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.871481] Call Trace: [ 278.871566] dump_stack+0x197/0x210 [ 278.871584] print_usage_bug.cold+0x330/0x42a [ 278.871597] ? save_stack_trace+0x1a/0x20 [ 278.871611] mark_lock+0xd1b/0x1370 [ 278.871622] ? __save_stack_trace+0x83/0x100 [ 278.871634] ? check_usage_backwards+0x340/0x340 [ 278.871647] __lock_acquire+0xc62/0x49c0 [ 278.871661] ? mark_held_locks+0x100/0x100 [ 278.871676] ? mark_held_locks+0x100/0x100 [ 278.871687] ? __lock_acquire+0x6ee/0x49c0 [ 278.871762] ? debug_object_deactivate+0x1e4/0x360 [ 278.871776] ? find_held_lock+0x35/0x130 [ 278.871789] ? debug_object_deactivate+0x1e4/0x360 [ 278.871804] ? mark_held_locks+0x100/0x100 [ 278.871816] ? debug_object_deactivate+0x1e4/0x360 [ 278.871828] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 278.871842] lock_acquire+0x16f/0x3f0 [ 278.871857] ? rxrpc_put_client_connection_id.part.0+0x19/0x70 [ 278.871870] _raw_spin_lock+0x2f/0x40 [ 278.871883] ? rxrpc_put_client_connection_id.part.0+0x19/0x70 [ 278.871896] rxrpc_put_client_connection_id.part.0+0x19/0x70 [ 278.871909] rxrpc_put_client_conn+0x6c6/0xc20 [ 278.871921] ? rxrpc_rcu_destroy_call+0xbd/0x200 [ 278.871934] ? rxrpc_process_call.cold+0x20/0x20 [ 278.871946] rxrpc_rcu_destroy_call+0xbd/0x200 [ 278.871958] rcu_process_callbacks+0xba0/0x1a30 [ 278.871971] ? __rcu_read_unlock+0x170/0x170 [ 278.871984] ? sched_clock+0x2e/0x50 [ 278.872001] __do_softirq+0x25c/0x921 [ 278.872025] ? firmware_map_remove+0x1a6/0x1a6 [ 278.872041] ? takeover_tasklets+0x7b0/0x7b0 [ 278.872052] run_ksoftirqd+0x8e/0x110 [ 278.872064] smpboot_thread_fn+0x6a3/0xa30 [ 278.872075] ? sort_range+0x30/0x30 [ 278.872087] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 278.872099] ? __kthread_parkme+0xfb/0x1b0 [ 278.872111] kthread+0x354/0x420 [ 278.872120] ? sort_range+0x30/0x30 [ 278.872132] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 278.872142] ret_from_fork+0x24/0x30 [ 278.875482] Own node identity aaaaaaaaaa32, cluster identity 4711 06:17:48 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ocfs2_control\x00', 0x4042, 0x0) openat$cgroup_ro(r2, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) socket$caif_stream(0x25, 0x1, 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000, 0x40}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) r4 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYRES16, @ANYRES32=r5, @ANYBLOB="7315ba755469e58df79526878beffc780d40430a87f4ab42d5a71b585cf577739c0d66a10b55794fbbad5dcacfd29285f1952057fb50a396a376eef454cd18cbbda6407c83c130436e453d9caf1c66670f309fc1df633c24e2f0dea6157fe1ef68ec95566550d4af02a6bac5ac67888e13c664"], 0x3}, 0x1, 0x0, 0x0, 0x24048006}, 0x0) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x10, 0x0, &(0x7f000034f000)) r9 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r10 = socket$inet(0x2, 0x6, 0x1) r11 = socket$inet_sctp(0x2, 0x1, 0x84) r12 = dup3(r10, r11, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r12, 0x84, 0x10, 0x0, &(0x7f000034f000)) bind$xdp(r12, &(0x7f0000000900)={0x2c, 0xf, r5, 0x3c, r9}, 0x10) r13 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r14 = openat$cgroup_procs(r13, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r14, &(0x7f0000000300), 0x12) r15 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000001400), 0x0) preadv(r15, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) io_setup(0x0, &(0x7f0000000280)) r16 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_FILL_RING(r16, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000340)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r16, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r16, &(0x7f0000000900)={0x2c, 0x0, r17}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', r17}) syz_open_dev$usbmon(0x0, 0x0, 0x0) semget(0x1, 0x0, 0x104) [ 279.317376] audit: type=1400 audit(1582352267.668:81): avc: denied { name_bind } for pid=9201 comm="syz-executor.2" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 279.346865] Enabled bearer , priority 0 06:17:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xbf, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000140)="c0ca2b64a67087bc35aaa861ec2c9910f04b7442973c4f74433848ef8ccbb5a107f289cfc71748ac624ef2ccf71c15726afa7dc3aade971da874c6f1eeec9ff10701c819d00ae13c78c2d039ef6af757360a9aaea422488b9f2a4b7650491f911e729a37ac5eee7dc5a99f5aa4ba94fb", 0x70, 0x0, 0x0, 0x0) 06:17:48 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000081) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000001280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x38, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "84f6f5170affda84f23db2f761"}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x163c0}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x54}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x806000) recvmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000400)=""/81, 0x51}, {&(0x7f0000000480)=""/80, 0x50}], 0x2, &(0x7f0000000080)=""/20, 0x14}, 0x100) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x50, r8, 0x2, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x7ff}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}]}, 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x800) [ 279.416282] audit: type=1400 audit(1582352267.668:82): avc: denied { node_bind } for pid=9201 comm="syz-executor.2" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 279.488899] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 279.502787] SELinux: Context  is not valid (left unmapped). 06:17:48 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000001800)=""/207, 0xcf}], 0x1}}], 0x1, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x490100, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x45, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r3, 0x1, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'vlan1\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x8000, 0x1, 0x7, 0x2}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0xc000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448dd, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe2(&(0x7f0000000000), 0x4000) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, 0x0) 06:17:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = getpid() r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000480)='/dev/video36\x00', 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x24040, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000500)={0x4, 0x8, 0x4, 0x100000, 0x7fffffff, {0x77359400}, {0x4, 0x2, 0x1, 0xff, 0x1, 0x80, "dac7dec7"}, 0xa6b6, 0x3, @offset=0x1ff, 0x3, 0x0, r2}) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1a1100, 0x0) r5 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r5, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) sendmsg$nl_netfilter(r4, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000001640)=ANY=[@ANYBLOB="58020000050b010e25bd7000fbdbdf250c0000043ceda75b3728b47f540d6449aa379c83c68a18891d16c3728521afea89fad3c724aa36bc8b85bb387053d03dbf3c1dc2fecf6b956d31889761116def8caa0a81195e4e1ddc022d376f623543e6478ac185eb39549a05f47e8f1f0cd0a2fc23a7be2b0e2ca97bb24d730ab5d6500c416222122a8cded5aac5e5726889a45fbb0cc725cfcbbc35140edbf50573cfbd332e63dcc168ceb833b7f6c9d18c3d72292b7e0e8a6d206cd44afb4949aa4f0b29c26464567a8afe585fb1e8aae275b1d2a98bdc3abbe6a3f5ffffdd9675521318bf48f4dc24db1c82ce917bd12d6572ac9ab1b9cd93a6f52aa73399d82bda98b1e817ed07ea675996743635ff27c98d81173517ecd8a70346294958d66d6c023ff4497ffc50cdef5348c9ad0496f83ae967d57274b808da11f695a0485e07af900e281ee2f1f8cdbf9f1a79fbfb8c4ab1ebe278a8584f1fd88aeb4af4c5a5359799d5b3c632935ed696a8add786ff0300000af9b227683e0882b4bb12eb5d4ebd00d1c0ef32ea0d712a5bb9e2a866a383429c97fe84c91b29a50c1d397eb4f4d54a32682ff1c5a957ec79d9155784e8ec6e4d09346cc1101b511e1b8505892f668c23ea0a0ab40a2c32838f08004c00", @ANYRES32=r5, @ANYBLOB="7e008080891e698c9bc119e36ba90838cd5076d862ba955e1ac938a8c5c0d4e7bc6cea2a1d0200bfb1791d3f37b3356552b422beebcfd38afb54523e10540502c954ff9302c871016a834134c16750e5da0f85d19c3b1aa6aff87b6ea0d942af3444db1562410e53a0a5b91b4f61dbf43a9aed4586c33e13d4cedd81f98336999bf9e20216000000008cd2e78ca02b940e4aea2eafee370b305033"], 0x258}, 0x1, 0x0, 0x0, 0x4000000}, 0x44) r6 = socket$inet6(0xa, 0x6, 0x0) ioctl$NBD_SET_FLAGS(r4, 0xab0a, 0x6f9) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r3, 0x0, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r9, 0xc08c5332, &(0x7f00000003c0)={0xa6, 0x780, 0x0, 'queue1\x00', 0x861}) write$cgroup_int(r8, &(0x7f0000000200), 0x806000) ioctl$USBDEVFS_BULK(r8, 0xc0185502, &(0x7f0000000300)={{{0x9}}, 0xbc, 0x100, &(0x7f00000000c0)="c2da81dfd0c23d54a07257ae2d375629a8dc9c7b229e765429bc93ea85f43ae233cc523a324f0329cc1b46e1012667cd6ec9497ae1d3c67ad9b804fe25bc9010ec4cc2869f24d9b21b30f28cccc184335d67f61db46d89c8479bdb3a6a08d75fbfaa41085cf91bcc18c7d0504bcd2bd44e35624683315a286f32cba8daa0270e8e653536965a9db0722d2ef0a88cb749085a55cf975ab9fffcc33960499aac8d8ee0352dd1a2a16792e15677ba0f9f79efb5de47e2547fed41080d05"}) sendmmsg(r7, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 06:17:48 executing program 4: pipe(&(0x7f0000000500)) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = dup(0xffffffffffffffff) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) getpgrp(0x0) capget(0x0, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) pipe(&(0x7f0000000240)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) r3 = getpid() sched_setscheduler(r3, 0x0, 0x0) waitid(0x2, 0x0, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000400)='que\xc6\x9d\xba\xa7/\xd0\xff+\x00\x00\x001;\x10\x00\x00\x00\x00\x00w;\xa9\xdf\x031\xf0u\xff\xc3\x8f\x12\xca\x1ct\xcb\x85\xc6\xb5\xfa\x18&\xe7\x00\x00\r\x00\xa4\x04\xefm5>\xfb|\xdd\x10\xf0\x00\x00\x00\x00\x00\x00\x00\x00\xe8\xff\xff\xb1%\x1e\x1b\xdfF9_UM\xa7\xf3N\xfc', 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r5 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x8) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000300)=0x80000001fe, 0x4) ftruncate(r6, 0x80006) dup2(0xffffffffffffffff, r4) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, &(0x7f0000000780)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0xc) [ 279.515311] audit: type=1400 audit(1582352267.808:83): avc: denied { name_connect } for pid=9201 comm="syz-executor.2" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 279.572037] device ip6tnl1 entered promiscuous mode 06:17:48 executing program 4: pipe(&(0x7f0000000500)) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = dup(0xffffffffffffffff) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) getpgrp(0x0) capget(0x0, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) pipe(&(0x7f0000000240)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) r3 = getpid() sched_setscheduler(r3, 0x0, 0x0) waitid(0x2, 0x0, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000400)='que\xc6\x9d\xba\xa7/\xd0\xff+\x00\x00\x001;\x10\x00\x00\x00\x00\x00w;\xa9\xdf\x031\xf0u\xff\xc3\x8f\x12\xca\x1ct\xcb\x85\xc6\xb5\xfa\x18&\xe7\x00\x00\r\x00\xa4\x04\xefm5>\xfb|\xdd\x10\xf0\x00\x00\x00\x00\x00\x00\x00\x00\xe8\xff\xff\xb1%\x1e\x1b\xdfF9_UM\xa7\xf3N\xfc', 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r5 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x8) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000300)=0x80000001fe, 0x4) ftruncate(r6, 0x80006) dup2(0xffffffffffffffff, r4) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, &(0x7f0000000780)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0xc) 06:17:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = getpid() r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000480)='/dev/video36\x00', 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x24040, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000500)={0x4, 0x8, 0x4, 0x100000, 0x7fffffff, {0x77359400}, {0x4, 0x2, 0x1, 0xff, 0x1, 0x80, "dac7dec7"}, 0xa6b6, 0x3, @offset=0x1ff, 0x3, 0x0, r2}) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1a1100, 0x0) r5 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r5, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) sendmsg$nl_netfilter(r4, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000001640)=ANY=[@ANYBLOB="58020000050b010e25bd7000fbdbdf250c0000043ceda75b3728b47f540d6449aa379c83c68a18891d16c3728521afea89fad3c724aa36bc8b85bb387053d03dbf3c1dc2fecf6b956d31889761116def8caa0a81195e4e1ddc022d376f623543e6478ac185eb39549a05f47e8f1f0cd0a2fc23a7be2b0e2ca97bb24d730ab5d6500c416222122a8cded5aac5e5726889a45fbb0cc725cfcbbc35140edbf50573cfbd332e63dcc168ceb833b7f6c9d18c3d72292b7e0e8a6d206cd44afb4949aa4f0b29c26464567a8afe585fb1e8aae275b1d2a98bdc3abbe6a3f5ffffdd9675521318bf48f4dc24db1c82ce917bd12d6572ac9ab1b9cd93a6f52aa73399d82bda98b1e817ed07ea675996743635ff27c98d81173517ecd8a70346294958d66d6c023ff4497ffc50cdef5348c9ad0496f83ae967d57274b808da11f695a0485e07af900e281ee2f1f8cdbf9f1a79fbfb8c4ab1ebe278a8584f1fd88aeb4af4c5a5359799d5b3c632935ed696a8add786ff0300000af9b227683e0882b4bb12eb5d4ebd00d1c0ef32ea0d712a5bb9e2a866a383429c97fe84c91b29a50c1d397eb4f4d54a32682ff1c5a957ec79d9155784e8ec6e4d09346cc1101b511e1b8505892f668c23ea0a0ab40a2c32838f08004c00", @ANYRES32=r5, @ANYBLOB="7e008080891e698c9bc119e36ba90838cd5076d862ba955e1ac938a8c5c0d4e7bc6cea2a1d0200bfb1791d3f37b3356552b422beebcfd38afb54523e10540502c954ff9302c871016a834134c16750e5da0f85d19c3b1aa6aff87b6ea0d942af3444db1562410e53a0a5b91b4f61dbf43a9aed4586c33e13d4cedd81f98336999bf9e20216000000008cd2e78ca02b940e4aea2eafee370b305033"], 0x258}, 0x1, 0x0, 0x0, 0x4000000}, 0x44) r6 = socket$inet6(0xa, 0x6, 0x0) ioctl$NBD_SET_FLAGS(r4, 0xab0a, 0x6f9) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r3, 0x0, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r9, 0xc08c5332, &(0x7f00000003c0)={0xa6, 0x780, 0x0, 'queue1\x00', 0x861}) write$cgroup_int(r8, &(0x7f0000000200), 0x806000) ioctl$USBDEVFS_BULK(r8, 0xc0185502, &(0x7f0000000300)={{{0x9}}, 0xbc, 0x100, &(0x7f00000000c0)="c2da81dfd0c23d54a07257ae2d375629a8dc9c7b229e765429bc93ea85f43ae233cc523a324f0329cc1b46e1012667cd6ec9497ae1d3c67ad9b804fe25bc9010ec4cc2869f24d9b21b30f28cccc184335d67f61db46d89c8479bdb3a6a08d75fbfaa41085cf91bcc18c7d0504bcd2bd44e35624683315a286f32cba8daa0270e8e653536965a9db0722d2ef0a88cb749085a55cf975ab9fffcc33960499aac8d8ee0352dd1a2a16792e15677ba0f9f79efb5de47e2547fed41080d05"}) sendmmsg(r7, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 279.657893] device ip6tnl1 entered promiscuous mode 06:17:48 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000081) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000001280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x38, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "84f6f5170affda84f23db2f761"}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x163c0}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x54}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x806000) recvmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000400)=""/81, 0x51}, {&(0x7f0000000480)=""/80, 0x50}], 0x2, &(0x7f0000000080)=""/20, 0x14}, 0x100) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x50, r8, 0x2, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x7ff}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}]}, 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x800) 06:17:48 executing program 4: pipe(&(0x7f0000000500)) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = dup(0xffffffffffffffff) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) getpgrp(0x0) capget(0x0, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) pipe(&(0x7f0000000240)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) r3 = getpid() sched_setscheduler(r3, 0x0, 0x0) waitid(0x2, 0x0, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000400)='que\xc6\x9d\xba\xa7/\xd0\xff+\x00\x00\x001;\x10\x00\x00\x00\x00\x00w;\xa9\xdf\x031\xf0u\xff\xc3\x8f\x12\xca\x1ct\xcb\x85\xc6\xb5\xfa\x18&\xe7\x00\x00\r\x00\xa4\x04\xefm5>\xfb|\xdd\x10\xf0\x00\x00\x00\x00\x00\x00\x00\x00\xe8\xff\xff\xb1%\x1e\x1b\xdfF9_UM\xa7\xf3N\xfc', 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r5 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x8) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000300)=0x80000001fe, 0x4) ftruncate(r6, 0x80006) dup2(0xffffffffffffffff, r4) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, &(0x7f0000000780)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0xc) [ 279.898457] device ip6tnl1 entered promiscuous mode 06:17:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = getpid() r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000480)='/dev/video36\x00', 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x24040, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000500)={0x4, 0x8, 0x4, 0x100000, 0x7fffffff, {0x77359400}, {0x4, 0x2, 0x1, 0xff, 0x1, 0x80, "dac7dec7"}, 0xa6b6, 0x3, @offset=0x1ff, 0x3, 0x0, r2}) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1a1100, 0x0) r5 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r5, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) sendmsg$nl_netfilter(r4, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000001640)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="7e008080891e698c9bc119e36ba90838cd5076d862ba955e1ac938a8c5c0d4e7bc6cea2a1d0200bfb1791d3f37b3356552b422beebcfd38afb54523e10540502c954ff9302c871016a834134c16750e5da0f85d19c3b1aa6aff87b6ea0d942af3444db1562410e53a0a5b91b4f61dbf43a9aed4586c33e13d4cedd81f98336999bf9e20216000000008cd2e78ca02b940e4aea2eafee370b305033"], 0x258}, 0x1, 0x0, 0x0, 0x4000000}, 0x44) r6 = socket$inet6(0xa, 0x6, 0x0) ioctl$NBD_SET_FLAGS(r4, 0xab0a, 0x6f9) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r3, 0x0, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r9, 0xc08c5332, &(0x7f00000003c0)={0xa6, 0x780, 0x0, 'queue1\x00', 0x861}) write$cgroup_int(r8, &(0x7f0000000200), 0x806000) ioctl$USBDEVFS_BULK(r8, 0xc0185502, &(0x7f0000000300)={{{0x9}}, 0xbc, 0x100, &(0x7f00000000c0)="c2da81dfd0c23d54a07257ae2d375629a8dc9c7b229e765429bc93ea85f43ae233cc523a324f0329cc1b46e1012667cd6ec9497ae1d3c67ad9b804fe25bc9010ec4cc2869f24d9b21b30f28cccc184335d67f61db46d89c8479bdb3a6a08d75fbfaa41085cf91bcc18c7d0504bcd2bd44e35624683315a286f32cba8daa0270e8e653536965a9db0722d2ef0a88cb749085a55cf975ab9fffcc33960499aac8d8ee0352dd1a2a16792e15677ba0f9f79efb5de47e2547fed41080d05"}) sendmmsg(r7, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 06:17:49 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000081) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000001280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x38, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "84f6f5170affda84f23db2f761"}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x163c0}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x54}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x806000) recvmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000400)=""/81, 0x51}, {&(0x7f0000000480)=""/80, 0x50}], 0x2, &(0x7f0000000080)=""/20, 0x14}, 0x100) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x50, r8, 0x2, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x7ff}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}]}, 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x800) [ 280.210257] device ip6tnl1 entered promiscuous mode [ 280.338996] 32-bit node address hash set to aaaa9800 [ 280.364810] caif:caif_disconnect_client(): nothing to disconnect [ 280.504139] caif:caif_disconnect_client(): nothing to disconnect 06:17:49 executing program 3: socket$netlink(0x10, 0x3, 0x0) 06:17:49 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000081) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000001280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x38, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "84f6f5170affda84f23db2f761"}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x163c0}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x54}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x806000) recvmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000400)=""/81, 0x51}, {&(0x7f0000000480)=""/80, 0x50}], 0x2, &(0x7f0000000080)=""/20, 0x14}, 0x100) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x50, r8, 0x2, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x7ff}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}]}, 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x800) 06:17:49 executing program 4: dup(0xffffffffffffffff) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="00000000ffff"], 0x1}}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="3800000024000705000000ddd335902838a41060", @ANYRES32, @ANYBLOB="00000000ffffffff00000000090001006866080002000000000021735c6f21ba18f5a3e74c325ccb803fac57e8d65e0a2f44c5af88f7f27b7847f7fe553eb91977e501c2bd4223040ede9889f405969f074460c21086c1b42af01715719358d614d97b721a4f98e5edc30c10cfd4bdbed783fa02815cafac5f9e56eb8f6aa49b1affe8543170800956f8a3fe5d45a5"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB="0202a8408ee9aa5f97566f1f13c2fd7268d9fb4f88818fd69e80e9805bab2ec0428df42e02d79a0f9d533b44b90b3c27670aa3f53cdcad18b38ab8c5ea15eb710b47c121b5cbe9ab33af110959c2531909e1931e584b1cbc5d7494576c8719caca38752d5698a2f722532abe71f42b3727460aa319a2b50e317dd1314cfd4a59bf500e679afd52c6631267e32e980aef1ffa7ef9af825e503bd70d50738b12f5bcabc4d792bb5b2a6c90d707cb952a999d13e82112483733fc824d1817e8e7208056694262e6d693c46144e40d0b02dbe8a60be8b334e730", @ANYBLOB="0000000000000000040000000a000100727376703600000038000200d1030600300001000900010067616374000000001c00028018000200000000"], 0x2}}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 06:17:49 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000081) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000001280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x38, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "84f6f5170affda84f23db2f761"}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x163c0}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x54}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x806000) recvmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000400)=""/81, 0x51}, {&(0x7f0000000480)=""/80, 0x50}], 0x2, &(0x7f0000000080)=""/20, 0x14}, 0x100) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x50, r8, 0x2, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x7ff}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}]}, 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x800) [ 280.552257] syz-executor.5 (9215) used greatest stack depth: 21408 bytes left 06:17:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = getpid() r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000480)='/dev/video36\x00', 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x24040, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000500)={0x4, 0x8, 0x4, 0x100000, 0x7fffffff, {0x77359400}, {0x4, 0x2, 0x1, 0xff, 0x1, 0x80, "dac7dec7"}, 0xa6b6, 0x3, @offset=0x1ff, 0x3, 0x0, r2}) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1a1100, 0x0) r5 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r5, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) sendmsg$nl_netfilter(r4, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000001640)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="7e008080891e698c9bc119e36ba90838cd5076d862ba955e1ac938a8c5c0d4e7bc6cea2a1d0200bfb1791d3f37b3356552b422beebcfd38afb54523e10540502c954ff9302c871016a834134c16750e5da0f85d19c3b1aa6aff87b6ea0d942af3444db1562410e53a0a5b91b4f61dbf43a9aed4586c33e13d4cedd81f98336999bf9e20216000000008cd2e78ca02b940e4aea2eafee370b305033"], 0x258}, 0x1, 0x0, 0x0, 0x4000000}, 0x44) r6 = socket$inet6(0xa, 0x6, 0x0) ioctl$NBD_SET_FLAGS(r4, 0xab0a, 0x6f9) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r3, 0x0, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r9, 0xc08c5332, &(0x7f00000003c0)={0xa6, 0x780, 0x0, 'queue1\x00', 0x861}) write$cgroup_int(r8, &(0x7f0000000200), 0x806000) ioctl$USBDEVFS_BULK(r8, 0xc0185502, &(0x7f0000000300)={{{0x9}}, 0xbc, 0x100, &(0x7f00000000c0)="c2da81dfd0c23d54a07257ae2d375629a8dc9c7b229e765429bc93ea85f43ae233cc523a324f0329cc1b46e1012667cd6ec9497ae1d3c67ad9b804fe25bc9010ec4cc2869f24d9b21b30f28cccc184335d67f61db46d89c8479bdb3a6a08d75fbfaa41085cf91bcc18c7d0504bcd2bd44e35624683315a286f32cba8daa0270e8e653536965a9db0722d2ef0a88cb749085a55cf975ab9fffcc33960499aac8d8ee0352dd1a2a16792e15677ba0f9f79efb5de47e2547fed41080d05"}) sendmmsg(r7, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 06:17:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x6}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x58}, 0x1, 0x0, 0x0, 0x80c1}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x40000, 0x0) init_module(&(0x7f00000001c0)='/dev/vcs\x00', 0x9, &(0x7f0000000200)='$eth0\'&#&#\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = gettid() r6 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x6100) r7 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r7, 0x8200) r8 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1800006, 0x12, r8, 0x0) r9 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r6, r9, 0x0, 0x8000fffffffe) process_vm_writev(r5, &(0x7f0000000100)=[{&(0x7f0000000400)=""/127, 0x7f}], 0x1, &(0x7f0000000d40)=[{&(0x7f0000001880)=""/4096, 0x1000}], 0x1, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3800000010000507000200"/20, @ANYRES32=r10, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r11], 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'lo\x00', r10}) sendmsg$nl_route(r2, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000440)={&(0x7f0000000400)=@getstats={0x1c, 0x5e, 0x2, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r12}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x4010) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000100)=ANY=[@ANYBLOB="020000000200000002000000000000005d00000000000000160400000000000200000000000000a0efede024282aa39e3805123975236b1658ef1dc8ce46cb009678f6825fd1c6528485d9618d1ca64d26a626dbd148a882c390a178a54a5797a7062f3f3b78f9c57466f595ae6dc2891053d9bfdc7ddbf46f7b8375e3f096727b6b0f158f265a6b2d8c6e2ac2e930595f3a4c5b0c00"]) [ 280.642031] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:17:49 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa4eb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, &(0x7f0000000400)={0x1, [[0x1, 0x0, 0x0, 0x6, 0xd2], [0x0, 0x9, 0x305a369, 0x0, 0x20, 0x0, 0x0, 0x7a], [0x3ff, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5]], [], [{0x1ff, 0x4, 0x20}, {0x8, 0x7}, {}, {0x9, 0x3f, 0x4}, {0x8000, 0x9, 0x1ff}, {0x1, 0x5}, {}, {0x800, 0xc0, 0xf456955}, {0x0, 0xfffffc00, 0x10003}, {0x0, 0x0, 0x7}, {0x8ff, 0x4, 0x1}, {0x3ff}]}) socket$bt_bnep(0x1f, 0x3, 0x4) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x64) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) fallocate(r1, 0x20, 0x9, 0x7) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)) sched_setattr(0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x15) write(r2, &(0x7f0000000040), 0x0) socket$inet6(0xa, 0x0, 0x42) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000100)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0xea, 0x0}}], 0x10) r3 = syz_open_dev$evdev(0x0, 0x0, 0x2) write$evdev(r3, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0x2fe) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) write$evdev(r4, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0x2fe) syz_open_dev$evdev(0x0, 0x0, 0x2) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r5, &(0x7f000004d000), 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r6, &(0x7f000004d000), 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r7 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r7, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0x2fe) r8 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r8, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0x2fe) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000180), &(0x7f00000000c0)=0x8) pipe(&(0x7f0000000300)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) [ 280.684184] device ip6tnl1 entered promiscuous mode [ 280.721177] device ip6tnl1 entered promiscuous mode [ 280.746356] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:17:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x6}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x58}, 0x1, 0x0, 0x0, 0x80c1}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x40000, 0x0) init_module(&(0x7f00000001c0)='/dev/vcs\x00', 0x9, &(0x7f0000000200)='$eth0\'&#&#\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = gettid() r6 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x6100) r7 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r7, 0x8200) r8 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1800006, 0x12, r8, 0x0) r9 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r6, r9, 0x0, 0x8000fffffffe) process_vm_writev(r5, &(0x7f0000000100)=[{&(0x7f0000000400)=""/127, 0x7f}], 0x1, &(0x7f0000000d40)=[{&(0x7f0000001880)=""/4096, 0x1000}], 0x1, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3800000010000507000200"/20, @ANYRES32=r10, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r11], 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'lo\x00', r10}) sendmsg$nl_route(r2, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000440)={&(0x7f0000000400)=@getstats={0x1c, 0x5e, 0x2, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r12}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x4010) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000100)=ANY=[@ANYBLOB="020000000200000002000000000000005d00000000000000160400000000000200000000000000a0efede024282aa39e3805123975236b1658ef1dc8ce46cb009678f6825fd1c6528485d9618d1ca64d26a626dbd148a882c390a178a54a5797a7062f3f3b78f9c57466f595ae6dc2891053d9bfdc7ddbf46f7b8375e3f096727b6b0f158f265a6b2d8c6e2ac2e930595f3a4c5b0c00"]) 06:17:49 executing program 4: lstat(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f0000000880)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB="2c00000018e0ce9e", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB="0f00000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00'/54], @ANYRESOCT=r1, @ANYBLOB="de11f63ce20ec0516ba417187917e5f65c9a66757498c154feff00eeb01a5928d3901f5f7e2834eeb8040bddf9eecdd3f23de8807ac53a69abe1b6f08035151ebcca4b5374484ebed1166a0be33ccd17babad89394a399ad168ccf1e9ed83b23c0832000869b893ed67bd17ca65942443f9570d1bebbb22cc7a12b4d3d9c0c921099656beb5015a64ad9515c19798ab2437d07e4cff8a281dd0405254506507b73707f36444d59405ae10bac4614fb6a4cd470894eeefb738d63c5", @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYRESOCT=0x0], @ANYBLOB="06000000000000006000"/24], 0x48}, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/41) memfd_create(0x0, 0x0) lgetxattr(&(0x7f0000000800)='./file0\x00', 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000ac0)={0x0, 0x24, "a09280e7b47dc480c168997e489398dc2aa0c933d923549f5f954e4e7ed9c2faf3513fac"}, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, 0x0) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3800000010000507000200"/20, @ANYRES32=r5, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r6], 0x38}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00', r5}) sendto$packet(r2, &(0x7f0000000240)="c9460e84596c2d859a76e707ef9c359e8bcd27e46bb45b39be85374619c86b8026a29852385ad6d750c3042f57303c83ebac479e7f9dfc8cb08b77851d6346997e38baa9d048e20aff82cc7831ce6886f6d85ba04fe7196ae0bb1bc8f458cb9c3134922b65cb74a9c407b2e8597f9fe078e65a8c47bfcc2bd655414cc2834c37f7ff332d95", 0x85, 0x800, &(0x7f0000000300)={0x11, 0x8, r7, 0x1, 0x20, 0x6, @broadcast}, 0x14) getegid() shmctl$IPC_RMID(0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r8, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(r8, 0x4b4e, 0x33) 06:17:49 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000081) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000001280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x38, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "84f6f5170affda84f23db2f761"}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x163c0}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x54}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x806000) recvmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000400)=""/81, 0x51}, {&(0x7f0000000480)=""/80, 0x50}], 0x2, &(0x7f0000000080)=""/20, 0x14}, 0x100) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x50, r8, 0x2, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x7ff}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}]}, 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x800) 06:17:49 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000081) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000001280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x38, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "84f6f5170affda84f23db2f761"}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x163c0}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x54}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x806000) recvmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000400)=""/81, 0x51}, {&(0x7f0000000480)=""/80, 0x50}], 0x2, &(0x7f0000000080)=""/20, 0x14}, 0x100) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x50, r8, 0x2, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x7ff}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}]}, 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x800) [ 281.111250] device ip6tnl1 entered promiscuous mode 06:17:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = getpid() r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000480)='/dev/video36\x00', 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x24040, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000500)={0x4, 0x8, 0x4, 0x100000, 0x7fffffff, {0x77359400}, {0x4, 0x2, 0x1, 0xff, 0x1, 0x80, "dac7dec7"}, 0xa6b6, 0x3, @offset=0x1ff, 0x3, 0x0, r2}) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1a1100, 0x0) r5 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r5, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) sendmsg$nl_netfilter(r4, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000001640)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="7e008080891e698c9bc119e36ba90838cd5076d862ba955e1ac938a8c5c0d4e7bc6cea2a1d0200bfb1791d3f37b3356552b422beebcfd38afb54523e10540502c954ff9302c871016a834134c16750e5da0f85d19c3b1aa6aff87b6ea0d942af3444db1562410e53a0a5b91b4f61dbf43a9aed4586c33e13d4cedd81f98336999bf9e20216000000008cd2e78ca02b940e4aea2eafee370b305033"], 0x258}, 0x1, 0x0, 0x0, 0x4000000}, 0x44) r6 = socket$inet6(0xa, 0x6, 0x0) ioctl$NBD_SET_FLAGS(r4, 0xab0a, 0x6f9) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r3, 0x0, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r9, 0xc08c5332, &(0x7f00000003c0)={0xa6, 0x780, 0x0, 'queue1\x00', 0x861}) write$cgroup_int(r8, &(0x7f0000000200), 0x806000) ioctl$USBDEVFS_BULK(r8, 0xc0185502, &(0x7f0000000300)={{{0x9}}, 0xbc, 0x100, &(0x7f00000000c0)="c2da81dfd0c23d54a07257ae2d375629a8dc9c7b229e765429bc93ea85f43ae233cc523a324f0329cc1b46e1012667cd6ec9497ae1d3c67ad9b804fe25bc9010ec4cc2869f24d9b21b30f28cccc184335d67f61db46d89c8479bdb3a6a08d75fbfaa41085cf91bcc18c7d0504bcd2bd44e35624683315a286f32cba8daa0270e8e653536965a9db0722d2ef0a88cb749085a55cf975ab9fffcc33960499aac8d8ee0352dd1a2a16792e15677ba0f9f79efb5de47e2547fed41080d05"}) sendmmsg(r7, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) [ 281.200361] device ip6tnl1 entered promiscuous mode 06:17:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x6}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x58}, 0x1, 0x0, 0x0, 0x80c1}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x40000, 0x0) init_module(&(0x7f00000001c0)='/dev/vcs\x00', 0x9, &(0x7f0000000200)='$eth0\'&#&#\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = gettid() r6 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x6100) r7 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r7, 0x8200) r8 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1800006, 0x12, r8, 0x0) r9 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r6, r9, 0x0, 0x8000fffffffe) process_vm_writev(r5, &(0x7f0000000100)=[{&(0x7f0000000400)=""/127, 0x7f}], 0x1, &(0x7f0000000d40)=[{&(0x7f0000001880)=""/4096, 0x1000}], 0x1, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3800000010000507000200"/20, @ANYRES32=r10, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r11], 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'lo\x00', r10}) sendmsg$nl_route(r2, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000440)={&(0x7f0000000400)=@getstats={0x1c, 0x5e, 0x2, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r12}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x4010) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000100)=ANY=[@ANYBLOB="020000000200000002000000000000005d00000000000000160400000000000200000000000000a0efede024282aa39e3805123975236b1658ef1dc8ce46cb009678f6825fd1c6528485d9618d1ca64d26a626dbd148a882c390a178a54a5797a7062f3f3b78f9c57466f595ae6dc2891053d9bfdc7ddbf46f7b8375e3f096727b6b0f158f265a6b2d8c6e2ac2e930595f3a4c5b0c00"]) 06:17:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000081) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000001280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x38, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "84f6f5170affda84f23db2f761"}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x163c0}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x54}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x806000) recvmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000400)=""/81, 0x51}, {&(0x7f0000000480)=""/80, 0x50}], 0x2, &(0x7f0000000080)=""/20, 0x14}, 0x100) syz_genetlink_get_family_id$l2tp(&(0x7f0000000580)='l2tp\x00') 06:17:50 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000081) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000001280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x38, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "84f6f5170affda84f23db2f761"}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x163c0}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x54}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x806000) recvmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000400)=""/81, 0x51}, {&(0x7f0000000480)=""/80, 0x50}], 0x2, &(0x7f0000000080)=""/20, 0x14}, 0x100) syz_genetlink_get_family_id$l2tp(&(0x7f0000000580)='l2tp\x00') [ 281.566979] device ip6tnl1 entered promiscuous mode 06:17:50 executing program 4: lstat(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f0000000880)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB="2c00000018e0ce9e", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB="0f00000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00'/54], @ANYRESOCT=r1, @ANYBLOB="de11f63ce20ec0516ba417187917e5f65c9a66757498c154feff00eeb01a5928d3901f5f7e2834eeb8040bddf9eecdd3f23de8807ac53a69abe1b6f08035151ebcca4b5374484ebed1166a0be33ccd17babad89394a399ad168ccf1e9ed83b23c0832000869b893ed67bd17ca65942443f9570d1bebbb22cc7a12b4d3d9c0c921099656beb5015a64ad9515c19798ab2437d07e4cff8a281dd0405254506507b73707f36444d59405ae10bac4614fb6a4cd470894eeefb738d63c5", @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYRESOCT=0x0], @ANYBLOB="06000000000000006000"/24], 0x48}, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/41) memfd_create(0x0, 0x0) lgetxattr(&(0x7f0000000800)='./file0\x00', 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000ac0)={0x0, 0x24, "a09280e7b47dc480c168997e489398dc2aa0c933d923549f5f954e4e7ed9c2faf3513fac"}, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, 0x0) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3800000010000507000200"/20, @ANYRES32=r5, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r6], 0x38}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00', r5}) sendto$packet(r2, &(0x7f0000000240)="c9460e84596c2d859a76e707ef9c359e8bcd27e46bb45b39be85374619c86b8026a29852385ad6d750c3042f57303c83ebac479e7f9dfc8cb08b77851d6346997e38baa9d048e20aff82cc7831ce6886f6d85ba04fe7196ae0bb1bc8f458cb9c3134922b65cb74a9c407b2e8597f9fe078e65a8c47bfcc2bd655414cc2834c37f7ff332d95", 0x85, 0x800, &(0x7f0000000300)={0x11, 0x8, r7, 0x1, 0x20, 0x6, @broadcast}, 0x14) getegid() shmctl$IPC_RMID(0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r8, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(r8, 0x4b4e, 0x33) [ 281.695559] device ip6tnl1 entered promiscuous mode 06:17:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000081) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000001280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x38, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "84f6f5170affda84f23db2f761"}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x163c0}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x54}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x806000) recvmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000400)=""/81, 0x51}, {&(0x7f0000000480)=""/80, 0x50}], 0x2, &(0x7f0000000080)=""/20, 0x14}, 0x100) 06:17:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = getpid() r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000480)='/dev/video36\x00', 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x24040, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000500)={0x4, 0x8, 0x4, 0x100000, 0x7fffffff, {0x77359400}, {0x4, 0x2, 0x1, 0xff, 0x1, 0x80, "dac7dec7"}, 0xa6b6, 0x3, @offset=0x1ff, 0x3, 0x0, r2}) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1a1100, 0x0) r5 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r5, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) sendmsg$nl_netfilter(r4, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000001640)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="7e008080891e698c9bc119e36ba90838cd5076d862ba955e1ac938a8c5c0d4e7bc6cea2a1d0200bfb1791d3f37b3356552b422beebcfd38afb54523e10540502c954ff9302c871016a834134c16750e5da0f85d19c3b1aa6aff87b6ea0d942af3444db1562410e53a0a5b91b4f61dbf43a9aed4586c33e13d4cedd81f98336999bf9e20216000000008cd2e78ca02b940e4aea2eafee370b305033"], 0x258}, 0x1, 0x0, 0x0, 0x4000000}, 0x44) r6 = socket$inet6(0xa, 0x6, 0x0) ioctl$NBD_SET_FLAGS(r4, 0xab0a, 0x6f9) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r3, 0x0, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r9, 0xc08c5332, &(0x7f00000003c0)={0xa6, 0x780, 0x0, 'queue1\x00', 0x861}) write$cgroup_int(r8, &(0x7f0000000200), 0x806000) sendmmsg(r7, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) [ 281.991134] device ip6tnl1 entered promiscuous mode 06:17:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000081) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000001280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x38, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "84f6f5170affda84f23db2f761"}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x163c0}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x54}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x806000) recvmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000400)=""/81, 0x51}, {&(0x7f0000000480)=""/80, 0x50}], 0x2, &(0x7f0000000080)=""/20, 0x14}, 0x100) 06:17:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x6}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x58}, 0x1, 0x0, 0x0, 0x80c1}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x40000, 0x0) init_module(&(0x7f00000001c0)='/dev/vcs\x00', 0x9, &(0x7f0000000200)='$eth0\'&#&#\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = gettid() r6 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x6100) r7 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r7, 0x8200) r8 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1800006, 0x12, r8, 0x0) r9 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r6, r9, 0x0, 0x8000fffffffe) process_vm_writev(r5, &(0x7f0000000100)=[{&(0x7f0000000400)=""/127, 0x7f}], 0x1, &(0x7f0000000d40)=[{&(0x7f0000001880)=""/4096, 0x1000}], 0x1, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3800000010000507000200"/20, @ANYRES32=r10, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r11], 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'lo\x00', r10}) sendmsg$nl_route(r2, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000440)={&(0x7f0000000400)=@getstats={0x1c, 0x5e, 0x2, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r12}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x4010) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000100)=ANY=[@ANYBLOB="020000000200000002000000000000005d00000000000000160400000000000200000000000000a0efede024282aa39e3805123975236b1658ef1dc8ce46cb009678f6825fd1c6528485d9618d1ca64d26a626dbd148a882c390a178a54a5797a7062f3f3b78f9c57466f595ae6dc2891053d9bfdc7ddbf46f7b8375e3f096727b6b0f158f265a6b2d8c6e2ac2e930595f3a4c5b0c00"]) 06:17:51 executing program 4: lstat(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f0000000880)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB="2c00000018e0ce9e", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB="0f00000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00'/54], @ANYRESOCT=r1, @ANYBLOB="de11f63ce20ec0516ba417187917e5f65c9a66757498c154feff00eeb01a5928d3901f5f7e2834eeb8040bddf9eecdd3f23de8807ac53a69abe1b6f08035151ebcca4b5374484ebed1166a0be33ccd17babad89394a399ad168ccf1e9ed83b23c0832000869b893ed67bd17ca65942443f9570d1bebbb22cc7a12b4d3d9c0c921099656beb5015a64ad9515c19798ab2437d07e4cff8a281dd0405254506507b73707f36444d59405ae10bac4614fb6a4cd470894eeefb738d63c5", @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYRESOCT=0x0], @ANYBLOB="06000000000000006000"/24], 0x48}, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/41) memfd_create(0x0, 0x0) lgetxattr(&(0x7f0000000800)='./file0\x00', 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000ac0)={0x0, 0x24, "a09280e7b47dc480c168997e489398dc2aa0c933d923549f5f954e4e7ed9c2faf3513fac"}, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, 0x0) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3800000010000507000200"/20, @ANYRES32=r5, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r6], 0x38}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00', r5}) sendto$packet(r2, &(0x7f0000000240)="c9460e84596c2d859a76e707ef9c359e8bcd27e46bb45b39be85374619c86b8026a29852385ad6d750c3042f57303c83ebac479e7f9dfc8cb08b77851d6346997e38baa9d048e20aff82cc7831ce6886f6d85ba04fe7196ae0bb1bc8f458cb9c3134922b65cb74a9c407b2e8597f9fe078e65a8c47bfcc2bd655414cc2834c37f7ff332d95", 0x85, 0x800, &(0x7f0000000300)={0x11, 0x8, r7, 0x1, 0x20, 0x6, @broadcast}, 0x14) getegid() shmctl$IPC_RMID(0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r8, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(r8, 0x4b4e, 0x33) 06:17:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = getpid() r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000480)='/dev/video36\x00', 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x24040, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000500)={0x4, 0x8, 0x4, 0x100000, 0x7fffffff, {0x77359400}, {0x4, 0x2, 0x1, 0xff, 0x1, 0x80, "dac7dec7"}, 0xa6b6, 0x3, @offset=0x1ff, 0x3, 0x0, r2}) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1a1100, 0x0) r5 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r5, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) sendmsg$nl_netfilter(r4, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000001640)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="7e008080891e698c9bc119e36ba90838cd5076d862ba955e1ac938a8c5c0d4e7bc6cea2a1d0200bfb1791d3f37b3356552b422beebcfd38afb54523e10540502c954ff9302c871016a834134c16750e5da0f85d19c3b1aa6aff87b6ea0d942af3444db1562410e53a0a5b91b4f61dbf43a9aed4586c33e13d4cedd81f98336999bf9e20216000000008cd2e78ca02b940e4aea2eafee370b305033"], 0x258}, 0x1, 0x0, 0x0, 0x4000000}, 0x44) r6 = socket$inet6(0xa, 0x6, 0x0) ioctl$NBD_SET_FLAGS(r4, 0xab0a, 0x6f9) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r3, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r8, 0xc08c5332, &(0x7f00000003c0)={0xa6, 0x780, 0x0, 'queue1\x00', 0x861}) sendmmsg(r7, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) 06:17:51 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa4eb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, &(0x7f0000000400)={0x1, [[0x1, 0x0, 0x0, 0x6, 0xd2], [0x0, 0x9, 0x305a369, 0x0, 0x20, 0x0, 0x0, 0x7a], [0x3ff, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5]], [], [{0x1ff, 0x4, 0x20}, {0x8, 0x7}, {}, {0x9, 0x3f, 0x4}, {0x8000, 0x9, 0x1ff}, {0x1, 0x5}, {}, {0x800, 0xc0, 0xf456955}, {0x0, 0xfffffc00, 0x10003}, {0x0, 0x0, 0x7}, {0x8ff, 0x4, 0x1}, {0x3ff}]}) socket$bt_bnep(0x1f, 0x3, 0x4) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x64) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) fallocate(r1, 0x20, 0x9, 0x7) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)) sched_setattr(0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x15) write(r2, &(0x7f0000000040), 0x0) socket$inet6(0xa, 0x0, 0x42) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000100)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0xea, 0x0}}], 0x10) r3 = syz_open_dev$evdev(0x0, 0x0, 0x2) write$evdev(r3, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0x2fe) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) write$evdev(r4, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0x2fe) syz_open_dev$evdev(0x0, 0x0, 0x2) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r5, &(0x7f000004d000), 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r6, &(0x7f000004d000), 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r7 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r7, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0x2fe) r8 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r8, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0x2fe) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000180), &(0x7f00000000c0)=0x8) pipe(&(0x7f0000000300)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) 06:17:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000081) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000001280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x38, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "84f6f5170affda84f23db2f761"}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x163c0}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x54}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x806000) [ 282.312725] kauditd_printk_skb: 19 callbacks suppressed [ 282.312740] audit: type=1804 audit(1582352271.198:103): pid=9384 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir870343092/syzkaller.h9bd3b/39/bus" dev="sda1" ino=16703 res=1 [ 282.332768] device ip6tnl1 entered promiscuous mode [ 282.371580] audit: type=1804 audit(1582352271.198:104): pid=9384 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir870343092/syzkaller.h9bd3b/39/bus" dev="sda1" ino=16703 res=1 [ 282.437664] audit: type=1804 audit(1582352271.208:105): pid=9384 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir870343092/syzkaller.h9bd3b/39/bus" dev="sda1" ino=16703 res=1 [ 282.501020] device ip6tnl1 entered promiscuous mode 06:17:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = getpid() r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000480)='/dev/video36\x00', 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x24040, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000500)={0x4, 0x8, 0x4, 0x100000, 0x7fffffff, {0x77359400}, {0x4, 0x2, 0x1, 0xff, 0x1, 0x80, "dac7dec7"}, 0xa6b6, 0x3, @offset=0x1ff, 0x3, 0x0, r2}) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1a1100, 0x0) r5 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r5, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) sendmsg$nl_netfilter(r4, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000001640)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="7e008080891e698c9bc119e36ba90838cd5076d862ba955e1ac938a8c5c0d4e7bc6cea2a1d0200bfb1791d3f37b3356552b422beebcfd38afb54523e10540502c954ff9302c871016a834134c16750e5da0f85d19c3b1aa6aff87b6ea0d942af3444db1562410e53a0a5b91b4f61dbf43a9aed4586c33e13d4cedd81f98336999bf9e20216000000008cd2e78ca02b940e4aea2eafee370b305033"], 0x258}, 0x1, 0x0, 0x0, 0x4000000}, 0x44) r6 = socket$inet6(0xa, 0x6, 0x0) ioctl$NBD_SET_FLAGS(r4, 0xab0a, 0x6f9) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r3, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) sendmmsg(r7, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) 06:17:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x6}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x58}, 0x1, 0x0, 0x0, 0x80c1}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x40000, 0x0) init_module(&(0x7f00000001c0)='/dev/vcs\x00', 0x9, &(0x7f0000000200)='$eth0\'&#&#\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = gettid() r6 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x6100) r7 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r7, 0x8200) r8 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1800006, 0x12, r8, 0x0) r9 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r6, r9, 0x0, 0x8000fffffffe) process_vm_writev(r5, &(0x7f0000000100)=[{&(0x7f0000000400)=""/127, 0x7f}], 0x1, &(0x7f0000000d40)=[{&(0x7f0000001880)=""/4096, 0x1000}], 0x1, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3800000010000507000200"/20, @ANYRES32=r10, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r11], 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'lo\x00', r10}) sendmsg$nl_route(r2, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000440)={&(0x7f0000000400)=@getstats={0x1c, 0x5e, 0x2, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r12}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x4010) 06:17:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000081) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000001280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x38, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "84f6f5170affda84f23db2f761"}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x163c0}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x54}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x806000) 06:17:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000081) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000001280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x38, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "84f6f5170affda84f23db2f761"}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x163c0}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x54}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x806000) 06:17:51 executing program 4: lstat(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f0000000880)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB="2c00000018e0ce9e", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB="0f00000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00'/54], @ANYRESOCT=r1, @ANYBLOB="de11f63ce20ec0516ba417187917e5f65c9a66757498c154feff00eeb01a5928d3901f5f7e2834eeb8040bddf9eecdd3f23de8807ac53a69abe1b6f08035151ebcca4b5374484ebed1166a0be33ccd17babad89394a399ad168ccf1e9ed83b23c0832000869b893ed67bd17ca65942443f9570d1bebbb22cc7a12b4d3d9c0c921099656beb5015a64ad9515c19798ab2437d07e4cff8a281dd0405254506507b73707f36444d59405ae10bac4614fb6a4cd470894eeefb738d63c5", @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYRESOCT=0x0], @ANYBLOB="06000000000000006000"/24], 0x48}, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/41) memfd_create(0x0, 0x0) lgetxattr(&(0x7f0000000800)='./file0\x00', 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000ac0)={0x0, 0x24, "a09280e7b47dc480c168997e489398dc2aa0c933d923549f5f954e4e7ed9c2faf3513fac"}, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, 0x0) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3800000010000507000200"/20, @ANYRES32=r5, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r6], 0x38}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00', r5}) sendto$packet(r2, &(0x7f0000000240)="c9460e84596c2d859a76e707ef9c359e8bcd27e46bb45b39be85374619c86b8026a29852385ad6d750c3042f57303c83ebac479e7f9dfc8cb08b77851d6346997e38baa9d048e20aff82cc7831ce6886f6d85ba04fe7196ae0bb1bc8f458cb9c3134922b65cb74a9c407b2e8597f9fe078e65a8c47bfcc2bd655414cc2834c37f7ff332d95", 0x85, 0x800, &(0x7f0000000300)={0x11, 0x8, r7, 0x1, 0x20, 0x6, @broadcast}, 0x14) getegid() shmctl$IPC_RMID(0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r8, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(r8, 0x4b4e, 0x33) [ 282.908316] device ip6tnl1 entered promiscuous mode [ 282.918052] audit: type=1804 audit(1582352271.798:106): pid=9412 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir870343092/syzkaller.h9bd3b/40/bus" dev="sda1" ino=16703 res=1 [ 283.022206] device ip6tnl1 entered promiscuous mode [ 283.076113] audit: type=1804 audit(1582352271.868:107): pid=9412 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir870343092/syzkaller.h9bd3b/40/bus" dev="sda1" ino=16703 res=1 06:17:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x6}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x58}, 0x1, 0x0, 0x0, 0x80c1}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x40000, 0x0) init_module(&(0x7f00000001c0)='/dev/vcs\x00', 0x9, &(0x7f0000000200)='$eth0\'&#&#\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = gettid() r6 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x6100) r7 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r7, 0x8200) r8 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1800006, 0x12, r8, 0x0) r9 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r6, r9, 0x0, 0x8000fffffffe) process_vm_writev(r5, &(0x7f0000000100)=[{&(0x7f0000000400)=""/127, 0x7f}], 0x1, &(0x7f0000000d40)=[{&(0x7f0000001880)=""/4096, 0x1000}], 0x1, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3800000010000507000200"/20, @ANYRES32=r10, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r11], 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'lo\x00', r10}) 06:17:52 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000081) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000001280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x38, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "84f6f5170affda84f23db2f761"}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x163c0}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x54}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 06:17:52 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000081) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000001280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x38, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "84f6f5170affda84f23db2f761"}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x163c0}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x54}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 06:17:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = getpid() r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000480)='/dev/video36\x00', 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x24040, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000500)={0x4, 0x8, 0x4, 0x100000, 0x7fffffff, {0x77359400}, {0x4, 0x2, 0x1, 0xff, 0x1, 0x80, "dac7dec7"}, 0xa6b6, 0x3, @offset=0x1ff, 0x3, 0x0, r2}) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1a1100, 0x0) r5 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r5, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) sendmsg$nl_netfilter(r4, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000001640)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="7e008080891e698c9bc119e36ba90838cd5076d862ba955e1ac938a8c5c0d4e7bc6cea2a1d0200bfb1791d3f37b3356552b422beebcfd38afb54523e10540502c954ff9302c871016a834134c16750e5da0f85d19c3b1aa6aff87b6ea0d942af3444db1562410e53a0a5b91b4f61dbf43a9aed4586c33e13d4cedd81f98336999bf9e20216000000008cd2e78ca02b940e4aea2eafee370b305033"], 0x258}, 0x1, 0x0, 0x0, 0x4000000}, 0x44) r6 = socket$inet6(0xa, 0x6, 0x0) ioctl$NBD_SET_FLAGS(r4, 0xab0a, 0x6f9) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r3, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmmsg(r7, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) [ 283.272123] audit: type=1804 audit(1582352272.148:108): pid=9428 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir870343092/syzkaller.h9bd3b/41/bus" dev="sda1" ino=16697 res=1 06:17:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x6}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x58}, 0x1, 0x0, 0x0, 0x80c1}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x40000, 0x0) init_module(&(0x7f00000001c0)='/dev/vcs\x00', 0x9, &(0x7f0000000200)='$eth0\'&#&#\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = gettid() r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x8200) r7 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1800006, 0x12, r7, 0x