[ 32.243007] kauditd_printk_skb: 9 callbacks suppressed [ 32.243014] audit: type=1800 audit(1564346311.719:33): pid=6919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 32.269666] audit: type=1800 audit(1564346311.719:34): pid=6919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 36.463947] random: sshd: uninitialized urandom read (32 bytes read) [ 36.735487] audit: type=1400 audit(1564346316.209:35): avc: denied { map } for pid=7092 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 36.787168] random: sshd: uninitialized urandom read (32 bytes read) [ 37.434020] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.1' (ECDSA) to the list of known hosts. [ 42.970504] random: sshd: uninitialized urandom read (32 bytes read) 2019/07/28 20:38:42 fuzzer started [ 43.179414] audit: type=1400 audit(1564346322.649:36): avc: denied { map } for pid=7101 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 45.103776] random: cc1: uninitialized urandom read (8 bytes read) 2019/07/28 20:38:45 dialing manager at 10.128.0.105:45179 2019/07/28 20:38:45 syscalls: 2461 2019/07/28 20:38:45 code coverage: enabled 2019/07/28 20:38:45 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/07/28 20:38:45 extra coverage: extra coverage is not supported by the kernel 2019/07/28 20:38:45 setuid sandbox: enabled 2019/07/28 20:38:45 namespace sandbox: enabled 2019/07/28 20:38:45 Android sandbox: /sys/fs/selinux/policy does not exist 2019/07/28 20:38:45 fault injection: enabled 2019/07/28 20:38:45 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/07/28 20:38:45 net packet injection: enabled 2019/07/28 20:38:45 net device setup: enabled [ 47.502318] random: crng init done 20:40:56 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) msync(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4) 20:40:56 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0xff, 0x1}, 0x20) dup3(r0, r1, 0x80000) [ 177.152471] audit: type=1400 audit(1564346456.629:37): avc: denied { map } for pid=7101 comm="syz-fuzzer" path="/root/syzkaller-shm888234199" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 20:40:56 executing program 3: perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = socket$kcm(0x10, 0x803, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000017c0)="23000000560081aee4f80b00000f00fe078bc36f16000072fd670c87594d0063dac37b", 0x23}], 0x1}, 0x0) 20:40:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000010001c0"]) 20:40:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000800000c0"]) 20:40:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0/file0\x00', r0, &(0x7f0000000080)='./file0/file0\x00', 0x0) [ 177.187026] audit: type=1400 audit(1564346456.649:38): avc: denied { map } for pid=7118 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=68 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 178.050182] IPVS: ftp: loaded support on port[0] = 21 [ 178.575380] chnl_net:caif_netlink_parms(): no params data found [ 178.584662] IPVS: ftp: loaded support on port[0] = 21 [ 178.635464] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.642239] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.649073] device bridge_slave_0 entered promiscuous mode [ 178.658031] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.664468] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.671412] device bridge_slave_1 entered promiscuous mode [ 178.696289] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 178.705589] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 178.727130] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 178.734433] team0: Port device team_slave_0 added [ 178.741542] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 178.748649] team0: Port device team_slave_1 added [ 178.754138] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 178.763626] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 178.781882] IPVS: ftp: loaded support on port[0] = 21 [ 178.862322] device hsr_slave_0 entered promiscuous mode [ 178.900280] device hsr_slave_1 entered promiscuous mode [ 178.959560] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 178.969592] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 178.985014] chnl_net:caif_netlink_parms(): no params data found [ 179.025449] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.031862] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.038519] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.044893] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.068179] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.074883] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.081891] device bridge_slave_0 entered promiscuous mode [ 179.088633] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.095073] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.101917] device bridge_slave_1 entered promiscuous mode [ 179.121763] IPVS: ftp: loaded support on port[0] = 21 [ 179.153408] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 179.172691] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 179.223961] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.231880] team0: Port device team_slave_0 added [ 179.255129] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 179.262385] team0: Port device team_slave_1 added [ 179.276314] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 179.284093] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 179.291965] IPVS: ftp: loaded support on port[0] = 21 [ 179.298694] chnl_net:caif_netlink_parms(): no params data found [ 179.372996] device hsr_slave_0 entered promiscuous mode [ 179.440246] device hsr_slave_1 entered promiscuous mode [ 179.514033] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 179.521230] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 179.603023] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 179.609088] 8021q: adding VLAN 0 to HW filter on device bond0 [ 179.618887] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.625562] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.632432] device bridge_slave_0 entered promiscuous mode [ 179.639447] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.647857] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.654810] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 179.669514] chnl_net:caif_netlink_parms(): no params data found [ 179.690298] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 179.696528] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.703012] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.709853] device bridge_slave_1 entered promiscuous mode [ 179.721953] IPVS: ftp: loaded support on port[0] = 21 [ 179.728493] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 179.777318] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 179.802911] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.809352] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.816664] device bridge_slave_0 entered promiscuous mode [ 179.824562] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 179.832424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 179.839313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 179.850942] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 179.857018] 8021q: adding VLAN 0 to HW filter on device team0 [ 179.876969] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.884890] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.892096] device bridge_slave_1 entered promiscuous mode [ 179.899130] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 179.963646] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.971288] team0: Port device team_slave_0 added [ 179.978026] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 179.999621] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 180.008119] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 180.015569] team0: Port device team_slave_1 added [ 180.021477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.029133] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.036857] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.043205] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.058971] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 180.069113] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 180.079157] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.102722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.110562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.118021] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.124405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.131312] chnl_net:caif_netlink_parms(): no params data found [ 180.145288] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 180.159621] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.173981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 180.193529] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 180.201759] team0: Port device team_slave_0 added [ 180.226834] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 180.234997] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 180.243529] team0: Port device team_slave_1 added [ 180.254834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 180.265922] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 180.284242] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.342049] device hsr_slave_0 entered promiscuous mode [ 180.380266] device hsr_slave_1 entered promiscuous mode [ 180.420563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 180.428286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 180.437974] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 180.457472] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.465296] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 180.472337] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 180.479191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.486813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.496243] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 180.562030] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 180.574750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 180.582505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 180.592259] 8021q: adding VLAN 0 to HW filter on device bond0 [ 180.615035] chnl_net:caif_netlink_parms(): no params data found [ 180.663996] device hsr_slave_0 entered promiscuous mode [ 180.700321] device hsr_slave_1 entered promiscuous mode [ 180.741601] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 180.749095] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 180.755447] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.762134] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.769011] device bridge_slave_0 entered promiscuous mode [ 180.775757] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.782200] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.789275] device bridge_slave_1 entered promiscuous mode [ 180.802322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 180.809849] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.818555] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 180.826260] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 180.849740] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 180.856986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 180.865057] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 180.889766] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 180.899722] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 180.914385] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 180.922472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 180.929348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 180.941482] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 180.947533] 8021q: adding VLAN 0 to HW filter on device team0 [ 180.978622] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 180.994559] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 181.004369] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 181.021592] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 181.028604] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.035499] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.042371] device bridge_slave_0 entered promiscuous mode [ 181.049209] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.055784] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.064461] device bridge_slave_1 entered promiscuous mode [ 181.071160] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 181.078178] team0: Port device team_slave_0 added [ 181.085298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 181.093417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.101380] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.107743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.117019] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 181.140991] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 181.148178] team0: Port device team_slave_1 added [ 181.154082] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 181.162228] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 181.169599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 181.176797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 181.184561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.192698] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.199066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.208494] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 181.219268] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 181.228572] bond0: Enslaving bond_slave_1 as an active interface with an up link 20:41:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000003a0000009bd91873a7"]) [ 181.258857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 181.270571] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 181.280488] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 181.338841] device hsr_slave_0 entered promiscuous mode [ 181.349196] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 20:41:00 executing program 5: [ 181.395477] device hsr_slave_1 entered promiscuous mode 20:41:00 executing program 5: 20:41:00 executing program 5: [ 181.440410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 181.448166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 181.467393] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 181.479619] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 20:41:00 executing program 5: 20:41:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000040000091000040"]) [ 181.494763] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 181.513271] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 181.521697] team0: Port device team_slave_0 added [ 181.527444] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 181.544947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 181.556050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 181.575184] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready 20:41:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000004001"]) [ 181.592495] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 181.599689] team0: Port device team_slave_1 added [ 181.617855] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 181.641664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 181.651110] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 181.668585] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 181.684952] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 181.705453] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 181.718499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 181.741966] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 181.747982] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 181.771188] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 181.784923] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.804083] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.815571] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 181.823298] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 181.843447] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 181.893833] device hsr_slave_0 entered promiscuous mode [ 181.940306] device hsr_slave_1 entered promiscuous mode [ 181.980989] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 181.988127] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 182.001088] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 182.008742] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 182.027783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.037018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.044762] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 182.061289] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.068755] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 182.082233] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 182.088291] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.099418] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 182.107910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.115524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.122541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.130361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.137853] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.144221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.162396] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 182.168464] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.182601] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 182.189595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.197255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.205141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.213180] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.219552] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.229871] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.242352] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 182.253813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.262122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.270443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.278159] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.284560] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.300732] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 182.309837] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 182.321251] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 182.330562] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 182.340736] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 182.348448] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.356585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.363760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.371697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.379437] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.385826] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.392930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.400720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.415900] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 182.426397] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready 20:41:01 executing program 0: [ 182.433164] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.444743] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 182.451789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.459599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.475620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.484822] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 182.495013] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 182.516103] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 182.528287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.536517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.544707] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.551109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.558312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.567626] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 182.579275] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 182.589734] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 182.599464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.606480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 182.614251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.621798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.629278] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.636988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.644911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.652554] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.658885] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.665951] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 182.675668] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 182.685454] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.693337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 182.700987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.709252] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 182.722039] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 182.729770] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 182.739161] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 182.745640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 182.754262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.761852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.769369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 182.776992] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.786988] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 182.795866] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 182.802609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 182.811630] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 182.819008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 182.827342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.834792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.844572] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 182.852960] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 182.861460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.868266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.875669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.883434] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.891876] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 182.898589] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 182.905593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 182.913151] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.923197] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 182.935449] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 182.945172] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 182.952538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 182.960290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.967779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 182.975291] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.986243] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 182.993104] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.003424] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.013494] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 183.021351] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 183.027350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.039381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.047372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.059546] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 183.065948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.074247] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 183.086554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.094768] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.107167] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.113544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.120999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.130569] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 183.141241] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 183.155950] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 183.164394] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 183.171749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.179463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.188736] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.195139] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.203483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.211586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.221448] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 183.231008] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.242188] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 183.264009] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.271877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.279573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.288098] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.313144] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 183.325163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.339434] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.360490] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 183.376163] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 183.386640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.394199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.401940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.412836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.429275] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 183.437988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.465925] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 183.483865] 8021q: adding VLAN 0 to HW filter on device batadv0 20:41:03 executing program 3: perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = socket$kcm(0x10, 0x803, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000017c0)="23000000560081aee4f80b00000f00fe078bc36f16000072fd670c87594d0063dac37b", 0x23}], 0x1}, 0x0) 20:41:03 executing program 5: 20:41:03 executing program 0: [ 184.489035] hrtimer: interrupt took 44943 ns 20:41:04 executing program 4: 20:41:04 executing program 1: 20:41:04 executing program 2: 20:41:04 executing program 0: 20:41:04 executing program 5: 20:41:04 executing program 3: 20:41:04 executing program 3: 20:41:04 executing program 2: 20:41:04 executing program 0: 20:41:04 executing program 1: 20:41:04 executing program 3: 20:41:04 executing program 5: 20:41:04 executing program 4: 20:41:04 executing program 2: 20:41:04 executing program 0: 20:41:04 executing program 1: 20:41:04 executing program 3: 20:41:04 executing program 5: 20:41:04 executing program 4: 20:41:04 executing program 1: 20:41:04 executing program 2: 20:41:04 executing program 3: 20:41:04 executing program 5: 20:41:04 executing program 0: 20:41:04 executing program 4: 20:41:04 executing program 1: 20:41:04 executing program 5: 20:41:04 executing program 2: 20:41:04 executing program 3: 20:41:04 executing program 4: 20:41:04 executing program 1: 20:41:04 executing program 0: 20:41:04 executing program 5: 20:41:04 executing program 4: 20:41:04 executing program 2: 20:41:04 executing program 3: 20:41:04 executing program 1: 20:41:04 executing program 0: 20:41:04 executing program 5: 20:41:04 executing program 2: 20:41:04 executing program 3: 20:41:04 executing program 0: 20:41:04 executing program 5: 20:41:04 executing program 4: 20:41:04 executing program 1: 20:41:04 executing program 2: 20:41:04 executing program 3: 20:41:04 executing program 0: 20:41:04 executing program 5: 20:41:04 executing program 1: 20:41:04 executing program 4: 20:41:04 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000140)={0xb, @raw_data="b9d91d488671cd5fe6f10b70ce1bb853b4b263f00d55ed3909c3465adc3dc44bdcb7944cff229ef0467fc0c103d9c8ab3b8046d26e305e25b9f94c8a18018b724b41e7d25226709f9154c01576ad618d1322a58b59c5a116a46e74e9c16f2a83720369523494e3501bb88db2831846aa33e7b2b15517cc9ae2c7c0df5139ecc2a0ec7e3d6c22f25ed3643abff60ede608a4fe56895c15d74019261513109777ad7458d1a9a41f505fc9dfda804d9ff473d563de31a17921a3187eaf1f8a966c1bcb820da39c07c3a"}) 20:41:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000780)=""/254) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000301ffff808fdb003d88c8f00010ae1b"], 0x14}}, 0x0) 20:41:05 executing program 5: 20:41:05 executing program 0: 20:41:05 executing program 1: 20:41:05 executing program 4: 20:41:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890c, &(0x7f0000000440)={0x750, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, {0x2, 0x0, @loopback}, 0x800000000000047, 0x8, 0x5, 0x46a}) 20:41:05 executing program 2: mkdir(0x0, 0x2000000000008) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) stat(&(0x7f00000003c0)='./bus\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, &(0x7f0000000740)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="02000000010007000000000002000100", @ANYRES32=r2, @ANYBLOB, @ANYRES32, @ANYBLOB="273434c0a725d7d7dbf51b4ffc0b2da60e26c1be4d2866b5881ba20a126aa71f9b3205566c11f33b1bb0309ef1f3206088a7c0693846ce48badfe3edaae2240d8f86327140afaeca1e", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r3, @ANYBLOB="08000200", @ANYRES32=r4, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="10000000000000002000020000000000"], 0xf, 0x3) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000780)=""/254) chdir(&(0x7f0000000180)='./file0\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000040)={r0, 0x7fff}) creat(&(0x7f0000000240)='./bus\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000301ffff808fdb003d88c8f00010ae1b"], 0x14}}, 0x0) 20:41:05 executing program 5: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002180)='jfs\x00', &(0x7f00000021c0)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@resize='resize'}, {@iocharset={'iocharset', 0x3d, 'macromanian'}}]}) 20:41:05 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000140)={0x4}) [ 185.657049] audit: type=1400 audit(1564346465.129:39): avc: denied { create } for pid=7328 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 185.693221] audit: type=1400 audit(1564346465.139:40): avc: denied { write } for pid=7328 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 20:41:05 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/uinput\x00', 0x805, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x5c, 0x100000000) [ 185.813384] resize option for remount only [ 185.908405] audit: type=1400 audit(1564346465.369:41): avc: denied { create } for pid=7349 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:41:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000008d04"]) [ 186.035897] audit: type=1400 audit(1564346465.429:42): avc: denied { write } for pid=7349 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:41:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000040000004010040"]) [ 186.175003] audit: type=1400 audit(1564346465.469:43): avc: denied { read } for pid=7349 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:41:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000780)=""/254) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000301ffff808fdb003d88c8f00010ae1b"], 0x14}}, 0x0) 20:41:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000024d564b9bd91873a7"]) 20:41:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000400100009bd91873a7"]) 20:41:05 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x6, 0x800249e21, 0x100000001}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000380), &(0x7f0000000080)=""/178}, 0x18) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000540), &(0x7f0000000640)=""/145}, 0x18) 20:41:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) dup3(r0, r1, 0x0) 20:41:06 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', @ifru_ivalue=0x70ff00}) 20:41:06 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x7fffffffffdff) 20:41:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000001e01"]) 20:41:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000040000000010040"]) 20:41:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000d90100009bd91873a7"]) [ 186.819107] device nr0 entered promiscuous mode [ 186.825562] kvm [7393]: vcpu0, guest rIP: 0xfff0 ignored wrmsr: 0x11e data 0x0 [ 186.826209] mmap: syz-executor.2 (7403) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. [ 186.835046] PF_CAN: dropped non conform CAN FD skbuf: dev type 65534, len 45305, datalen 0 20:41:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000002c1001c0"]) 20:41:06 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000000)={'sit0\x00\x00\x00\x00\x00\x00\x00m\x00', @ifru_ivalue=0x70e000}) 20:41:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000007a01"]) 20:41:06 executing program 0: socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='uid_map\x00') 20:41:06 executing program 4: openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) dup3(r0, r1, 0x0) [ 186.971689] device nr0 entered promiscuous mode 20:41:06 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) socket$inet(0x2, 0x6, 0x170d) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00fdffffff8a08b7960ff7aa6e041a7700fdff863802aa0063b8f24252b1d85cbf8f49ab786bf40339653f0ffb0936b564df5e0acad550fe200900da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f94ffffffffffffffbe"], 0x6f) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000280), 0x4) statx(r1, &(0x7f00000000c0)='./file0/file0\x00', 0x6400, 0x40, &(0x7f0000000400)) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000240)=""/10) mkdir(&(0x7f0000000740)='./file0\x00', 0x4000000000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) rename(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./bus\x00') 20:41:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000007501"]) 20:41:06 executing program 5: perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x803, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x81000000, &(0x7f0000000140)=[{&(0x7f00000017c0)="23000000560081aee4f80b00000f00fe078bc36f16000072fd670c87594d0063dac37b", 0x23}], 0x1}, 0x0) [ 187.158849] device nr0 entered promiscuous mode 20:41:06 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 20:41:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:06 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x11, &(0x7f00000001c0)={@broadcast, @dev, [], {@llc={0x4, {@llc={0x0, 0x0, '/'}}}}}, 0x0) 20:41:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000007401"]) 20:41:06 executing program 5: perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x803, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x81000000, &(0x7f0000000140)=[{&(0x7f00000017c0)="23000000560081aee4f80b00000f00fe078bc36f16000072fd670c87594d0063dac37b", 0x23}], 0x1}, 0x0) 20:41:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x1}]}, &(0x7f0000000180)=0x10) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, 0x0) [ 187.313735] device nr0 entered promiscuous mode [ 187.332277] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 187.393563] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 187.409658] FAT-fs (loop3): Filesystem has been set read-only [ 187.436642] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 187.458311] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) 20:41:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000006005"]) 20:41:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) [ 187.482883] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 187.556577] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 187.578029] device nr0 entered promiscuous mode [ 187.650741] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 187.679651] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) 20:41:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x1}]}, &(0x7f0000000180)=0x10) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, 0x0) 20:41:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000008104"]) 20:41:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000001f0001c0"]) 20:41:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000001b0001c0"]) 20:41:07 executing program 2: ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00008, 0x0, 0x0, 0x0, 0x10000000002) 20:41:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) [ 187.715943] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) 20:41:07 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000001c0)={0x0, 0x0}) 20:41:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000580001c09bd91873a7"]) 20:41:07 executing program 4: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) io_setup(0x9, &(0x7f0000000080)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x201200}]) 20:41:07 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='/de\xc9m\xeb;fy\xadv') openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x101, 0x0) [ 188.038295] audit: type=1804 audit(1564346467.509:44): pid=7512 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir694167834/syzkaller.gjtmmn/16/bus" dev="sda1" ino=16579 res=1 20:41:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000040000003010040"]) 20:41:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000008004"]) 20:41:07 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="8000000000000000b1004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(r1, 0x0, 0x51) write$cgroup_int(r0, &(0x7f0000000080), 0xfffffec7) socket$kcm(0x2, 0x0, 0x2) 20:41:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000200001c0"]) 20:41:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x101, 0x0, 0x0, {{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 188.214198] audit: type=1804 audit(1564346467.529:45): pid=7512 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir694167834/syzkaller.gjtmmn/16/bus" dev="sda1" ino=16579 res=1 20:41:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000301ffff808fdb003d88c8f00010ae1b"], 0x14}}, 0x0) 20:41:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x1, 0x0, @remote}, 0xfffffffffffffdfd) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) dup3(r0, r1, 0x0) 20:41:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:08 executing program 3: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') stat(0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0), 0x0) lstat(0x0, &(0x7f00000009c0)) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000301ffff808fdb003d88c8f00010ae1b"], 0x14}}, 0x0) 20:41:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000040000001010040"]) 20:41:08 executing program 2: 20:41:08 executing program 2: 20:41:08 executing program 2: 20:41:08 executing program 0: 20:41:08 executing program 2: 20:41:08 executing program 5: 20:41:08 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:08 executing program 5: 20:41:09 executing program 4: 20:41:09 executing program 2: 20:41:09 executing program 5: 20:41:09 executing program 0: 20:41:09 executing program 3: 20:41:09 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:09 executing program 0: 20:41:09 executing program 3: 20:41:09 executing program 5: 20:41:09 executing program 2: 20:41:09 executing program 5: 20:41:09 executing program 4: 20:41:09 executing program 0: 20:41:09 executing program 3: 20:41:09 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:09 executing program 4: 20:41:09 executing program 2: 20:41:09 executing program 5: 20:41:09 executing program 0: 20:41:09 executing program 3: 20:41:09 executing program 2: 20:41:09 executing program 5: 20:41:09 executing program 4: 20:41:09 executing program 0: 20:41:09 executing program 3: 20:41:09 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:09 executing program 2: 20:41:09 executing program 2: 20:41:09 executing program 5: 20:41:09 executing program 0: 20:41:09 executing program 4: 20:41:09 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:09 executing program 3: 20:41:09 executing program 2: 20:41:09 executing program 5: 20:41:09 executing program 4: 20:41:09 executing program 0: 20:41:09 executing program 3: 20:41:09 executing program 5: 20:41:09 executing program 2: 20:41:09 executing program 4: 20:41:09 executing program 0: 20:41:09 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:09 executing program 3: 20:41:09 executing program 5: 20:41:09 executing program 2: 20:41:09 executing program 2: 20:41:09 executing program 4: 20:41:09 executing program 3: 20:41:09 executing program 0: 20:41:09 executing program 5: 20:41:09 executing program 2: 20:41:10 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:10 executing program 3: 20:41:10 executing program 4: 20:41:10 executing program 5: 20:41:10 executing program 0: 20:41:10 executing program 2: 20:41:10 executing program 5: 20:41:10 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) poll(&(0x7f0000000080)=[{r0}], 0x28, 0x0) 20:41:10 executing program 4: setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000004c0)={0x80000000000084, @rand_addr, 0x0, 0x4, 'rr\x00'}, 0x2c) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x100, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x4800, 0x0) accept(0xffffffffffffffff, &(0x7f0000000140)=@ipx, &(0x7f00000001c0)=0x80) socketpair(0x0, 0x1, 0x6, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x50000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) mkdir(0x0, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) ioctl$KDGKBMETA(r0, 0x4b62, 0x0) ftruncate(r0, 0x101) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(0xffffffffffffffff, &(0x7f00000000c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x5, @loopback}}, 0x24) ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, &(0x7f00000003c0)={0x4, 0x0, 0x0, {0x4, 0x6, 0x0, 0x1000}}) listen(r0, 0x0) sysfs$1(0x1, &(0x7f0000000100)='ceph\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:41:10 executing program 3: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="340000000000250000000000248d7ac36174ab52499f4e1eb8d902a327796ed7774f491b1e8e16c01e74e5647712cb58dbebf0d8d98788033bcbbf16068835471a398ec452910e13afa708fad93def51db9e0cd96612d541b6bac19a0000"], 0xe) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10) 20:41:10 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x0, 0x0, 0x400}, 0x6) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@rand_addr, @local, @multicast1}, &(0x7f00000000c0)=0xc) r1 = socket(0x11, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f00000003c0)={0x2f, @multicast1, 0x0, 0x0, 'none\x00', 0x1, 0x0, 0x2b}, 0x2c) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = syz_open_dev$adsp(0x0, 0x0, 0x103800) ioctl$VIDIOC_TRY_ENCODER_CMD(0xffffffffffffffff, 0xc028564e, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r2, 0x0) getsockopt$rose(r3, 0x104, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x4) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x2c7, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "b722d2a7e6c36f88e333a23f6dd247432f073f09bf0e20453902141ab323eeec0d13e6f85495094d5c4b9c319f5b42917829ea1f56ffe254ff4c64249adb35", 0x2a}, 0x60) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000004640)='./file0\x00', 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r3, 0xc0285628, &(0x7f0000000380)={0x0, 0x3, 0x10001, [], &(0x7f0000000340)=0x3}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000200)=@add_del={0x3, &(0x7f0000000180)='hwsim0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xe0ec, 0x5, 0x0, 0x101}, &(0x7f0000000240)=0x14) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000280)={r4, 0x9, 0xffffffff}, 0x8) 20:41:10 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 20:41:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:10 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 190.797327] audit: type=1400 audit(1564346470.269:46): avc: denied { map } for pid=7715 comm="syz-executor.3" path=2F6D656D66643A0B656D31C1F8A68D4EC0A35CE2CBA2BAE5F497AC232AFF202864656C6574656429 dev="tmpfs" ino=28567 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 20:41:10 executing program 4: bind$bt_rfcomm(0xffffffffffffffff, &(0x7f00000000c0), 0xa) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) 20:41:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) [ 190.929614] audit: type=1400 audit(1564346470.309:47): avc: denied { map } for pid=7712 comm="syz-executor.5" path="socket:[29915]" dev="sockfs" ino=29915 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=packet_socket permissive=1 20:41:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100000000000001, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x1000981900, 0x1}) close(r0) 20:41:10 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f00000002c0)=0x7, 0x4) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 20:41:10 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f00000000c0)={0x2f, "9e5daefd317ed784f168abb3cacf53a949a2dc58bbc7d584487facf18756a9c4", 0x2, 0x1}) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000080)) dup3(r1, r2, 0x0) 20:41:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:10 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:10 executing program 3: socket$packet(0x11, 0x0, 0x300) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x10004, 0x0, 0x1000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfbf}}, 0x0, 0x1, 0x0, 0x9, 0x2}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000180)={0x0, 0x7}, 0x3) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 20:41:10 executing program 0: perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x803, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000017c0)="23000000560081aee4f80b00000f00fe078bc36f16000072fd670c87594d0063dac37b", 0x23}], 0x1}, 0x0) 20:41:10 executing program 5: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x8) recvfrom$unix(r0, &(0x7f0000000180)=""/46, 0x2e, 0x40, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) recvfrom$unix(r0, &(0x7f00000007c0)=""/233, 0x24b, 0x20, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000140)={0x0, 0x6}, 0x8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x3, @empty}, 0x10) sendto$inet(r1, 0x0, 0x2f5, 0x200007fc, &(0x7f0000000000)={0x2, 0x3, @local}, 0x10) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000240), 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) accept4(r0, 0x0, 0x0, 0x2) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000080)={0x8c, @loopback, 0x0, 0x0, 'wrr\x00'}, 0x2c) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) getpid() stat(0x0, 0x0) pipe2$9p(&(0x7f00000003c0), 0x4800) lstat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) memfd_create(0x0, 0x0) fdatasync(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) sendto(r1, &(0x7f00000000c0)='H', 0x1, 0x5, 0x0, 0x0) sendto(r1, &(0x7f0000000100)="91", 0x1, 0x8044, 0x0, 0x0) shutdown(r1, 0x2) recvfrom$inet(r1, 0x0, 0x0, 0x80040000101, 0x0, 0x2f49b2819fbc7c26) 20:41:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:10 executing program 2: bind$bt_rfcomm(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, {0x4}}, 0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) 20:41:10 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[], 0xff71) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000006c000000000000000000000000df3f0000000000000000000000000000000000000000003800"/144], 0x90) dup3(r1, r0, 0x0) fcntl$setstatus(r0, 0x4, 0x43fd) io_setup(0x9, &(0x7f0000000080)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x201200}]) [ 191.297513] IPVS: set_ctl: invalid protocol: 140 127.0.0.1:0 [ 191.335314] device nr0 entered promiscuous mode 20:41:10 executing program 2: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x2004e20, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000010, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 191.357516] IPVS: set_ctl: invalid protocol: 140 127.0.0.1:0 20:41:10 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000000500)=[{0x0}, {0x0}, {&(0x7f00000004c0)=""/20, 0x14}], 0x3, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000740)) mkdir(0x0, 0x2) lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="1a8316fd8da11ea8db4acff7b4f5975ce84e2ca1b8c1baa4ff4a97a919054bc057f283f4a2ad7760b152da4cd2390aeedcc0a19807bd17e41a2a277f4587c0f19e6703000000ffe3332a8da0527687070e", @ANYRES32=0x0, @ANYBLOB="0400800071ff16c53ee500a5c15611cfeb6b19d94e5a643cc1f941119fe373e99554a30e"], 0x4, 0x3) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x10', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\x10rist\xe3cusgrVid:De', 0x0) fcntl$dupfd(r1, 0x0, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000008c0)={0x0, 0xffffffffffffffff, 0xee, 0x1b612b8f, 0xfff, 0x1, 0xffff, 0x80, {0x0, @in6={{0xa, 0x0, 0x5, @dev={0xfe, 0x80, [], 0x16}}}, 0x4, 0x2, 0x9, 0x2, 0x8}}, &(0x7f00000001c0)=0xb0) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000080)=[0xffffffffffffffff, 0xffffffffffffffff]) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000640)={r2, 0xfffffffffffffffc, 0x4, 0x200, 0x6ba, 0xfffffffffffffe00, 0x1, 0x3, {r3, @in6={{0xa, 0x4e20, 0x376, @loopback, 0x8}}, 0x6, 0xffff, 0xfffffffffffffffb, 0x88f}}, &(0x7f0000000100)=0xb0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xf3c2, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x8, 0x2}, 0x0, 0x0, &(0x7f0000000300)={0x4, 0xe, 0x3, 0x4}, &(0x7f0000000340)=0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x2}}, 0x10) setregid(r4, r5) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x3) symlink(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)='./file0\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x0, 0xff}, 0x21) 20:41:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:11 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f00000000c0)={0x2f, "9e5daefd317ed784f168abb3cacf53a949a2dc58bbc7d584487facf18756a9c4", 0x2, 0x1}) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000080)) dup3(r1, r2, 0x0) [ 191.589505] audit: type=1804 audit(1564346471.059:48): pid=7794 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir136836230/syzkaller.yZjZGf/36/bus" dev="sda1" ino=16591 res=1 [ 191.651167] device nr0 entered promiscuous mode 20:41:11 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r1) 20:41:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000800000c09bd91873a7"]) [ 191.770644] audit: type=1804 audit(1564346471.119:49): pid=7794 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir136836230/syzkaller.yZjZGf/36/bus" dev="sda1" ino=16591 res=1 20:41:11 executing program 3: bind$bt_rfcomm(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, {0x0, 0x40}}, 0xa) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) 20:41:11 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:11 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f00000000c0)={0x2f, "9e5daefd317ed784f168abb3cacf53a949a2dc58bbc7d584487facf18756a9c4", 0x2, 0x1}) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000080)) dup3(r1, r2, 0x0) [ 192.019888] device nr0 entered promiscuous mode 20:41:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000007b0100009bd91873a7"]) 20:41:11 executing program 3: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000080)) dup3(r1, r2, 0x0) [ 192.067493] device bridge_slave_1 left promiscuous mode [ 192.091629] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.146882] device bridge_slave_0 left promiscuous mode [ 192.177204] bridge0: port 1(bridge_slave_0) entered disabled state 20:41:11 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f00000000c0)={0x2f, "9e5daefd317ed784f168abb3cacf53a949a2dc58bbc7d584487facf18756a9c4", 0x2, 0x1}) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000080)) dup3(r1, r2, 0x0) [ 192.432286] device hsr_slave_1 left promiscuous mode [ 192.480588] device hsr_slave_0 left promiscuous mode [ 192.534687] team0 (unregistering): Port device team_slave_1 removed [ 192.561832] team0 (unregistering): Port device team_slave_0 removed [ 192.583575] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 192.635821] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 192.768185] bond0 (unregistering): Released all slaves [ 195.250247] IPVS: ftp: loaded support on port[0] = 21 [ 195.577694] chnl_net:caif_netlink_parms(): no params data found [ 195.611951] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.618338] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.625345] device bridge_slave_0 entered promiscuous mode [ 195.632076] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.638431] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.645435] device bridge_slave_1 entered promiscuous mode [ 195.660507] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 195.669094] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 195.691006] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 195.698018] team0: Port device team_slave_0 added [ 195.703613] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 195.711112] team0: Port device team_slave_1 added [ 195.716234] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 195.723532] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 195.773715] device hsr_slave_0 entered promiscuous mode [ 195.810355] device hsr_slave_1 entered promiscuous mode [ 195.850433] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 195.857232] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 195.869532] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.875884] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.882552] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.888891] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.916904] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 195.923341] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.931735] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 195.939749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.947514] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.954783] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.965105] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 195.971295] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.979248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.986914] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.993271] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.011395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.018911] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.025310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.032612] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.040182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.048060] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.057418] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.069097] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 196.081715] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 196.087752] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.094837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.108229] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 196.118190] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.570424] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:41:16 executing program 2: 20:41:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000008105"]) 20:41:16 executing program 0: 20:41:16 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f00000000c0)={0x2f, "9e5daefd317ed784f168abb3cacf53a949a2dc58bbc7d584487facf18756a9c4", 0x2, 0x1}) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) dup3(r1, r2, 0x0) 20:41:16 executing program 3: 20:41:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:16 executing program 0: 20:41:16 executing program 3: 20:41:16 executing program 2: 20:41:16 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x73) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000040)={'ip6gre0\x00', @ifru_mtu}) 20:41:16 executing program 3: write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0xfffffffffffffff5) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000700)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0xfffffffffffffff6) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x2008000040000408, 0x0, 0x0, 0x0, 0x4c9]}) ioctl$KVM_NMI(r2, 0xae9a) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/39, 0x27}], 0x1}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:41:16 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f00000000c0)={0x2f, "9e5daefd317ed784f168abb3cacf53a949a2dc58bbc7d584487facf18756a9c4", 0x2, 0x1}) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) dup3(r1, r2, 0x0) 20:41:16 executing program 2: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x6c00, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18}}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x333, 0x0) 20:41:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="8000000000000000b1004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000000) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:41:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) 20:41:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000900000409bd91873a7c692"]) [ 197.531444] kasan: CONFIG_KASAN_INLINE enabled [ 197.569765] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 197.593598] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000060 data 0x4d00000000f 20:41:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) [ 197.624367] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 197.630607] Modules linked in: [ 197.633812] CPU: 1 PID: 7889 Comm: syz-executor.2 Not tainted 4.14.134 #30 [ 197.638964] kobject: 'loop1' (ffff8880a499e660): kobject_uevent_env [ 197.640827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.640834] task: ffff888089d00300 task.stack: ffff88805a410000 [ 197.640853] RIP: 0010:rxrpc_connect_call+0xc9/0x41a0 [ 197.640860] RSP: 0018:ffff88805a417738 EFLAGS: 00010206 20:41:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) [ 197.640870] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90013ff2000 [ 197.640877] RDX: 0000000000000003 RSI: ffffffff8593c089 RDI: 0000000000000018 [ 197.640883] RBP: ffff88805a417880 R08: 0000000000000001 R09: ffff888089d00ba0 [ 197.640893] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a5280c00 [ 197.649063] kobject: 'loop1' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 197.656649] R13: ffff88805ac88e20 R14: ffff88805ac88e10 R15: ffff88805a417998 20:41:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000900000409bd91873a7c692"]) [ 197.656657] FS: 00007f9a7b501700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 197.656663] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 197.656668] CR2: 00000000015f01f8 CR3: 000000009482d000 CR4: 00000000001426e0 [ 197.656675] Call Trace: [ 197.656689] ? release_sock+0x14a/0x1b0 [ 197.656705] ? rxrpc_discard_expired_client_conns+0x7e0/0x7e0 [ 197.656718] ? __local_bh_enable_ip+0x99/0x1a0 [ 197.708429] kobject: 'kvm' (ffff888219fb1610): kobject_uevent_env [ 197.711713] ? trace_hardirqs_on_caller+0x400/0x590 [ 197.711725] ? release_sock+0x14a/0x1b0 [ 197.711733] ? trace_hardirqs_on+0xd/0x10 [ 197.711743] ? __local_bh_enable_ip+0x99/0x1a0 [ 197.711753] ? _raw_spin_unlock_bh+0x31/0x40 [ 197.711766] rxrpc_new_client_call+0x8f7/0x1420 [ 197.726446] kobject: 'kvm' (ffff888219fb1610): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 197.727252] ? rxrpc_do_sendmsg+0x91a/0x1103 [ 197.727263] rxrpc_do_sendmsg+0x91a/0x1103 [ 197.727278] ? rxrpc_kernel_send_data+0x470/0x470 [ 197.751031] kobject: 'loop0' (ffff88805b750b60): kobject_uevent_env [ 197.752844] rxrpc_sendmsg+0x48a/0x650 [ 197.757422] kobject: 'loop0' (ffff88805b750b60): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 197.763656] ? security_socket_sendmsg+0x89/0xb0 [ 197.763667] ? rxrpc_sock_destructor+0x130/0x130 [ 197.763676] sock_sendmsg+0xce/0x110 [ 197.763684] ___sys_sendmsg+0x349/0x840 [ 197.763694] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 197.763707] ? __fget+0x210/0x370 [ 197.763724] ? lock_downgrade+0x6e0/0x6e0 [ 197.786759] kobject: 'kvm' (ffff888219fb1610): kobject_uevent_env [ 197.790517] ? __fget+0x237/0x370 [ 197.790533] ? __fget_light+0x172/0x1f0 [ 197.790542] ? __fdget+0x1b/0x20 [ 197.790551] ? sockfd_lookup_light+0xb4/0x160 [ 197.790562] __sys_sendmmsg+0x152/0x3a0 [ 197.790572] ? SyS_sendmsg+0x50/0x50 [ 197.790588] ? kasan_check_read+0x11/0x20 [ 197.790598] ? _copy_to_user+0x87/0xd0 [ 197.790611] ? put_timespec64+0xb4/0x100 [ 197.806670] kobject: 'kvm' (ffff888219fb1610): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 197.808241] ? nsecs_to_jiffies+0x30/0x30 [ 197.808257] ? SyS_clock_gettime+0xf8/0x180 [ 197.808271] SyS_sendmmsg+0x35/0x60 [ 197.924256] ? __sys_sendmmsg+0x3a0/0x3a0 [ 197.928398] do_syscall_64+0x1e8/0x640 [ 197.932274] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 197.937105] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 197.942298] RIP: 0033:0x459829 [ 197.945477] RSP: 002b:00007f9a7b500c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 197.953174] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459829 [ 197.960447] RDX: 0000000000000001 RSI: 0000000020005c00 RDI: 0000000000000004 [ 197.967701] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 197.974956] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9a7b5016d4 [ 197.982216] R13: 00000000004c6fe8 R14: 00000000004dc518 R15: 00000000ffffffff [ 197.989485] Code: e8 03 80 3c 18 00 0f 85 6f 39 00 00 48 8b 85 28 ff ff ff 48 8b 18 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 8a 39 00 00 48 8b 5b 18 48 8d bb 00 02 00 00 [ 198.008696] RIP: rxrpc_connect_call+0xc9/0x41a0 RSP: ffff88805a417738 20:41:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDADDIO(r0, 0x4b34, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$VT_ACTIVATE(r1, 0x5606, 0x4) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x5, 0x4, 0x7}) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[@pktinfo={{0x24, 0x29, 0x32, {@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @pktinfo={{0x24, 0x29, 0x32, {@remote}}}], 0x50}, 0x0) 20:41:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107) [ 198.031146] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000002b data 0x4d00000000f [ 198.034204] kobject: 'loop5' (ffff8880a4ad32e0): kobject_uevent_env [ 198.046703] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000008c data 0x4d00000000f [ 198.054597] kobject: 'loop5' (ffff8880a4ad32e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 198.072024] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000057 data 0x4d00000000f 20:41:17 executing program 5: r0 = socket(0xa, 0x3, 0x7f) r1 = userfaultfd(0x0) r2 = getpgrp(0x0) ioprio_set$pid(0x1, r2, 0x2) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x136}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000280)={{&(0x7f000090c000/0x1000)=nil, 0x1000}, 0x1}) mlock2(&(0x7f000090c000/0x2000)=nil, 0x2000, 0x0) dup3(r0, r1, 0x0) [ 198.076510] kobject: 'kvm' (ffff888219fb1610): kobject_uevent_env [ 198.087710] kobject: 'kvm' (ffff888219fb1610): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 198.093873] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000022 data 0x4d00000000f [ 198.108782] kobject: 'loop1' (ffff8880a499e660): kobject_uevent_env [ 198.121744] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000004e data 0x4d00000000f [ 198.133328] kobject: 'loop1' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 198.140296] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000019 data 0x4d00000000f [ 198.155375] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000007a data 0x4d00000000f [ 198.165196] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000045 data 0x4d00000000f [ 198.167469] kobject: 'loop4' (ffff8880a4a3d260): kobject_uevent_env [ 198.176951] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000003f data 0x4d00000000f [ 198.181912] kobject: 'loop4' (ffff8880a4a3d260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 198.201769] kobject: 'loop1' (ffff8880a499e660): kobject_uevent_env [ 198.218664] kobject: 'loop1' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 198.228843] kobject: 'loop0' (ffff88805b750b60): kobject_uevent_env [ 198.238194] kobject: 'kvm' (ffff888219fb1610): kobject_uevent_env [ 198.244544] kobject: 'loop0' (ffff88805b750b60): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 198.248860] kobject: 'kvm' (ffff888219fb1610): kobject_uevent_env [ 198.254550] kobject: 'kvm' (ffff888219fb1610): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 198.262562] kobject: 'kvm' (ffff888219fb1610): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 198.274106] kobject: 'loop5' (ffff8880a4ad32e0): kobject_uevent_env [ 198.281491] kasan: CONFIG_KASAN_INLINE enabled [ 198.289829] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 198.294781] kobject: 'loop5' (ffff8880a4ad32e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 198.301888] general protection fault: 0000 [#2] PREEMPT SMP KASAN [ 198.312863] Modules linked in: [ 198.316060] CPU: 1 PID: 7936 Comm: syz-executor.2 Tainted: G D 4.14.134 #30 [ 198.324575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.334130] task: ffff8880823ec700 task.stack: ffff888059f78000 [ 198.340316] RIP: 0010:rxrpc_connect_call+0xc9/0x41a0 [ 198.345417] RSP: 0018:ffff888059f7f738 EFLAGS: 00010206 [ 198.350779] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc900143f4000 [ 198.358054] RDX: 0000000000000003 RSI: ffffffff8593c089 RDI: 0000000000000018 [ 198.365324] RBP: ffff888059f7f880 R08: 0000000000000000 R09: 0000000000000000 [ 198.372594] R10: 0000000000000000 R11: ffff8880823ec700 R12: ffff88808b5d9c00 [ 198.379868] R13: ffff88805ac88e20 R14: ffff8880a5280d60 R15: ffff888059f7f998 [ 198.387153] FS: 00007f9a7b4bf700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 198.391050] kobject: 'kvm' (ffff888219fb1610): kobject_uevent_env [ 198.395901] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 198.395907] CR2: 00007f9a7b4bedb8 CR3: 000000009482d000 CR4: 00000000001426e0 [ 198.395913] Call Trace: [ 198.395931] ? rxrpc_new_client_call+0x3bd/0x1420 [ 198.402488] kobject: 'kvm' (ffff888219fb1610): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 198.408025] ? mutex_trylock+0x1c0/0x1c0 [ 198.408039] ? rxrpc_discard_expired_client_conns+0x7e0/0x7e0 [ 198.441737] ? lock_downgrade+0x6e0/0x6e0 [ 198.445874] ? release_sock+0x14a/0x1b0 [ 198.449842] ? trace_hardirqs_on+0xd/0x10 [ 198.453980] ? __local_bh_enable_ip+0x99/0x1a0 [ 198.458549] ? _raw_spin_unlock_bh+0x31/0x40 [ 198.462949] rxrpc_new_client_call+0x8f7/0x1420 [ 198.467705] ? rxrpc_do_sendmsg+0x91a/0x1103 [ 198.472117] rxrpc_do_sendmsg+0x91a/0x1103 [ 198.476353] ? rxrpc_sendmsg+0x60/0x650 [ 198.480398] ? rxrpc_kernel_send_data+0x470/0x470 [ 198.485237] ? __local_bh_enable_ip+0x99/0x1a0 [ 198.489814] rxrpc_sendmsg+0x48a/0x650 [ 198.493691] ? security_socket_sendmsg+0x89/0xb0 [ 198.498439] ? rxrpc_sock_destructor+0x130/0x130 [ 198.503183] sock_sendmsg+0xce/0x110 [ 198.506883] ___sys_sendmsg+0x349/0x840 [ 198.510848] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 198.515594] ? wake_up_q+0x95/0xf0 [ 198.519139] ? futex_wake+0x134/0x430 [ 198.522933] ? lock_downgrade+0x6e0/0x6e0 [ 198.527073] ? __fget+0x237/0x370 [ 198.530516] ? __fget_light+0x172/0x1f0 [ 198.534480] ? __fdget+0x1b/0x20 [ 198.537830] ? sockfd_lookup_light+0xb4/0x160 [ 198.542312] __sys_sendmmsg+0x152/0x3a0 [ 198.546275] ? SyS_sendmsg+0x50/0x50 [ 198.549986] ? kasan_check_read+0x11/0x20 [ 198.554128] ? _copy_to_user+0x87/0xd0 [ 198.558021] ? put_timespec64+0xb4/0x100 [ 198.562076] ? nsecs_to_jiffies+0x30/0x30 [ 198.566216] ? SyS_clock_gettime+0xf8/0x180 [ 198.570529] SyS_sendmmsg+0x35/0x60 [ 198.574143] ? __sys_sendmmsg+0x3a0/0x3a0 [ 198.578277] do_syscall_64+0x1e8/0x640 [ 198.582154] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 198.586995] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 198.592179] RIP: 0033:0x459829 [ 198.595353] RSP: 002b:00007f9a7b4bec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 198.603051] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459829 [ 198.610309] RDX: 0000000000000001 RSI: 0000000020005c00 RDI: 0000000000000004 [ 198.617565] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 198.624826] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9a7b4bf6d4 [ 198.632084] R13: 00000000004c6fe8 R14: 00000000004dc518 R15: 00000000ffffffff [ 198.639343] Code: e8 03 80 3c 18 00 0f 85 6f 39 00 00 48 8b 85 28 ff ff ff 48 8b 18 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 8a 39 00 00 48 8b 5b 18 48 8d bb 00 02 00 00 [ 198.658550] RIP: rxrpc_connect_call+0xc9/0x41a0 RSP: ffff888059f7f738 [ 198.666607] ---[ end trace ff01d88d595b687e ]--- [ 198.671453] Kernel panic - not syncing: Fatal exception [ 198.677716] Kernel Offset: disabled [ 198.681331] Rebooting in 86400 seconds..