syzkaller login: [ 41.402933] audit: type=1400 audit(1569496745.010:35): avc: denied { map } for pid=7482 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.1.31' (ECDSA) to the list of known hosts. 2019/09/26 11:19:11 fuzzer started [ 47.993998] audit: type=1400 audit(1569496751.600:36): avc: denied { map } for pid=7491 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/09/26 11:19:12 dialing manager at 10.128.0.105:40603 2019/09/26 11:19:13 syscalls: 2488 2019/09/26 11:19:13 code coverage: enabled 2019/09/26 11:19:13 comparison tracing: enabled 2019/09/26 11:19:13 extra coverage: extra coverage is not supported by the kernel 2019/09/26 11:19:13 setuid sandbox: enabled 2019/09/26 11:19:13 namespace sandbox: enabled 2019/09/26 11:19:13 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/26 11:19:13 fault injection: enabled 2019/09/26 11:19:13 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/26 11:19:13 net packet injection: enabled 2019/09/26 11:19:13 net device setup: enabled 11:21:47 executing program 0: syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f00000000c0)={0xa}) r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0xc4c85513, &(0x7f0000000580)={0xa, 0x0, 0x0, 0x0, 'syz0\x00'}) [ 203.428719] audit: type=1400 audit(1569496907.030:37): avc: denied { map } for pid=7510 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 203.510749] IPVS: ftp: loaded support on port[0] = 21 11:21:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r3}]]}}}]}, 0x38}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x304}, 0x9c) [ 203.612422] chnl_net:caif_netlink_parms(): no params data found [ 203.667991] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.683956] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.702539] device bridge_slave_0 entered promiscuous mode [ 203.722184] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.728760] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.736319] device bridge_slave_1 entered promiscuous mode [ 203.776072] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 203.792830] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 203.816379] IPVS: ftp: loaded support on port[0] = 21 [ 203.832517] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 203.843970] team0: Port device team_slave_0 added 11:21:47 executing program 2: getrusage(0xffffffffffffffff, &(0x7f0000000440)) [ 203.861381] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 203.868855] team0: Port device team_slave_1 added [ 203.894975] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 203.904566] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 11:21:47 executing program 3: getrusage(0x0, &(0x7f0000000440)) [ 204.034171] device hsr_slave_0 entered promiscuous mode [ 204.072539] device hsr_slave_1 entered promiscuous mode [ 204.112760] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 204.119748] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 204.166253] IPVS: ftp: loaded support on port[0] = 21 [ 204.166259] IPVS: ftp: loaded support on port[0] = 21 [ 204.183995] chnl_net:caif_netlink_parms(): no params data found [ 204.199151] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.205709] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.212738] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.219111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.324315] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.330684] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.338999] device bridge_slave_0 entered promiscuous mode [ 204.347768] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.355073] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.363251] device bridge_slave_1 entered promiscuous mode 11:21:48 executing program 4: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f0000000200)=""/45, 0x2d}], 0x1) [ 204.429394] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 204.437367] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.445154] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 204.496468] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 204.516357] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 204.585961] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 204.593801] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.600243] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 204.610302] team0: Port device team_slave_0 added [ 204.615906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.624757] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.642654] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.652398] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 204.670643] IPVS: ftp: loaded support on port[0] = 21 11:21:48 executing program 5: r0 = socket(0xa, 0x80803, 0x9) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) [ 204.687274] chnl_net:caif_netlink_parms(): no params data found [ 204.698991] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 204.707057] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 204.717786] team0: Port device team_slave_1 added [ 204.724481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.734979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.742990] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.749355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.770622] chnl_net:caif_netlink_parms(): no params data found [ 204.785982] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 204.801939] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 204.823191] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 204.862993] device hsr_slave_0 entered promiscuous mode [ 204.901647] device hsr_slave_1 entered promiscuous mode [ 204.959558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.967775] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.975466] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.981859] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.993145] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 205.016124] IPVS: ftp: loaded support on port[0] = 21 [ 205.024967] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 205.035909] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 205.064399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.089914] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 205.099961] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.107453] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.115108] device bridge_slave_0 entered promiscuous mode [ 205.128426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.148969] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 205.156198] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.162740] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.169672] device bridge_slave_1 entered promiscuous mode [ 205.181066] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.188428] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.195488] device bridge_slave_0 entered promiscuous mode [ 205.204315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.213434] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.221073] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.230282] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 205.243339] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.249765] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.257507] device bridge_slave_1 entered promiscuous mode [ 205.275625] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 205.287642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.295378] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.305157] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 205.319297] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 205.330435] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 205.339494] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 205.350296] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 205.378448] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.385995] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.402372] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 205.410136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.419050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.427263] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 205.435282] team0: Port device team_slave_0 added [ 205.445945] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 205.454369] team0: Port device team_slave_0 added [ 205.461593] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 205.468803] team0: Port device team_slave_1 added [ 205.474294] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 205.482979] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 205.488984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.496999] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 205.504335] team0: Port device team_slave_1 added [ 205.518467] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 205.544807] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 205.613045] device hsr_slave_0 entered promiscuous mode [ 205.651527] device hsr_slave_1 entered promiscuous mode [ 205.692281] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 205.700158] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 205.717426] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 205.747574] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 205.813192] device hsr_slave_0 entered promiscuous mode [ 205.851546] device hsr_slave_1 entered promiscuous mode [ 205.912078] chnl_net:caif_netlink_parms(): no params data found [ 205.924970] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 205.932147] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 205.939486] chnl_net:caif_netlink_parms(): no params data found [ 205.948123] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 206.002188] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.008567] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.015738] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.023099] device bridge_slave_0 entered promiscuous mode [ 206.049776] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.056665] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.063895] device bridge_slave_0 entered promiscuous mode [ 206.070805] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.077498] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.084916] device bridge_slave_1 entered promiscuous mode [ 206.091774] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.098132] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.105283] device bridge_slave_1 entered promiscuous mode [ 206.124791] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.146498] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 206.158035] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 206.167728] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 206.177011] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 206.185930] audit: type=1400 audit(1569496909.780:38): avc: denied { associate } for pid=7511 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 206.217010] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 206.230163] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 206.242980] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 206.272311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 206.279208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.306430] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 206.314884] 8021q: adding VLAN 0 to HW filter on device team0 11:21:49 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00*\x1fj\x15\xd7\x19\xa6v\xae%79\x1c\a\xcf\xd4\xdbj~3[?A\xd1\x00\x8f\xa6cs\xa3F\xf6D\xb6h\tz\a;') fcntl$notify(0xffffffffffffffff, 0x402, 0x39) getdents64(r0, 0x0, 0x2e5452f6) [ 206.339189] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 206.349197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.357170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.366212] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.372627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.380793] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 206.388582] team0: Port device team_slave_0 added 11:21:50 executing program 0: unshare(0x40000000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000280)={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00'}, &(0x7f0000000300)=0x44) [ 206.410275] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 206.417693] team0: Port device team_slave_1 added [ 206.424291] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 206.434825] team0: Port device team_slave_0 added [ 206.461944] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.469722] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 206.483885] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.495945] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 206.509336] team0: Port device team_slave_1 added [ 206.512362] IPVS: ftp: loaded support on port[0] = 21 [ 206.516290] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 206.531892] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 206.540280] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 206.551080] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 206.561834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.573179] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.580711] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.587080] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.644237] device hsr_slave_0 entered promiscuous mode [ 206.701543] device hsr_slave_1 entered promiscuous mode [ 206.742556] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 206.749865] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 206.777452] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 206.787863] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 206.796048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 206.805923] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 206.821741] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.828256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 206.835326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.844192] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 206.850449] 8021q: adding VLAN 0 to HW filter on device team0 [ 206.862890] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 206.880480] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 206.888925] IPVS: ftp: loaded support on port[0] = 21 [ 206.895533] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 206.908066] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 206.917638] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 206.925628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 206.934828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.944024] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.951751] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.958139] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.965054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.981815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.989467] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.995856] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.002837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.010743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.018612] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 207.025825] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 207.063128] device hsr_slave_0 entered promiscuous mode [ 207.101560] device hsr_slave_1 entered promiscuous mode [ 207.161841] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 207.168801] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 207.181924] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 207.189910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 207.197287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 207.206097] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 207.224632] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 207.230728] 8021q: adding VLAN 0 to HW filter on device team0 [ 207.238486] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 207.261918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.269984] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.279985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 207.293407] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 207.309374] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 207.320055] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 207.340702] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 207.357961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 207.365726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 207.373415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.381690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.389363] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.395766] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.403116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 207.412085] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 207.419540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 207.427331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 207.435329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 207.445845] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 207.459006] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 207.478617] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 207.484944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 207.492179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.500258] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.509224] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.515631] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.524073] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 207.543722] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 207.573307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.589188] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.597618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 207.614235] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 207.631892] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 207.641062] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 207.674432] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 207.682839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.690707] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.699175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 207.714143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.726224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.738495] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 207.767764] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 207.779189] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 207.797807] 8021q: adding VLAN 0 to HW filter on device bond0 [ 207.808414] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 207.819358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 207.830258] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 207.844671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.855908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.876884] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 207.896143] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 207.908068] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 207.920155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 207.935226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 207.946589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 207.958172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 207.970715] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 207.977075] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 207.985138] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 208.010021] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.032147] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 208.040432] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 208.057376] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 208.065377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 208.087972] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 208.102418] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 208.113482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 208.125077] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 208.134401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.148487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.178567] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 208.194094] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 208.200181] 8021q: adding VLAN 0 to HW filter on device team0 [ 208.219941] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 208.238610] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 208.253587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.260626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.279285] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 208.295630] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 208.302943] 8021q: adding VLAN 0 to HW filter on device team0 [ 208.314427] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 208.333260] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.352049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.378769] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.385209] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.414015] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 208.423355] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 208.434310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 208.440657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.454132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 11:21:52 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet_opts(0xffffffffffffff9c, 0x0, 0xd, 0x0, &(0x7f00000001c0)) [ 208.469023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.488504] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.494946] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.531560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.539747] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.554389] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.560813] bridge0: port 1(bridge_slave_0) entered forwarding state 11:21:52 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = shmget(0x3, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_LOCK(r3, 0x2) socketpair$unix(0x1, 0x5, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) getgid() gettid() shmctl$IPC_SET(0x0, 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0xa1000, 0x0) socket$inet6(0xa, 0x0, 0x8010000000000084) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x1, 0x0, {0x3}}, 0x18) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x602040, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x107fff) [ 208.576692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.588673] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 208.603176] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 11:21:52 executing program 2: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) [ 208.634103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.666894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.690639] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.697074] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.726329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 208.750834] audit: type=1400 audit(1569496912.350:39): avc: denied { map } for pid=7562 comm="syz-executor.1" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=27589 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 [ 208.752271] hrtimer: interrupt took 36384 ns [ 208.787000] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 11:21:52 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x29cb5a25, &(0x7f0000000340), 0x0, 0x0, 0xffbe}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) llistxattr(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 11:21:52 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/251, 0xfb, 0x40000202, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x129, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xd54, 0x20840) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x5, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000100)) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) mprotect(&(0x7f0000015000/0x2000)=nil, 0x2000, 0x8) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f0000000100)) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000900)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x1010}, 0x40840) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) [ 208.818286] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 208.839791] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 208.856468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 208.878781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 208.896997] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 208.924625] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 208.947884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 208.967732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 208.984322] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 208.997843] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.009125] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 209.032636] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 209.047181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.060496] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 11:21:52 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x0, 0x7530}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup2(r0, r0) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x20000000) [ 209.086447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.100870] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.113097] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 209.122823] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 209.153362] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 209.160525] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.173063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 209.205339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.216442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.228748] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.238566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 11:21:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x40, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x9) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCGETA(r0, 0x5408, &(0x7f0000000080)) 11:21:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 209.250019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.264474] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 209.279896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 209.293545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.341060] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 209.365877] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 209.367396] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 209.376488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 209.403486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 209.423155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.443276] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 209.449350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 209.525068] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 209.554449] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 209.564582] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 209.645007] 8021q: adding VLAN 0 to HW filter on device batadv0 11:21:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x0, 0x7, 0xffffffffffffffef, 0x0, 0x0, {}, [@typed={0x8, 0x1, @u32=0x8}]}, 0x1c}}, 0x0) 11:21:53 executing program 2: clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="d3d2b53c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2c000013acbf5e632be02e000100", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x2a}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="f9be9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed562db3bb44ff41553b7c8428b8e39808e0b61a0ac073d906da58a5d5ab066f24351eda621e80000000000005dbc1b227d10d8ea", @ANYRESHEX, @ANYPTR64, @ANYRESOCT, @ANYRES32, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2bc40dd887fc8dc4872bf5b65c87e940b30eecd4f9ad4c079521dfdaf3d0fef515586de3c101e4f8d1b12b1894ef983d0cfcdfbb1118c5ae", @ANYRESHEX], 0x0, 0x120}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:21:53 executing program 1: timer_create(0xfffffffffffffffd, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000240)=0x7ff, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) rt_sigqueueinfo(r0, 0x38, &(0x7f0000000080)={0x26, 0x5, 0x4f4b}) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000540)=@generic={0x2, 0x0, 0x5}) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) fchdir(r2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000380)) r4 = creat(&(0x7f0000000a40)='./bus\x00', 0xa) creat(&(0x7f0000000080)='./bus\x00', 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x26880, 0x0) ioctl$FS_IOC_SETVERSION(r5, 0x40047602, &(0x7f00000000c0)=0xfff) lseek(r4, 0x20000010000, 0x2) 11:21:53 executing program 3: getpid() syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 11:21:53 executing program 0: unshare(0x40000000) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000280)={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00'}, &(0x7f0000000300)=0x44) 11:21:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) [ 209.836745] IPVS: ftp: loaded support on port[0] = 21 [ 209.869764] audit: type=1400 audit(1569496913.470:40): avc: denied { create } for pid=7622 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 11:21:53 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x2, 0x2) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x40000000001f, 0x0, 0x64}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={0x0}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x10, 0xffffffffffffffff, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {0x0, 0x0, 0x6a, 0x8f60}, 0x3f, [0x1, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x1, 0x3, 0x2, 0x8, 0x0, 0x3ff, 0x0, 0x5, 0x3, 0x9, 0x2, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x5, 0x3f, 0x20, 0x0, 0x401, 0x4, 0x0, 0x0, 0x0, 0x7, 0x0, 0x5, 0x0, 0x40, 0x1ff, 0x0, 0x0, 0x8, 0x0, 0xb15, 0xfffffffffffffffe, 0x8, 0xae8, 0x5, 0x101, 0x0, 0xfffffffffffffff7, 0x9, 0x0, 0x7, 0x1000, 0x0, 0x0, 0x5, 0xfffffffffffffff8, 0x9, 0x800, 0x2], [0x3, 0xfffffffffffffff9, 0x2, 0x2, 0x7, 0x8000, 0x1000, 0x0, 0x0, 0x100000000, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x8ffe, 0x1, 0x0, 0xe27, 0xe3, 0x0, 0x100, 0x1, 0x8, 0x7, 0x10001, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x8001, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x6, 0x9, 0x9, 0x43, 0x6, 0x9, 0x8, 0x8000, 0x1, 0x0, 0x5, 0x0, 0x6, 0x0, 0x4, 0x0, 0x2, 0x7, 0x8000, 0x0, 0x8, 0xab0], [0x4, 0x1f, 0xfff, 0x4, 0x0, 0x7, 0x0, 0x200, 0x0, 0x0, 0x4, 0x3ff, 0xc5, 0x7f, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xff, 0x0, 0x400, 0x0, 0x0, 0x4, 0x8, 0x7fff, 0x0, 0xffff, 0x8, 0x4, 0xd, 0x80000000, 0x6, 0x20, 0x0, 0x0, 0x3, 0x0, 0x2, 0x3, 0x0, 0x6, 0x0, 0x0, 0x7, 0x800, 0x0, 0x40, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x7fff, 0x1, 0x9, 0x800, 0x2, 0x7, 0x2], [0x2, 0x2325, 0x5d, 0x0, 0x0, 0x0, 0x8de, 0x10001, 0xffff, 0x3ff, 0x401, 0xe16, 0x2, 0x3, 0x0, 0x0, 0x200, 0x401, 0x0, 0x0, 0x7, 0x5, 0x1c8, 0x40, 0x22, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x81, 0x0, 0x0, 0x3, 0x10000, 0xfffffffffffff000, 0x1, 0x20, 0x10000000, 0x0, 0x0, 0x6, 0x3, 0x6878000000000000, 0x9, 0x3ff, 0x2, 0x0, 0x0, 0x2, 0x9, 0x8, 0x60ef, 0x8, 0x0, 0x80, 0x7fffffff, 0x0, 0x0, 0x2, 0x100, 0x2]}, 0x45c) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 11:21:53 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x26) connect$l2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x32) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4042, 0x0) write$input_event(r1, &(0x7f0000000380)={{}, 0x5, 0xfffffffffffffff7, 0x2}, 0x10) getsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000200), &(0x7f0000000340)=0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x2024, 0x1}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000500)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xfffffffffffffefd) r3 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@ipv4, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, &(0x7f0000000ac0)=0xe8) syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x9, &(0x7f0000000780)=[{&(0x7f0000000200)="939dca2bd1ab3ba735fd2dce4e8263a6bbbd11e278d6aec1784d699ba4df7d48df0f22567e4d7845afc86e1695879cf08bc4aa49f5501e63962495cf930a35aeff74a6a9e50ec9ee04fd2ce41ce6d88ace6ddcf1faaabf2799a1f4d782b9586b8abb7d37224e200bbde774ff154c47feae13c92f5354b358b613c815eb389a9687028176d299a9362a60e3e11c88f3c59b4e2299713c4ec6fb62549dcd2f1af5c0203aa6f4f631bda0b4f76cfe", 0xad, 0x7}, {&(0x7f0000000100)="abeba5c2bb95c2ec04cf23783eab15404d78d7124e849b7e413cde9e54888ab441ee552f559febc0acd6eaceccbbbd09b86fec71348e723fab628ab0b6fbe1b9a428ff9e25", 0x45, 0x5}, {&(0x7f00000002c0), 0x0, 0x7}, {&(0x7f0000000340)="558acfbe1646ec691d62f39fe362734dcb7114a8d5b3a6608c79319219e48d5573a7372f8c43156cca1994f56097ad6cd0c867ec19c66392daf411cd314fbdbd434b36f19f4f732dbe241cdc9a29d363", 0x50, 0x2}, {&(0x7f00000003c0), 0x0, 0xffffffff}, {0x0, 0x0, 0x6}, {&(0x7f0000000600)="36ced7819f5f3711388dfafdd1dea4b58422f0fda24f562380b7737689e3aa357d7e34176ee66890a57253370ed26eb84704e0f7fd36a837fbc861fed1c5544ae9d57df355b3d4d070d0ada33ca89e2e0b0bdbc03e4826073484aa03bbb6fd1bb5f54286f76f404e4c545314a24956ec45bd78c9fc2b746d078e2bf3120b4fd829f94339f177deb1c25b929ada50ae802664fcfb9af86cabdeeb6bc2e55d197309440964a759a28e145c5794b0e7cf2d8e8534485b8e67f92572138b", 0xbc}, {&(0x7f00000006c0), 0x0, 0xc64f}, {&(0x7f0000000700)="6e0377858a8b3e3e987527316eda2a05ec2f872c4bfdbcff07b0e13c597beaf7aec6e33909cbf5ecc1273f4cdcafdc0bee0fcc7916164db05745bb6c143625638ed938c96cf6522312d2fb481d201507dfd9aa", 0x53}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<', r2}}, {@euid_lt={'euid<', r4}}, {@smackfstransmute={'smackfstransmute'}}, {@euid_gt={'euid>', r5}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@smackfsfloor={'smackfsfloor'}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) r6 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, r6, 0x0) r7 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r8 = socket(0x0, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r9 = socket(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r9, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000300)={r10, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r9, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) fcntl$getown(r8, 0x9) ioctl$FICLONE(r6, 0x40049409, r8) r11 = syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r8, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000600)=ANY=[@ANYBLOB="24010000", @ANYRES16=r11, @ANYBLOB="000426bd7000fedbdf250300000008000100", @ANYRES32=r10, @ANYBLOB="bc00020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000100000008000600", @ANYRES32, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000700000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r10, @ANYBLOB="080007000000000008000100", @ANYRES32=r10, @ANYBLOB="4400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r10, @ANYBLOB], 0x124}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$unix(r8, &(0x7f00000002c0)={&(0x7f00000003c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x40021}, 0x4004000) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/cachefiles\x00', 0x110441, 0x0) r13 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r13, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x100a}], 0x1) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r13, 0x84, 0x76, &(0x7f0000000d40)={0x0, 0x3}, &(0x7f0000000d80)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r12, 0x84, 0x23, &(0x7f0000000dc0)={r14}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) r15 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r15, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x100a}], 0x1) recvfrom$inet6(r15, 0x0, 0x0, 0x40000000, &(0x7f0000000cc0)={0xa, 0x4e20, 0xe8, @mcast2, 0x5d8300}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:21:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x2, 0x300) sendmsg(r2, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1000000003}, 0x80, 0x0}, 0x0) [ 209.968150] audit: type=1400 audit(1569496913.510:41): avc: denied { write } for pid=7622 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 11:21:53 executing program 4: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:21:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x5, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 210.253275] audit: type=1400 audit(1569496913.860:42): avc: denied { create } for pid=7639 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 11:21:53 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1a) [ 210.290673] audit: type=1400 audit(1569496913.860:43): avc: denied { write } for pid=7639 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 11:21:53 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = dup2(r0, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r2, 0xc1205531, &(0x7f00000002c0)={0xd0d, 0x10000, 0xdf, 0x5, [], [], [], 0x1, 0xfffffffffffffffb, 0x0, 0x0, "72f3d8da8e01d41f55c34b9e0701381c"}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = shmget(0x3, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_LOCK(r4, 0x2) socketpair$unix(0x1, 0x5, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) setresuid(0x0, 0x0, 0x0) getgid() gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x8010000000000084) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x1, 0x0, {0x3}}, 0x18) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x602040, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, 0x0, &(0x7f0000000240)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 11:21:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = dup(r0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x4) [ 210.457178] audit: type=1400 audit(1569496913.860:44): avc: denied { read } for pid=7639 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 11:21:54 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000010010000010000007700000000000000f41b25e416d58937e7e899e0524843c9"], 0x28}}], 0x1, 0x0) 11:21:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000004939405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab35f4ad614fd33cebbc150bb2b03b5b2461179f5f98cba001b50c0da6218a8106df2858ec973328e5a2c078a3fe3b520202008c5563e58a27dc36271a9", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 210.642241] audit: type=1400 audit(1569496913.860:45): avc: denied { map_create } for pid=7639 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 210.864945] IPVS: ftp: loaded support on port[0] = 21 11:21:54 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x50}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") sendmmsg(r0, &(0x7f0000000180), 0xf0c887bdf013d536, 0x0) 11:21:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14, r1, 0xb20976689abf09df, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) 11:21:54 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:21:54 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000140)={0x1f}, 0x4) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x2, 0x2) r2 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x40000000001f, 0x0, 0x64}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) write$uinput_user_dev(r2, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {0x0, 0x1, 0x6a, 0x8f60}, 0x3f, [0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x2, 0x8, 0x0, 0x3ff, 0x0, 0x5, 0x3, 0x9, 0x2, 0x2, 0x3, 0x4, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7, 0x0, 0x5, 0x0, 0x40, 0x1ff, 0x0, 0x0, 0x8, 0x6, 0xb15, 0xfffffffffffffffe, 0x8, 0xae8, 0x5, 0x0, 0x0, 0xfffffffffffffff7, 0x9, 0x0, 0x7, 0x1000, 0x0, 0x0, 0x5, 0xfffffffffffffff8, 0x0, 0x800, 0x2, 0x0, 0x0, 0xffffffffffff0001], [0x3, 0x0, 0x2, 0x2, 0x7, 0x8000, 0x1000, 0x0, 0xbe, 0x100000000, 0x1, 0x1, 0x0, 0x0, 0x5, 0x4, 0x8ffe, 0x1, 0x0, 0xe27, 0x0, 0x0, 0x100, 0x1, 0x8, 0x7, 0x10001, 0x0, 0x7ff, 0x6, 0x0, 0x7fff, 0xfffffffffffffffb, 0x80000000, 0x2, 0x8001, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x43, 0x6, 0x9, 0x8, 0x8000, 0x1, 0x0, 0x5, 0x3ae9, 0x6, 0x0, 0x4, 0x9, 0x2, 0x0, 0x8000, 0x0, 0x8, 0xab0], [0x4, 0x1f, 0xfff, 0x4, 0x0, 0x7, 0x0, 0x200, 0x0, 0x0, 0x4, 0x3ff, 0xc5, 0x7f, 0x0, 0x0, 0xfffffffffffffff9, 0x6, 0x4, 0xff, 0x0, 0x400, 0x0, 0x7, 0x4, 0x8, 0x7fff, 0x0, 0xffff, 0x0, 0x4, 0xd, 0x80000000, 0x6, 0x20, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x80000001, 0x6, 0x0, 0x0, 0x7, 0x800, 0x0, 0x40, 0x200, 0x7ff, 0x0, 0x0, 0x0, 0x8000, 0x3ff, 0x7fff, 0x1, 0x9, 0x800, 0x2, 0x7, 0x2, 0x7], [0x2, 0x2325, 0x5d, 0x0, 0x10000, 0x0, 0x8de, 0x10001, 0xffff, 0x3ff, 0x401, 0xe16, 0x2, 0x3, 0x2, 0x1, 0x200, 0x401, 0x0, 0x0, 0x7, 0x5, 0x1c8, 0x40, 0x22, 0x0, 0x0, 0x9, 0x9, 0x5, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x10000, 0xfffffffffffff000, 0x1, 0x20, 0x10000000, 0x1, 0x0, 0x6, 0x3, 0x6878000000000000, 0x0, 0x3ff, 0x2, 0x0, 0x2, 0x2, 0x9, 0x8, 0x60ef, 0x8, 0xffffffffafd63bfb, 0x0, 0x7fffffff, 0x8, 0x0, 0x2, 0x100, 0x2]}, 0x45c) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 11:21:54 executing program 4: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:21:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x5, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x50}}, 0x0) 11:21:54 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:21:54 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:21:54 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x25, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000140)='./file0/bus\x00', 0x0) 11:21:54 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:21:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") clone(0x200000041fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() pause() ptrace(0x10, r1) ptrace$getsig(0x2, r1, 0xffffffffff600043, &(0x7f0000000000)) 11:21:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = inotify_init() r3 = inotify_add_watch(r2, &(0x7f0000000000)='.\x00', 0x1) inotify_rm_watch(r2, r3) 11:21:55 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000140)={0x1f}, 0x4) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x2, 0x2) r2 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x40000000001f, 0x0, 0x64}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) write$uinput_user_dev(r2, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {0x0, 0x1, 0x6a, 0x8f60}, 0x3f, [0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x2, 0x8, 0x0, 0x3ff, 0x0, 0x5, 0x3, 0x9, 0x2, 0x2, 0x3, 0x4, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7, 0x0, 0x5, 0x0, 0x40, 0x1ff, 0x0, 0x0, 0x8, 0x6, 0xb15, 0xfffffffffffffffe, 0x8, 0xae8, 0x5, 0x0, 0x0, 0xfffffffffffffff7, 0x9, 0x0, 0x7, 0x1000, 0x0, 0x0, 0x5, 0xfffffffffffffff8, 0x0, 0x800, 0x2, 0x0, 0x0, 0xffffffffffff0001], [0x3, 0x0, 0x2, 0x2, 0x7, 0x8000, 0x1000, 0x0, 0xbe, 0x100000000, 0x1, 0x1, 0x0, 0x0, 0x5, 0x4, 0x8ffe, 0x1, 0x0, 0xe27, 0x0, 0x0, 0x100, 0x1, 0x8, 0x7, 0x10001, 0x0, 0x7ff, 0x6, 0x0, 0x7fff, 0xfffffffffffffffb, 0x80000000, 0x2, 0x8001, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x43, 0x6, 0x9, 0x8, 0x8000, 0x1, 0x0, 0x5, 0x3ae9, 0x6, 0x0, 0x4, 0x9, 0x2, 0x0, 0x8000, 0x0, 0x8, 0xab0], [0x4, 0x1f, 0xfff, 0x4, 0x0, 0x7, 0x0, 0x200, 0x0, 0x0, 0x4, 0x3ff, 0xc5, 0x7f, 0x0, 0x0, 0xfffffffffffffff9, 0x6, 0x4, 0xff, 0x0, 0x400, 0x0, 0x7, 0x4, 0x8, 0x7fff, 0x0, 0xffff, 0x0, 0x4, 0xd, 0x80000000, 0x6, 0x20, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x80000001, 0x6, 0x0, 0x0, 0x7, 0x800, 0x0, 0x40, 0x200, 0x7ff, 0x0, 0x0, 0x0, 0x8000, 0x3ff, 0x7fff, 0x1, 0x9, 0x800, 0x2, 0x7, 0x2, 0x7], [0x2, 0x2325, 0x5d, 0x0, 0x10000, 0x0, 0x8de, 0x10001, 0xffff, 0x3ff, 0x401, 0xe16, 0x2, 0x3, 0x2, 0x1, 0x200, 0x401, 0x0, 0x0, 0x7, 0x5, 0x1c8, 0x40, 0x22, 0x0, 0x0, 0x9, 0x9, 0x5, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x10000, 0xfffffffffffff000, 0x1, 0x20, 0x10000000, 0x1, 0x0, 0x6, 0x3, 0x6878000000000000, 0x0, 0x3ff, 0x2, 0x0, 0x2, 0x2, 0x9, 0x8, 0x60ef, 0x8, 0xffffffffafd63bfb, 0x0, 0x7fffffff, 0x8, 0x0, 0x2, 0x100, 0x2]}, 0x45c) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 11:21:55 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:21:55 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:21:55 executing program 2: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setresuid(0x0, 0x0, 0x0) getgid() gettid() shmctl$IPC_SET(0x0, 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0xa1000, 0x0) socket$inet6(0xa, 0x0, 0x8010000000000084) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x1, 0x0, {0x3}}, 0x18) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x602040, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, 0x0, &(0x7f0000000240)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x107fff) 11:21:55 executing program 4: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:21:55 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:21:55 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_pts(0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000080)='\xae\'\xd1\x93E=i\x86\a\xf1\x17\xfa\x861\x13uc\xb2\x06\x93i\x878\xb1\xf0\x8c\xae\xd6\xdb*\xcf7\xc7\\^\xcb(\xb1L\x1f!\x16\xd3D;\bh\xb0\xce\x15Y\x8d\x9f\xad\x87C\xc6A\x03.\xd8\nH\x9f0\x00\x00\x00\x00\x00\x00\xde+^\xc4\x90QA\x94\xda\nbS\xc8\xd5 bx\xe7\x11r@\x94\xffb0\xbe\x1e3\xc6\xab\xa8\x1b', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000000580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x70bd9f3d4e859648, &(0x7f0000000380)="b8769f493dc5b9c084085d011ba8941f6a5d4fe2f72b389a38ec7888902fbb592c4a72c0316049fa340e82f9f82f4c81288267c4310f20a6cb2fcd5839067171f0b8caefc11923c2dd2d", 0x4a) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x8020001) dup3(r0, 0xffffffffffffffff, 0x0) 11:21:55 executing program 2: 11:21:55 executing program 2: 11:21:55 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:21:55 executing program 0: 11:21:55 executing program 2: 11:21:55 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x15, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @remote}, {0x2, 0x0, @multicast2}}) write(r0, &(0x7f0000000140)="150000000800000000000000c86b6525000010", 0xfffffca9) 11:21:56 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:21:56 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x5, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr="76a9564c7a23c7b219a9a7debe38e441"}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x60}}, 0x0) 11:21:56 executing program 0: 11:21:56 executing program 4: 11:21:56 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) write(0xffffffffffffffff, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) [ 212.631522] protocol 88fb is buggy, dev hsr_slave_0 [ 212.636867] protocol 88fb is buggy, dev hsr_slave_1 11:21:56 executing program 3: 11:21:56 executing program 0: 11:21:56 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:21:56 executing program 4: 11:21:56 executing program 2: 11:21:56 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) write(0xffffffffffffffff, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:21:56 executing program 4: 11:21:56 executing program 2: 11:21:56 executing program 0: 11:21:56 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) write(0xffffffffffffffff, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:21:56 executing program 0: 11:21:56 executing program 3: 11:21:56 executing program 4: 11:21:56 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:21:57 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:21:57 executing program 2: 11:21:57 executing program 0: 11:21:57 executing program 4: 11:21:57 executing program 3: 11:21:57 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:21:57 executing program 3: 11:21:57 executing program 4: 11:21:57 executing program 2: 11:21:57 executing program 0: 11:21:57 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:21:57 executing program 2: 11:21:58 executing program 3: 11:21:58 executing program 4: 11:21:58 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:21:58 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:21:58 executing program 0: 11:21:58 executing program 2: 11:21:58 executing program 3: 11:21:58 executing program 2: 11:21:58 executing program 4: 11:21:58 executing program 0: 11:21:58 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:21:58 executing program 4: 11:21:58 executing program 3: 11:21:59 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:21:59 executing program 0: 11:21:59 executing program 2: 11:21:59 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:21:59 executing program 3: 11:21:59 executing program 4: 11:21:59 executing program 2: 11:21:59 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) getpeername(r0, 0x0, &(0x7f00000004c0)) 11:21:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(0x0, 0x9) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$TCGETA(r0, 0x545d, &(0x7f0000000080)) 11:21:59 executing program 3: 11:21:59 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:21:59 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:21:59 executing program 3: 11:21:59 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:21:59 executing program 0: 11:21:59 executing program 2: 11:21:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(0x0, 0x9) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$TCGETA(r0, 0x545d, &(0x7f0000000080)) 11:21:59 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) r2 = shmget(0x3, 0x2000, 0x78000000, &(0x7f0000ffb000/0x2000)=nil) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000180)=0xc) setuid(r4) r5 = getegid() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESDEC, @ANYBLOB="cff7d763ed888fc48e61a3337f9ed1a04666b446f4ed2e9a036f5b8ed2aa7fee15c46824900bd29ecbc5408c2e406e6763835b5606c734cafb21fd7d417620450c04f591f583a5da599dc73ab7083c9b440c775e53c3bbb46c3a8b36e54ce8a56aa4f233a7b7a3a5271c315fb342c42c77b59ff610fde30914344f4ef0cac609ca0c505a1704403cf44f51c8cfe06a346e"]) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) getpgrp(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000000)={{0x100000001, r4, r5}}) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f00000001c0)=0x2, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r7 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r7, 0x7fff) sendfile(r1, r7, 0x0, 0x8040fffffffd) 11:21:59 executing program 3: r0 = gettid() prctl$PR_CAPBSET_READ(0x17, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) r1 = semget$private(0x0, 0x0, 0x0) semctl$GETALL(r1, 0x0, 0xd, &(0x7f00000000c0)=""/100) getresuid(0x0, 0x0, 0x0) creat(0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000013) 11:21:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e23}, 0x1c) listen(r0, 0x200000000002) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x400200, 0x0) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 11:21:59 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:21:59 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:21:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(0x0, 0x9) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$TCGETA(r0, 0x545d, &(0x7f0000000080)) [ 216.118791] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 11:21:59 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:21:59 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:21:59 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendfile(r1, r0, 0x0, 0x1) write$UHID_GET_REPORT_REPLY(r0, &(0x7f00000001c0), 0xa) 11:21:59 executing program 0: capset(&(0x7f0000000000)={0x400019980330}, &(0x7f0000b2d000)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000004939405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab35f4ad614fd33cebbc150bb2b03b5b2461179f5f98cba001b50c0da6218a8106df2858ec973328e5a2c078a3fe3b52020", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 216.326959] audit: type=1400 audit(1569496919.930:46): avc: denied { create } for pid=7972 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 11:22:00 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) flock(r0, 0xadffe4a0078adbef) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x1b8, 0x0) 11:22:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="e3ec33f77ddb9953e95c223dc30641dbf7c9a5953c7881a6ff87b9b02893fcc207d20a7f167fdc2b8569b4c8c47fb1fb", 0x30) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) [ 216.379741] audit: type=1400 audit(1569496919.940:47): avc: denied { write } for pid=7972 comm="syz-executor.3" path="socket:[29667]" dev="sockfs" ino=29667 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 216.445590] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) [ 216.493166] ptrace attach of "/root/syz-executor.0"[7985] was attempted by "/root/syz-executor.0"[7986] 11:22:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = dup2(r0, r0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r2, 0xc1205531, &(0x7f00000002c0)={0xd0d, 0x0, 0xdf, 0x0, [], [], [], 0x0, 0x0, 0x0, 0x4, "72f3d8da8e01d41f55c34b9e0701381c"}) socket$l2tp(0x18, 0x1, 0x1) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = shmget(0x3, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_LOCK(r4, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r6, 0x0) getgid() r7 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r7) shmctl$IPC_SET(0x0, 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0xa1000, 0x0) socket$inet6(0xa, 0x0, 0x8010000000000084) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x1, 0x0, {0x3}}, 0x18) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, 0x0, &(0x7f0000000240)) r8 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fallocate(r8, 0x11, 0x0, 0x107fff) 11:22:00 executing program 5: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:22:00 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:00 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000080)=""/47) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x8000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0xfffffffffffffff9, &(0x7f0000000300)) wait4(0x0, 0x0, 0x0, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000100)) 11:22:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = socket$packet(0x11, 0x20000000000003, 0x300) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r2, 0x3, 0x6, @random="e09bf7dbe39f"}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 11:22:00 executing program 4: perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x99020000, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c040002ff0f03000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f", 0x48}], 0x1}, 0x0) 11:22:00 executing program 5: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:22:00 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) [ 216.711321] protocol 88fb is buggy, dev hsr_slave_0 [ 216.716448] protocol 88fb is buggy, dev hsr_slave_1 [ 216.733564] device lo entered promiscuous mode 11:22:00 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) [ 216.777476] audit: type=1400 audit(1569496920.380:48): avc: denied { prog_load } for pid=8003 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 216.785757] device lo left promiscuous mode [ 216.804612] protocol 88fb is buggy, dev hsr_slave_0 [ 216.809691] protocol 88fb is buggy, dev hsr_slave_1 11:22:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x25, &(0x7f0000000040)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x200000041fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() pause() ptrace(0x10, r2) ptrace$getsig(0x2, r2, 0xffffffffff600043, &(0x7f0000000000)) 11:22:00 executing program 0: r0 = gettid() prctl$PR_CAPBSET_READ(0x17, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) r1 = semget$private(0x0, 0x3, 0x0) semctl$GETALL(r1, 0x0, 0xd, &(0x7f00000000c0)=""/100) getresuid(0x0, 0x0, 0x0) creat(0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000013) [ 216.927284] device lo entered promiscuous mode 11:22:00 executing program 5: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) [ 216.956980] device lo left promiscuous mode 11:22:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x20000000000003, 0x300) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r2, 0x3, 0x6, @random="e09bf7dbe39f"}, 0x10) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) 11:22:00 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:00 executing program 3: socket$netlink(0x10, 0x3, 0xc) r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) accept4$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @host}, 0x10, 0x40000) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) socketpair(0x11, 0x0, 0x0, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000600)=0x5) r2 = socket(0x0, 0x2, 0x0) sendto(r2, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x7}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000180)={r3, 0x1, "a1"}, &(0x7f00000001c0)=0x9) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket(0x10, 0x2, 0x0) sendto(r4, 0x0, 0x0, 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 11:22:00 executing program 0: clone(0x13102001ff3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, 0x0, 0x4d76f4ec4599dac0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000002c0)=ANY=[@ANYBLOB="070000000000000002004e24e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000002004e24ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ac1e010100000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ac14142700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ac1414aa00"/1424], 0x590) r2 = socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 11:22:00 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:22:00 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x15, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @multicast2}}) write(r0, &(0x7f0000000140)="150000000800000000000000c86b6525000010", 0xfffffca9) 11:22:00 executing program 3: sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000e994d48069a5e565038e358a51c3473f1fc0dc2719737219d84dcb29ed71191bb5f4b1093120c866cf3fa9dec46066f11897b781ead6ede4ae175c870d707a34d5a5d2652b7e1d70f0d800e71485a837578e2fa8b621f354e828e61ecfcbbb523af055c83e5e6e63e7e8a5b325c75ab6dcfcdee80331748841c6a414fcffb54affa3c68b08a7d6e12c11fc8d2f2bb852caebcc1436de59e7f1ec1ea7acc961f8d5d08684ad8fa6f9403904afd98e0dde7b6082556d6e28c1d5"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 11:22:00 executing program 1: open(0x0, 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) [ 217.269330] device lo entered promiscuous mode [ 217.328741] device lo left promiscuous mode [ 217.391188] audit: type=1400 audit(1569496920.990:49): avc: denied { prog_run } for pid=8076 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 217.396647] device lo entered promiscuous mode [ 217.426663] device lo left promiscuous mode 11:22:01 executing program 4: ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc050561a, 0x0) pipe(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuacct.usage_sys\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x8000000000000010, 0x0, 0x2000005) fallocate(r0, 0x0, 0x0, 0x10ffff) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000100)={0xbe, 0xfa, 0x0, 0x1000, 0x13, 0x4, 0xe1, 0x2c, 0x46a}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) getsockopt$inet6_mreq(r1, 0x29, 0x14, 0x0, 0x0) 11:22:01 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:22:01 executing program 1: open(0x0, 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:01 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 11:22:01 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) mq_open(&(0x7f0000000280)='ip6tnl0\x00', 0x40, 0x0, &(0x7f0000000300)={0x101, 0x6, 0x80000000, 0x7, 0x401, 0x5, 0x10001, 0x503c2b9b}) 11:22:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x20000000000003, 0x300) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r2, 0x3, 0x6, @random="e09bf7dbe39f"}, 0x10) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) [ 217.743313] device lo entered promiscuous mode 11:22:01 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='\x00\xaeC\xae\xc4\x05\xa9\xbd~\xfb\x96\xf7,k\x1a+@\xe54\x01\x01\x01\x00w\xa7\x04~\\\xd4Y\x04\xaf^\xc6\xf2\x98\"\xa0\xa1\x04\xaf\x81\x00ov0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={r3}, 0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000300)={r3}, &(0x7f00000001c0)=0x8) socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$usb(0x0, 0x0, 0x0) 11:22:01 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x1f8, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x20000000000ff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@dev}, {@in6=@dev, 0x0, 0x32}, @in=@multicast1}}, 0xf0}}, 0x0) 11:22:01 executing program 4: ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc050561a, 0x0) pipe(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuacct.usage_sys\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x8000000000000010, 0x0, 0x2000005) fallocate(r0, 0x0, 0x0, 0x10ffff) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000100)={0xbe, 0xfa, 0x0, 0x1000, 0x13, 0x4, 0xe1, 0x2c, 0x46a}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) getsockopt$inet6_mreq(r1, 0x29, 0x14, 0x0, 0x0) 11:22:01 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:22:01 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 11:22:01 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:01 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x4e22, @loopback}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'batadv0\x00'}) 11:22:01 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x8000) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000180)={0x6e785e3d1cb434ee}, 0x18418230) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0x0, 0xfffffffe}) [ 218.247060] audit: type=1800 audit(1569496921.850:50): pid=8120 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="cpuacct.usage_sys" dev="sda1" ino=16590 res=0 11:22:01 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) [ 218.321055] audit: type=1804 audit(1569496921.920:51): pid=8159 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir766639230/syzkaller.ORzhrb/30/bus" dev="sda1" ino=16611 res=1 [ 218.345892] IPVS: ftp: loaded support on port[0] = 21 11:22:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmmsg$unix(r1, &(0x7f0000005580)=[{0x0, 0x0, 0x0}], 0x1, 0x0) [ 218.408991] audit: type=1804 audit(1569496921.950:52): pid=8159 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir766639230/syzkaller.ORzhrb/30/bus" dev="sda1" ino=16611 res=1 11:22:02 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:22:02 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:02 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:02 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:22:02 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = dup2(r0, r0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r2, 0xc1205531, &(0x7f00000002c0)={0xd0d, 0x10000, 0xdf, 0x5, [], [], [], 0x1, 0xfffffffffffffffb, 0x0, 0x4, "72f3d8da8e01d41f55c34b9e0701381c"}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) shmctl$SHM_LOCK(0x0, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r5, 0x0) getgid() geteuid() r6 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r6) shmctl$IPC_SET(0x0, 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0xa1000, 0x0) socket$inet6(0xa, 0x0, 0x8010000000000084) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x1, 0x0, {0x3}}, 0x18) r7 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x602040, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, &(0x7f00000001c0), &(0x7f0000000240)=0x80) r8 = creat(0x0, 0x0) fallocate(r8, 0x11, 0x0, 0x107fff) 11:22:02 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 11:22:02 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:22:02 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, 0x0) [ 219.284702] audit: type=1804 audit(1569496922.890:53): pid=8194 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir766639230/syzkaller.ORzhrb/30/bus" dev="sda1" ino=16611 res=1 [ 219.451765] audit: type=1804 audit(1569496922.960:54): pid=8196 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir766639230/syzkaller.ORzhrb/30/bus" dev="sda1" ino=16611 res=1 11:22:03 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020181ffffff01000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 11:22:03 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:22:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/1, 0x2}], 0x2000000000000009) 11:22:03 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) write(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000500)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x2c}}, 0x0) 11:22:03 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) [ 219.552492] audit: type=1804 audit(1569496922.960:55): pid=8197 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir766639230/syzkaller.ORzhrb/30/bus" dev="sda1" ino=16611 res=1 11:22:03 executing program 4: ptrace$peek(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0xd85529b53ca4a52b) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) splice(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 11:22:03 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x0) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:22:03 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f00000002c0)={{0x10b, 0x0, 0x0, 0x20b, 0x0, 0x0, 0x0, 0x0, 0x8}, "e606b1c2062a6d000000000005e7591714890d5037d45649"}, 0x38) 11:22:03 executing program 3: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff302) prctl$PR_GET_TIMERSLACK(0x1e) 11:22:03 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:03 executing program 3: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:22:03 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x0) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) [ 219.763928] loop2: p1 p2 p3 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 [ 220.126082] loop2: partition table partially beyond EOD, truncated [ 220.139396] loop2: p1 start 1 is beyond EOD, truncated [ 220.153868] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 220.179721] loop2: p3 size 2 extends beyond EOD, truncated [ 220.193037] loop2: p4 size 32768 extends beyond EOD, truncated [ 220.208277] loop2: p5 start 1 is beyond EOD, truncated [ 220.214598] loop2: p6 size 1073741824 extends beyond EOD, truncated [ 220.227482] loop2: p7 size 32768 extends beyond EOD, truncated [ 220.236093] loop2: p8 start 1 is beyond EOD, truncated [ 220.246834] loop2: p9 size 1073741824 extends beyond EOD, truncated [ 220.255453] loop2: p10 size 32768 extends beyond EOD, truncated [ 220.267372] loop2: p11 start 1 is beyond EOD, truncated [ 220.273755] loop2: p12 size 1073741824 extends beyond EOD, truncated [ 220.286436] loop2: p13 size 32768 extends beyond EOD, truncated [ 220.294701] loop2: p14 start 1 is beyond EOD, truncated [ 220.300135] loop2: p15 size 1073741824 extends beyond EOD, truncated [ 220.313405] loop2: p16 size 32768 extends beyond EOD, truncated [ 220.320634] loop2: p17 start 1 is beyond EOD, truncated [ 220.329730] loop2: p18 size 1073741824 extends beyond EOD, truncated [ 220.340110] loop2: p19 size 32768 extends beyond EOD, truncated [ 220.351050] loop2: p20 start 1 is beyond EOD, truncated [ 220.358433] loop2: p21 size 1073741824 extends beyond EOD, truncated [ 220.369907] loop2: p22 size 32768 extends beyond EOD, truncated [ 220.379174] loop2: p23 start 1 is beyond EOD, truncated [ 220.388293] loop2: p24 size 1073741824 extends beyond EOD, truncated [ 220.398934] loop2: p25 size 32768 extends beyond EOD, truncated [ 220.409909] loop2: p26 start 1 is beyond EOD, truncated [ 220.417255] loop2: p27 size 1073741824 extends beyond EOD, truncated [ 220.428752] loop2: p28 size 32768 extends beyond EOD, truncated [ 220.438763] loop2: p29 start 1 is beyond EOD, truncated [ 220.447888] loop2: p30 size 1073741824 extends beyond EOD, truncated [ 220.457538] loop2: p31 size 32768 extends beyond EOD, truncated [ 220.475483] loop2: p32 start 1 is beyond EOD, truncated [ 220.480885] loop2: p33 size 1073741824 extends beyond EOD, truncated [ 220.494241] loop2: p34 size 32768 extends beyond EOD, truncated [ 220.505472] loop2: p35 start 1 is beyond EOD, truncated [ 220.510866] loop2: p36 size 1073741824 extends beyond EOD, truncated [ 220.521179] loop2: p37 size 32768 extends beyond EOD, truncated [ 220.534276] loop2: p38 start 1 is beyond EOD, truncated [ 220.539674] loop2: p39 size 1073741824 extends beyond EOD, truncated [ 220.554033] loop2: p40 size 32768 extends beyond EOD, truncated [ 220.564963] loop2: p41 start 1 is beyond EOD, truncated [ 220.570352] loop2: p42 size 1073741824 extends beyond EOD, truncated [ 220.580811] loop2: p43 size 32768 extends beyond EOD, truncated [ 220.593740] loop2: p44 start 1 is beyond EOD, truncated [ 220.599127] loop2: p45 size 1073741824 extends beyond EOD, truncated [ 220.610580] loop2: p46 size 32768 extends beyond EOD, truncated [ 220.619728] loop2: p47 start 1 is beyond EOD, truncated [ 220.628872] loop2: p48 size 1073741824 extends beyond EOD, truncated [ 220.638520] loop2: p49 size 32768 extends beyond EOD, truncated [ 220.649505] loop2: p50 start 1 is beyond EOD, truncated [ 220.656838] loop2: p51 size 1073741824 extends beyond EOD, truncated [ 220.669205] loop2: p52 size 32768 extends beyond EOD, truncated [ 220.678615] loop2: p53 start 1 is beyond EOD, truncated [ 220.687951] loop2: p54 size 1073741824 extends beyond EOD, truncated [ 220.697809] loop2: p55 size 32768 extends beyond EOD, truncated [ 220.709015] loop2: p56 start 1 is beyond EOD, truncated [ 220.726308] loop2: p57 size 1073741824 extends beyond EOD, truncated [ 220.735036] loop2: p58 size 32768 extends beyond EOD, truncated [ 220.747171] loop2: p59 start 1 is beyond EOD, truncated [ 220.753557] loop2: p60 size 1073741824 extends beyond EOD, truncated [ 220.766391] loop2: p61 size 32768 extends beyond EOD, truncated [ 220.774630] loop2: p62 start 1 is beyond EOD, truncated [ 220.780017] loop2: p63 size 1073741824 extends beyond EOD, truncated [ 220.794219] loop2: p64 size 32768 extends beyond EOD, truncated [ 220.806361] loop2: p65 start 1 is beyond EOD, truncated [ 220.812765] loop2: p66 size 1073741824 extends beyond EOD, truncated [ 220.820432] loop2: p67 size 32768 extends beyond EOD, truncated [ 220.835052] loop2: p68 start 1 is beyond EOD, truncated [ 220.840433] loop2: p69 size 1073741824 extends beyond EOD, truncated [ 220.853694] loop2: p70 size 32768 extends beyond EOD, truncated [ 220.860847] loop2: p71 start 1 is beyond EOD, truncated [ 220.869946] loop2: p72 size 1073741824 extends beyond EOD, truncated [ 220.879617] loop2: p73 size 32768 extends beyond EOD, truncated [ 220.890652] loop2: p74 start 1 is beyond EOD, truncated [ 220.897959] loop2: p75 size 1073741824 extends beyond EOD, truncated [ 220.909333] loop2: p76 size 32768 extends beyond EOD, truncated [ 220.918418] loop2: p77 start 1 is beyond EOD, truncated [ 220.928315] loop2: p78 size 1073741824 extends beyond EOD, truncated [ 220.938070] loop2: p79 size 32768 extends beyond EOD, truncated [ 220.949170] loop2: p80 start 1 is beyond EOD, truncated [ 220.957859] loop2: p81 size 1073741824 extends beyond EOD, truncated [ 220.969239] loop2: p82 size 32768 extends beyond EOD, truncated [ 220.977651] loop2: p83 start 1 is beyond EOD, truncated [ 220.984678] loop2: p84 size 1073741824 extends beyond EOD, truncated [ 220.992802] loop2: p85 size 32768 extends beyond EOD, truncated [ 220.999595] loop2: p86 start 1 is beyond EOD, truncated [ 221.005135] loop2: p87 size 1073741824 extends beyond EOD, truncated [ 221.012955] loop2: p88 size 32768 extends beyond EOD, truncated [ 221.020035] loop2: p89 start 1 is beyond EOD, truncated [ 221.025542] loop2: p90 size 1073741824 extends beyond EOD, truncated [ 221.033174] loop2: p91 size 32768 extends beyond EOD, truncated [ 221.040298] loop2: p92 start 1 is beyond EOD, truncated [ 221.045806] loop2: p93 size 1073741824 extends beyond EOD, truncated [ 221.053496] loop2: p94 size 32768 extends beyond EOD, truncated [ 221.060720] loop2: p95 start 1 is beyond EOD, truncated [ 221.066227] loop2: p96 size 1073741824 extends beyond EOD, truncated [ 221.073939] loop2: p97 size 32768 extends beyond EOD, truncated [ 221.081192] loop2: p98 start 1 is beyond EOD, truncated [ 221.086706] loop2: p99 size 1073741824 extends beyond EOD, truncated [ 221.094450] loop2: p100 size 32768 extends beyond EOD, truncated [ 221.104998] loop2: p101 start 1 is beyond EOD, truncated [ 221.110529] loop2: p102 size 1073741824 extends beyond EOD, truncated [ 221.120242] loop2: p103 size 32768 extends beyond EOD, truncated [ 221.127710] loop2: p104 start 1 is beyond EOD, truncated [ 221.133284] loop2: p105 size 1073741824 extends beyond EOD, truncated [ 221.140627] loop2: p106 size 32768 extends beyond EOD, truncated [ 221.147775] loop2: p107 start 1 is beyond EOD, truncated [ 221.153327] loop2: p108 size 1073741824 extends beyond EOD, truncated [ 221.160728] loop2: p109 size 32768 extends beyond EOD, truncated [ 221.167901] loop2: p110 start 1 is beyond EOD, truncated [ 221.173512] loop2: p111 size 1073741824 extends beyond EOD, truncated [ 221.180836] loop2: p112 size 32768 extends beyond EOD, truncated [ 221.188071] loop2: p113 start 1 is beyond EOD, truncated [ 221.193613] loop2: p114 size 1073741824 extends beyond EOD, truncated [ 221.201215] loop2: p115 size 32768 extends beyond EOD, truncated [ 221.208408] loop2: p116 start 1 is beyond EOD, truncated [ 221.213953] loop2: p117 size 1073741824 extends beyond EOD, truncated [ 221.221835] loop2: p118 size 32768 extends beyond EOD, truncated [ 221.228991] loop2: p119 start 1 is beyond EOD, truncated [ 221.234798] loop2: p120 size 1073741824 extends beyond EOD, truncated [ 221.242574] loop2: p121 size 32768 extends beyond EOD, truncated [ 221.249751] loop2: p122 start 1 is beyond EOD, truncated [ 221.255567] loop2: p123 size 1073741824 extends beyond EOD, truncated [ 221.263383] loop2: p124 size 32768 extends beyond EOD, truncated [ 221.270647] loop2: p125 start 1 is beyond EOD, truncated [ 221.276523] loop2: p126 size 1073741824 extends beyond EOD, truncated [ 221.284160] loop2: p127 size 32768 extends beyond EOD, truncated [ 221.291044] loop2: p128 start 1 is beyond EOD, truncated [ 221.296646] loop2: p129 size 1073741824 extends beyond EOD, truncated [ 221.303975] loop2: p130 size 32768 extends beyond EOD, truncated [ 221.310861] loop2: p131 start 1 is beyond EOD, truncated [ 221.316429] loop2: p132 size 1073741824 extends beyond EOD, truncated [ 221.323797] loop2: p133 size 32768 extends beyond EOD, truncated [ 221.330659] loop2: p134 start 1 is beyond EOD, truncated [ 221.336190] loop2: p135 size 1073741824 extends beyond EOD, truncated [ 221.343859] loop2: p136 size 32768 extends beyond EOD, truncated [ 221.350739] loop2: p137 start 1 is beyond EOD, truncated [ 221.357262] loop2: p138 size 1073741824 extends beyond EOD, truncated [ 221.365045] loop2: p139 size 32768 extends beyond EOD, truncated [ 221.372279] loop2: p140 start 1 is beyond EOD, truncated [ 221.377744] loop2: p141 size 1073741824 extends beyond EOD, truncated [ 221.385309] loop2: p142 size 32768 extends beyond EOD, truncated [ 221.392690] loop2: p143 start 1 is beyond EOD, truncated [ 221.398182] loop2: p144 size 1073741824 extends beyond EOD, truncated [ 221.405909] loop2: p145 size 32768 extends beyond EOD, truncated [ 221.413283] loop2: p146 start 1 is beyond EOD, truncated [ 221.418748] loop2: p147 size 1073741824 extends beyond EOD, truncated [ 221.426304] loop2: p148 size 32768 extends beyond EOD, truncated [ 221.433565] loop2: p149 start 1 is beyond EOD, truncated [ 221.439024] loop2: p150 size 1073741824 extends beyond EOD, truncated [ 221.446604] loop2: p151 size 32768 extends beyond EOD, truncated [ 221.453841] loop2: p152 start 1 is beyond EOD, truncated [ 221.459332] loop2: p153 size 1073741824 extends beyond EOD, truncated [ 221.467056] loop2: p154 size 32768 extends beyond EOD, truncated [ 221.474374] loop2: p155 start 1 is beyond EOD, truncated [ 221.479842] loop2: p156 size 1073741824 extends beyond EOD, truncated [ 221.487372] loop2: p157 size 32768 extends beyond EOD, truncated [ 221.494585] loop2: p158 start 1 is beyond EOD, truncated [ 221.500055] loop2: p159 size 1073741824 extends beyond EOD, truncated [ 221.507616] loop2: p160 size 32768 extends beyond EOD, truncated [ 221.514844] loop2: p161 start 1 is beyond EOD, truncated [ 221.520318] loop2: p162 size 1073741824 extends beyond EOD, truncated [ 221.527852] loop2: p163 size 32768 extends beyond EOD, truncated [ 221.535135] loop2: p164 start 1 is beyond EOD, truncated [ 221.540758] loop2: p165 size 1073741824 extends beyond EOD, truncated [ 221.548385] loop2: p166 size 32768 extends beyond EOD, truncated [ 221.555587] loop2: p167 start 1 is beyond EOD, truncated [ 221.561051] loop2: p168 size 1073741824 extends beyond EOD, truncated [ 221.568639] loop2: p169 size 32768 extends beyond EOD, truncated [ 221.575942] loop2: p170 start 1 is beyond EOD, truncated [ 221.581529] loop2: p171 size 1073741824 extends beyond EOD, truncated [ 221.588856] loop2: p172 size 32768 extends beyond EOD, truncated [ 221.596089] loop2: p173 start 1 is beyond EOD, truncated [ 221.601627] loop2: p174 size 1073741824 extends beyond EOD, truncated [ 221.608915] loop2: p175 size 32768 extends beyond EOD, truncated [ 221.616136] loop2: p176 start 1 is beyond EOD, truncated [ 221.621807] loop2: p177 size 1073741824 extends beyond EOD, truncated [ 221.629114] loop2: p178 size 32768 extends beyond EOD, truncated [ 221.636319] loop2: p179 start 1 is beyond EOD, truncated [ 221.641850] loop2: p180 size 1073741824 extends beyond EOD, truncated [ 221.649126] loop2: p181 size 32768 extends beyond EOD, truncated [ 221.656333] loop2: p182 start 1 is beyond EOD, truncated [ 221.661862] loop2: p183 size 1073741824 extends beyond EOD, truncated [ 221.669149] loop2: p184 size 32768 extends beyond EOD, truncated [ 221.676401] loop2: p185 start 1 is beyond EOD, truncated [ 221.682357] loop2: p186 size 1073741824 extends beyond EOD, truncated [ 221.689680] loop2: p187 size 32768 extends beyond EOD, truncated [ 221.696802] loop2: p188 start 1 is beyond EOD, truncated [ 221.702330] loop2: p189 size 1073741824 extends beyond EOD, truncated [ 221.709592] loop2: p190 size 32768 extends beyond EOD, truncated [ 221.716915] loop2: p191 start 1 is beyond EOD, truncated [ 221.722446] loop2: p192 size 1073741824 extends beyond EOD, truncated [ 221.729793] loop2: p193 size 32768 extends beyond EOD, truncated [ 221.736939] loop2: p194 start 1 is beyond EOD, truncated [ 221.742488] loop2: p195 size 1073741824 extends beyond EOD, truncated [ 221.749824] loop2: p196 size 32768 extends beyond EOD, truncated [ 221.757047] loop2: p197 start 1 is beyond EOD, truncated [ 221.762560] loop2: p198 size 1073741824 extends beyond EOD, truncated [ 221.770101] loop2: p199 size 32768 extends beyond EOD, truncated [ 221.777295] loop2: p200 start 1 is beyond EOD, truncated [ 221.782835] loop2: p201 size 1073741824 extends beyond EOD, truncated [ 221.790267] loop2: p202 size 32768 extends beyond EOD, truncated [ 221.797455] loop2: p203 start 1 is beyond EOD, truncated [ 221.802979] loop2: p204 size 1073741824 extends beyond EOD, truncated [ 221.810540] loop2: p205 size 32768 extends beyond EOD, truncated [ 221.817744] loop2: p206 start 1 is beyond EOD, truncated [ 221.823268] loop2: p207 size 1073741824 extends beyond EOD, truncated [ 221.830598] loop2: p208 size 32768 extends beyond EOD, truncated [ 221.837824] loop2: p209 start 1 is beyond EOD, truncated [ 221.843367] loop2: p210 size 1073741824 extends beyond EOD, truncated [ 221.850673] loop2: p211 size 32768 extends beyond EOD, truncated [ 221.857889] loop2: p212 start 1 is beyond EOD, truncated [ 221.863427] loop2: p213 size 1073741824 extends beyond EOD, truncated [ 221.870740] loop2: p214 size 32768 extends beyond EOD, truncated [ 221.877926] loop2: p215 start 1 is beyond EOD, truncated [ 221.883463] loop2: p216 size 1073741824 extends beyond EOD, truncated [ 221.890760] loop2: p217 size 32768 extends beyond EOD, truncated [ 221.897960] loop2: p218 start 1 is beyond EOD, truncated [ 221.903507] loop2: p219 size 1073741824 extends beyond EOD, truncated [ 221.910824] loop2: p220 size 32768 extends beyond EOD, truncated [ 221.919798] loop2: p221 start 1 is beyond EOD, truncated [ 221.925341] loop2: p222 size 1073741824 extends beyond EOD, truncated [ 221.933512] loop2: p223 size 32768 extends beyond EOD, truncated [ 221.940346] loop2: p224 start 1 is beyond EOD, truncated [ 221.945886] loop2: p225 size 1073741824 extends beyond EOD, truncated [ 221.953228] loop2: p226 size 32768 extends beyond EOD, truncated [ 221.960090] loop2: p227 start 1 is beyond EOD, truncated [ 221.966203] loop2: p228 size 1073741824 extends beyond EOD, truncated [ 221.975028] loop2: p229 size 32768 extends beyond EOD, truncated [ 221.982336] loop2: p230 start 1 is beyond EOD, truncated [ 221.987796] loop2: p231 size 1073741824 extends beyond EOD, truncated [ 221.997421] loop2: p232 size 32768 extends beyond EOD, truncated [ 222.004683] loop2: p233 start 1 is beyond EOD, truncated [ 222.010145] loop2: p234 size 1073741824 extends beyond EOD, truncated [ 222.017700] loop2: p235 size 32768 extends beyond EOD, truncated [ 222.024875] loop2: p236 start 1 is beyond EOD, truncated [ 222.030334] loop2: p237 size 1073741824 extends beyond EOD, truncated [ 222.037896] loop2: p238 size 32768 extends beyond EOD, truncated [ 222.045617] loop2: p239 start 1 is beyond EOD, truncated [ 222.051087] loop2: p240 size 1073741824 extends beyond EOD, truncated [ 222.058864] loop2: p241 size 32768 extends beyond EOD, truncated [ 222.066394] loop2: p242 start 1 is beyond EOD, truncated [ 222.072001] loop2: p243 size 1073741824 extends beyond EOD, truncated [ 222.079393] loop2: p244 size 32768 extends beyond EOD, truncated [ 222.086569] loop2: p245 start 1 is beyond EOD, truncated [ 222.092106] loop2: p246 size 1073741824 extends beyond EOD, truncated [ 222.099413] loop2: p247 size 32768 extends beyond EOD, truncated [ 222.106568] loop2: p248 start 1 is beyond EOD, truncated [ 222.112099] loop2: p249 size 1073741824 extends beyond EOD, truncated [ 222.119419] loop2: p250 size 32768 extends beyond EOD, truncated [ 222.126555] loop2: p251 start 1 is beyond EOD, truncated [ 222.132177] loop2: p252 size 1073741824 extends beyond EOD, truncated [ 222.139522] loop2: p253 size 32768 extends beyond EOD, truncated [ 222.146637] loop2: p254 start 1 is beyond EOD, truncated [ 222.152178] loop2: p255 size 1073741824 extends beyond EOD, truncated 11:22:05 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x29cb5a25, &(0x7f0000000340), 0x0, 0x0, 0xffbe}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x1}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) llistxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 11:22:05 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x99020000, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c040002ff0f03000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f", 0x48}], 0x1}, 0x0) socket$kcm(0x2, 0x0, 0x0) 11:22:05 executing program 3: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:22:05 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x0) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:22:05 executing program 4: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:05 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x29) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x8000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19405, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x4}, @IFLA_GROUP={0x8}]}, 0x2c}}, 0x0) 11:22:05 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:05 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) socket$netlink(0x10, 0x3, 0x4) write(0xffffffffffffffff, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:22:06 executing program 2: 11:22:06 executing program 3: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:22:06 executing program 0: 11:22:06 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:06 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) socket$netlink(0x10, 0x3, 0x4) write(0xffffffffffffffff, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) [ 222.508221] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 222.551351] protocol 88fb is buggy, dev hsr_slave_0 [ 222.556484] protocol 88fb is buggy, dev hsr_slave_1 11:22:06 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:06 executing program 0: 11:22:06 executing program 3: 11:22:06 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) socket$netlink(0x10, 0x3, 0x4) write(0xffffffffffffffff, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 11:22:06 executing program 4: 11:22:06 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:06 executing program 0: 11:22:06 executing program 3: ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) socket$key(0xf, 0x3, 0x2) exit(0x0) 11:22:06 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, 0x0, 0x0) 11:22:06 executing program 2: 11:22:06 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:06 executing program 2: 11:22:06 executing program 0: 11:22:06 executing program 3: 11:22:07 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, 0x0, 0x0) 11:22:07 executing program 4: 11:22:07 executing program 0: 11:22:07 executing program 2: 11:22:07 executing program 3: 11:22:07 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:07 executing program 2: 11:22:07 executing program 4: 11:22:07 executing program 3: 11:22:07 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, 0x0, 0x0) 11:22:07 executing program 0: 11:22:07 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:07 executing program 4: 11:22:07 executing program 2: 11:22:07 executing program 0: 11:22:07 executing program 3: 11:22:07 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:07 executing program 4: 11:22:07 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00), 0x0) 11:22:07 executing program 2: 11:22:07 executing program 0: 11:22:07 executing program 3: 11:22:07 executing program 4: 11:22:07 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:08 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00), 0x0) 11:22:08 executing program 0: 11:22:08 executing program 2: 11:22:08 executing program 3: 11:22:08 executing program 4: [ 224.631335] protocol 88fb is buggy, dev hsr_slave_0 [ 224.636485] protocol 88fb is buggy, dev hsr_slave_1 11:22:08 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00), 0x0) 11:22:08 executing program 0: 11:22:08 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:08 executing program 2: 11:22:08 executing program 4: 11:22:08 executing program 3: 11:22:08 executing program 2: 11:22:08 executing program 4: 11:22:08 executing program 0: 11:22:08 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100", 0x14) 11:22:08 executing program 3: 11:22:08 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:08 executing program 4: 11:22:08 executing program 0: 11:22:08 executing program 2: 11:22:08 executing program 3: 11:22:09 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:09 executing program 2: 11:22:09 executing program 4: 11:22:09 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100", 0x14) 11:22:09 executing program 0: 11:22:09 executing program 3: 11:22:09 executing program 2: 11:22:09 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100", 0x14) 11:22:09 executing program 0: 11:22:09 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:09 executing program 4: 11:22:09 executing program 2: 11:22:09 executing program 3: 11:22:09 executing program 0: 11:22:09 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a", 0x1e) 11:22:09 executing program 4: 11:22:09 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:09 executing program 2: 11:22:09 executing program 0: 11:22:09 executing program 3: 11:22:09 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a", 0x1e) 11:22:09 executing program 4: 11:22:09 executing program 3: 11:22:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x321, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3", 0x1, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = gettid() recvmmsg(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/199, 0xc7}], 0x1}}], 0x40003a0, 0x0, 0x0) tkill(r1, 0x14) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) 11:22:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x40, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() tkill(r2, 0x9) r3 = socket$inet6(0xa, 0x802, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) syz_open_procfs(0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000080)) 11:22:10 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a", 0x1e) 11:22:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0xffffffffffffff0e, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f00000057c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) 11:22:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x1a8) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="73797a311fcbf6000000000086dd"], 0xe) 11:22:10 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:10 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f750800", 0x23) 11:22:10 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000500)={&(0x7f0000000800)=@id={0x1e, 0x3, 0x0, {0x4e20}}, 0x10, 0x0}, 0x0) 11:22:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000021000500d25a80648c63940d0500fc00100003400200a06d053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) 11:22:10 executing program 3: 11:22:10 executing program 2: 11:22:10 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f750800", 0x23) 11:22:10 executing program 3: 11:22:10 executing program 4: 11:22:10 executing program 0: 11:22:10 executing program 2: 11:22:11 executing program 4: r0 = socket$inet(0x15, 0x5, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) dup2(r1, r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) 11:22:11 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_256={{0x304}, "502b9fdf57dcfe21", "4efcf0cd78ac0fd9d43071201668cd682130965022e378a8a5a7f1e9e3f733bb", "cb5d5d48", "03c24f2867ca3439"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0xf00, 0x0, 0x0) 11:22:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_256={{0x304}, "502b9fdf57dcfe21", "4efcf0cd78ac0fd9d43071201668cd682130965022e378a8a5a7f1e9e3f733bb", "cb5d5d48", "03c24f2867ca3439"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x7, 0x0, 0x0) 11:22:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000004c0)="1c0000001a009b8a14e5f46b000000ff00"/28, 0x1c) 11:22:11 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f750800", 0x23) 11:22:11 executing program 4: r0 = socket$inet(0x15, 0x5, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) dup2(r1, r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) [ 228.135794] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 228.152694] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:22:11 executing program 2: 11:22:11 executing program 4: [ 228.196882] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 228.221768] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:22:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write(r0, &(0x7f0000000140)="150000000800000000000000c86b6525000010", 0xfffffca9) 11:22:11 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f7508003900", 0x25) 11:22:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0000000000000000000040050000a90000e7fc4b83bbb6a23b4b6942b7871001"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x3, 0x2, [{0x490}]}) 11:22:12 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x5, 0x0, 0x48, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x50}}, 0x0) 11:22:12 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(0x0, 0x0, 0x0) 11:22:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup3(r0, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) 11:22:12 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f7508003900", 0x25) 11:22:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {}, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}}) write(r0, &(0x7f0000000140)="150000000800000000000000c86b6525000010", 0xfffffca9) 11:22:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/1, 0x2}], 0x2000000000000009) 11:22:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000cc0)="2e0000001e000503ed0080647e6394f21500d2000600120111407f480f0001002700000002000000f88000f01700", 0x2e}], 0x1}, 0x0) 11:22:12 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f7508003900", 0x25) 11:22:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x15, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {}, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}}) write(r0, &(0x7f0000000140)="150000000800000000000000c86b6525000010", 0xfffffca9) 11:22:12 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) timer_create(0x4, &(0x7f00000004c0)={0x0, 0x19, 0x8, @thr={&(0x7f0000000280)="922b1618da2a3e11c3fc9bcea8b409ac03142e9124043f3c03b4a81d1832bb294fc4014148cb24c112490c66f53de73a124d707978dfb7773739e969f72ef296060e2737ee5f9ff7f10eadd9d5cfdbe2bedb", &(0x7f0000000400)="180476882dad5d06414dafe636a07670055cfa4d4f7a45280475"}}, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000140)) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x0, 0x0, "ec"}], 0x18}}], 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) dup2(r2, r1) socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) 11:22:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000cc0)="2e0000001e000503ed0080647e6394f21500d2000600120111407f480f0001002700000002000000f88000f01700", 0x2e}], 0x1}, 0x0) 11:22:12 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(0x0, 0x0, 0x0) 11:22:13 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x4}, 0x10) write(r0, &(0x7f0000000080)="240000001a005f0214f9f4070009040800000000000000050000000008000f00fd000000", 0x24) 11:22:13 executing program 4: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x40000000) 11:22:13 executing program 0: epoll_create1(0x0) getpid() sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') socket$kcm(0xa, 0x5, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r1, 0x0) shmget$private(0x0, 0x1000, 0x20, &(0x7f0000ff0000/0x1000)=nil) 11:22:13 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f750800390005", 0x26) 11:22:13 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) timer_create(0x4, &(0x7f00000004c0)={0x0, 0x19, 0x8, @thr={&(0x7f0000000280)="922b1618da2a3e11c3fc9bcea8b409ac03142e9124043f3c03b4a81d1832bb294fc4014148cb24c112490c66f53de73a124d707978dfb7773739e969f72ef296060e2737ee5f9ff7f10eadd9d5cfdbe2bedb", &(0x7f0000000400)="180476882dad5d06414dafe636a07670055cfa4d4f7a45280475"}}, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000140)) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x0, 0x0, "ec"}], 0x18}}], 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) dup2(r2, r1) socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) 11:22:13 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(0x0, 0x0, 0x0) 11:22:13 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00006cdfa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00004f7000)="649c47ad", 0x4) 11:22:13 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = inotify_init1(0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x4000, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc0585604, 0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, 0x0, 0x0, &(0x7f0000002540), 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mknod(0x0, 0x0, 0x0) mount$9p_tcp(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000), 0x10) syz_open_procfs(0x0, 0x0) 11:22:13 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f750800390005", 0x26) 11:22:13 executing program 1: sendto$isdn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 229.823447] audit: type=1400 audit(1569496933.430:56): avc: denied { map } for pid=8992 comm="syz-executor.0" path="socket:[37007]" dev="sockfs" ino=37007 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=packet_socket permissive=1 11:22:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x6857b21ff1155d93) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) write$binfmt_misc(r2, &(0x7f0000000500)={'syz1'}, 0x4) truncate(&(0x7f0000000140)='./file0/bus\x00', 0x0) 11:22:13 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x297ef) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001f00)="2e0000002d000507d25a80648c63940d015a670d1a7cd73f9de20040f9ff6d51445fd7ff7f053482c1899f936e8f", 0x2e}], 0x1}, 0x0) 11:22:13 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f750800390005", 0x26) 11:22:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {}, 0x0, 0xffffffffffffffff}}}, 0x90) 11:22:13 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x5, 0x9, 0x3ff, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000180), &(0x7f0000000280)}, 0x20) 11:22:13 executing program 3: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) socket$packet(0x11, 0x0, 0x300) r0 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="400000000000000008001b000000"], 0x30}}, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{0x0, 0x3ff}, 'port0\x00', 0x0, 0x0, 0xffff, 0x5, 0x6, 0x0, 0x9, 0x0, 0x2, 0x3}) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000940)) accept$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f00000000c0)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 230.041001] EXT4-fs: Warning: mounting with data=journal disables delayed allocation and O_DIRECT support! [ 230.051611] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 230.060990] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 230.083375] EXT4-fs (loop1): unsupported descriptor size 0 11:22:13 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x297ef) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001f00)="2e0000002d000507d25a80648c63940d015a670d1a7cd73f9de20040f9ff6d51445fd7ff7f053482c1899f936e8f", 0x2e}], 0x1}, 0x0) [ 230.168640] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 230.209568] audit: type=1400 audit(1569496933.810:57): avc: denied { map_read map_write } for pid=9041 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 230.231496] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended 11:22:13 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f00000001c0)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:22:13 executing program 2: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="08000000d00b0000000000000204010002000270fffa", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000500)={0x0, 0x0, 0xf1e, 0x80}) [ 230.300816] EXT4-fs (loop1): unsupported descriptor size 0 11:22:14 executing program 1: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) [ 230.347027] ------------[ cut here ]------------ [ 230.347471] kobject: 'loop4' (000000007ea34ab9): kobject_uevent_env [ 230.357808] kobject: 'loop4' (000000007ea34ab9): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 230.358667] ODEBUG: free active (active state 1) object type: rcu_head hint: (null) [ 230.377044] WARNING: CPU: 1 PID: 9052 at lib/debugobjects.c:325 debug_print_object+0x168/0x250 [ 230.385794] Kernel panic - not syncing: panic_on_warn set ... [ 230.385794] [ 230.393189] CPU: 1 PID: 9052 Comm: syz-executor.3 Not tainted 4.19.75 #0 [ 230.395348] kobject: 'loop2' (00000000c51224d9): kobject_uevent_env [ 230.400022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.400026] Call Trace: [ 230.400044] dump_stack+0x172/0x1f0 [ 230.400061] panic+0x263/0x507 [ 230.412490] kobject: 'loop2' (00000000c51224d9): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 230.416240] ? __warn_printk+0xf3/0xf3 [ 230.416258] ? debug_print_object+0x168/0x250 [ 230.442072] audit: type=1800 audit(1569496933.950:58): pid=9060 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16690 res=0 [ 230.443399] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.443415] ? __warn.cold+0x5/0x4a [ 230.474997] ? debug_print_object+0x168/0x250 [ 230.479480] __warn.cold+0x20/0x4a [ 230.483009] ? debug_print_object+0x168/0x250 [ 230.487489] report_bug+0x263/0x2b0 [ 230.491105] do_error_trap+0x204/0x360 [ 230.494977] ? math_error+0x340/0x340 [ 230.498767] ? vprintk_emit+0x1ab/0x690 [ 230.502725] ? error_entry+0x7c/0xe0 [ 230.506421] ? trace_hardirqs_off_caller+0x65/0x220 [ 230.511420] ? vprintk_default+0x28/0x30 [ 230.515468] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 230.520300] do_invalid_op+0x1b/0x20 [ 230.524008] invalid_op+0x14/0x20 [ 230.527471] RIP: 0010:debug_print_object+0x168/0x250 [ 230.532555] Code: dd 20 56 82 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 20 56 82 87 48 c7 c7 60 4b 82 87 e8 d6 04 19 fe <0f> 0b 83 05 cb 83 17 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 230.551528] RSP: 0018:ffff88804f5377f0 EFLAGS: 00010082 [ 230.556885] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 230.564155] RDX: 0000000000040000 RSI: ffffffff8155dbd6 RDI: ffffed1009ea6ef0 [ 230.571457] RBP: ffff88804f537830 R08: ffff888050d262c0 R09: fffffbfff10f2a01 [ 230.578761] R10: fffffbfff10f2a00 R11: ffffffff88795003 R12: 0000000000000001 [ 230.586026] R13: ffffffff8879f200 R14: 0000000000000000 R15: ffff88805136f420 [ 230.593298] ? vprintk_func+0x86/0x189 [ 230.597186] debug_check_no_obj_freed+0x29f/0x464 [ 230.602021] kmem_cache_free+0x18f/0x260 [ 230.606340] free_task+0xdd/0x120 [ 230.609795] __put_task_struct+0x20f/0x4c0 [ 230.614028] finish_task_switch+0x52b/0x780 [ 230.618360] ? switch_mm_irqs_off+0x7fa/0x1360 [ 230.622959] __schedule+0x86e/0x1dc0 [ 230.626684] ? pci_mmcfg_check_reserved+0x170/0x170 [ 230.631721] preempt_schedule_irq+0xb5/0x140 [ 230.636135] retint_kernel+0x1b/0x2d [ 230.639853] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 230.645756] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 230.664668] RSP: 0018:ffff88804f537b68 EFLAGS: 00010206 ORIG_RAX: ffffffffffffff13 [ 230.672388] RAX: 0000000000040000 RBX: ffff88808997ce80 RCX: 0000000000001000 [ 230.679663] RDX: 0000000000001000 RSI: ffffc90013503000 RDI: ffff88808997ce80 [ 230.686942] RBP: ffff88804f537b98 R08: ffff888050d262c0 R09: ffff88812c3f0dc0 [ 230.694219] R10: 0000000000000000 R11: ffff88808997de7f R12: 0000000000001000 [ 230.701498] R13: 00007ffffffff000 R14: ffffc90013503000 R15: ffff888050d262c0 [ 230.708795] ? __probe_kernel_read+0xe8/0x1c0 [ 230.713300] read_mem+0xfc/0x2c0 [ 230.716675] do_iter_read+0x490/0x640 [ 230.720477] ? dup_iter+0x270/0x270 [ 230.724112] vfs_readv+0xf0/0x160 [ 230.727585] ? compat_rw_copy_check_uvector+0x400/0x400 [ 230.732966] ? kasan_check_read+0x11/0x20 [ 230.737125] ? __fget+0x367/0x540 [ 230.740583] ? iterate_fd+0x360/0x360 [ 230.744393] ? kasan_check_read+0x11/0x20 [ 230.748542] ? _copy_to_user+0xc9/0x120 [ 230.752501] ? __fget_light+0x1a9/0x230 [ 230.756499] do_preadv+0x1c4/0x280 [ 230.760027] ? do_readv+0x370/0x370 [ 230.763655] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 230.768412] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 230.773190] ? do_syscall_64+0x26/0x620 [ 230.777147] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.782511] ? do_syscall_64+0x26/0x620 [ 230.786479] __x64_sys_preadv+0x9a/0xf0 [ 230.790449] do_syscall_64+0xfd/0x620 [ 230.794244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.799418] RIP: 0033:0x459a29 [ 230.802595] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.821479] RSP: 002b:00007ff3792b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 230.829168] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459a29 [ 230.836419] RDX: 0000000000000002 RSI: 0000000020000200 RDI: 0000000000000006 [ 230.843672] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 230.850925] R10: 00000000fffbc000 R11: 0000000000000246 R12: 00007ff3792ba6d4 [ 230.858184] R13: 00000000004c6d3d R14: 00000000004dc0b8 R15: 00000000ffffffff [ 230.865443] [ 230.865447] ====================================================== [ 230.865451] WARNING: possible circular locking dependency detected [ 230.865453] 4.19.75 #0 Not tainted [ 230.865456] ------------------------------------------------------ [ 230.865459] syz-executor.3/9052 is trying to acquire lock: [ 230.865462] 000000004f691ca2 ((console_sem).lock){-.-.}, at: down_trylock+0x13/0x70 [ 230.865470] [ 230.865473] but task is already holding lock: [ 230.865475] 0000000054caa132 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 230.865484] [ 230.865487] which lock already depends on the new lock. [ 230.865488] [ 230.865489] [ 230.865492] the existing dependency chain (in reverse order) is: [ 230.865494] [ 230.865495] -> #3 (&obj_hash[i].lock){-.-.}: [ 230.865504] _raw_spin_lock_irqsave+0x95/0xcd [ 230.865506] __debug_object_init+0xc6/0xc30 [ 230.865509] debug_object_init+0x16/0x20 [ 230.865511] hrtimer_init+0x2a/0x300 [ 230.865513] init_dl_task_timer+0x1b/0x50 [ 230.865516] __sched_fork+0x22a/0x4b0 [ 230.865518] init_idle+0x75/0x800 [ 230.865520] sched_init+0x952/0x9f0 [ 230.865522] start_kernel+0x402/0x8c5 [ 230.865525] x86_64_start_reservations+0x29/0x2b [ 230.865527] x86_64_start_kernel+0x77/0x7b [ 230.865530] secondary_startup_64+0xa4/0xb0 [ 230.865531] [ 230.865533] -> #2 (&rq->lock){-.-.}: [ 230.865541] _raw_spin_lock+0x2f/0x40 [ 230.865543] task_fork_fair+0x6a/0x520 [ 230.865545] sched_fork+0x3af/0x900 [ 230.865550] copy_process.part.0+0x1859/0x7a30 [ 230.865553] _do_fork+0x257/0xfd0 [ 230.865557] kernel_thread+0x34/0x40 [ 230.865561] rest_init+0x24/0x222 [ 230.865565] start_kernel+0x88c/0x8c5 [ 230.865570] x86_64_start_reservations+0x29/0x2b [ 230.865575] x86_64_start_kernel+0x77/0x7b [ 230.865581] secondary_startup_64+0xa4/0xb0 [ 230.865584] [ 230.865586] -> #1 (&p->pi_lock){-.-.}: [ 230.865600] _raw_spin_lock_irqsave+0x95/0xcd [ 230.865603] try_to_wake_up+0x94/0xf50 [ 230.865605] wake_up_process+0x10/0x20 [ 230.865607] __up.isra.0+0x136/0x1a0 [ 230.865609] up+0x9c/0xe0 [ 230.865612] __up_console_sem+0xb7/0x1c0 [ 230.865614] console_unlock+0x6c7/0x10b0 [ 230.865616] vprintk_emit+0x238/0x690 [ 230.865619] vprintk_default+0x28/0x30 [ 230.865621] vprintk_func+0x7e/0x189 [ 230.865623] printk+0xba/0xed [ 230.865626] kobject_uevent_env+0xe2/0x101d [ 230.865628] reg_query_database+0x232/0x340 [ 230.865630] reg_todo+0xda3/0x16d0 [ 230.865633] process_one_work+0x989/0x1750 [ 230.865635] worker_thread+0x98/0xe40 [ 230.865637] kthread+0x354/0x420 [ 230.865639] ret_from_fork+0x24/0x30 [ 230.865641] [ 230.865642] -> #0 ((console_sem).lock){-.-.}: [ 230.865650] lock_acquire+0x16f/0x3f0 [ 230.865653] _raw_spin_lock_irqsave+0x95/0xcd [ 230.865655] down_trylock+0x13/0x70 [ 230.865658] __down_trylock_console_sem+0xa8/0x210 [ 230.865661] console_trylock+0x15/0xa0 [ 230.865663] vprintk_emit+0x21d/0x690 [ 230.865665] vprintk_default+0x28/0x30 [ 230.865668] vprintk_func+0x7e/0x189 [ 230.865670] printk+0xba/0xed [ 230.865672] __warn_printk+0x9b/0xf3 [ 230.865674] debug_print_object+0x168/0x250 [ 230.865677] debug_check_no_obj_freed+0x29f/0x464 [ 230.865680] kmem_cache_free+0x18f/0x260 [ 230.865682] free_task+0xdd/0x120 [ 230.865684] __put_task_struct+0x20f/0x4c0 [ 230.865687] finish_task_switch+0x52b/0x780 [ 230.865689] __schedule+0x86e/0x1dc0 [ 230.865692] preempt_schedule_irq+0xb5/0x140 [ 230.865694] retint_kernel+0x1b/0x2d [ 230.865697] copy_user_enhanced_fast_string+0xe/0x20 [ 230.865699] read_mem+0xfc/0x2c0 [ 230.865701] do_iter_read+0x490/0x640 [ 230.865704] vfs_readv+0xf0/0x160 [ 230.865706] do_preadv+0x1c4/0x280 [ 230.865708] __x64_sys_preadv+0x9a/0xf0 [ 230.865710] do_syscall_64+0xfd/0x620 [ 230.865713] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.865714] [ 230.865717] other info that might help us debug this: [ 230.865718] [ 230.865720] Chain exists of: [ 230.865721] (console_sem).lock --> &rq->lock --> &obj_hash[i].lock [ 230.865732] [ 230.865734] Possible unsafe locking scenario: [ 230.865736] [ 230.865739] CPU0 CPU1 [ 230.865741] ---- ---- [ 230.865742] lock(&obj_hash[i].lock); [ 230.865748] lock(&rq->lock); [ 230.865753] lock(&obj_hash[i].lock); [ 230.865758] lock((console_sem).lock); [ 230.865763] [ 230.865765] *** DEADLOCK *** [ 230.865766] [ 230.865768] 1 lock held by syz-executor.3/9052: [ 230.865770] #0: 0000000054caa132 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 230.865780] [ 230.865782] stack backtrace: [ 230.865785] CPU: 1 PID: 9052 Comm: syz-executor.3 Not tainted 4.19.75 #0 [ 230.865790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.865791] Call Trace: [ 230.865794] dump_stack+0x172/0x1f0 [ 230.865796] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 230.865799] __lock_acquire+0x2e19/0x49c0 [ 230.865801] ? mark_held_locks+0x100/0x100 [ 230.865805] ? format_decode+0x25f/0xbc0 [ 230.865809] ? enable_ptr_key_workfn+0x30/0x30 [ 230.865813] ? kvm_clock_read+0x18/0x30 [ 230.865817] lock_acquire+0x16f/0x3f0 [ 230.865821] ? down_trylock+0x13/0x70 [ 230.865825] _raw_spin_lock_irqsave+0x95/0xcd [ 230.865829] ? down_trylock+0x13/0x70 [ 230.865834] ? vprintk_emit+0x21d/0x690 [ 230.865838] down_trylock+0x13/0x70 [ 230.865842] ? vprintk_emit+0x21d/0x690 [ 230.865846] __down_trylock_console_sem+0xa8/0x210 [ 230.865849] console_trylock+0x15/0xa0 [ 230.865851] vprintk_emit+0x21d/0x690 [ 230.865854] vprintk_default+0x28/0x30 [ 230.865856] vprintk_func+0x7e/0x189 [ 230.865858] printk+0xba/0xed [ 230.865860] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 230.865863] ? __warn_printk+0x8f/0xf3 [ 230.865865] __warn_printk+0x9b/0xf3 [ 230.865867] ? add_taint.cold+0x16/0x16 [ 230.865870] debug_print_object+0x168/0x250 [ 230.865872] debug_check_no_obj_freed+0x29f/0x464 [ 230.865875] kmem_cache_free+0x18f/0x260 [ 230.865877] free_task+0xdd/0x120 [ 230.865879] __put_task_struct+0x20f/0x4c0 [ 230.865882] finish_task_switch+0x52b/0x780 [ 230.865884] ? switch_mm_irqs_off+0x7fa/0x1360 [ 230.865886] __schedule+0x86e/0x1dc0 [ 230.865889] ? pci_mmcfg_check_reserved+0x170/0x170 [ 230.865892] preempt_schedule_irq+0xb5/0x140 [ 230.865894] retint_kernel+0x1b/0x2d [ 230.865897] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 230.865905] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 230.865908] RSP: 0018:ffff88804f537b68 EFLAGS: 00010206 ORIG_RAX: ffffffffffffff13 [ 230.865914] RAX: 0000000000040000 RBX: ffff88808997ce80 RCX: 0000000000001000 [ 230.865918] RDX: 0000000000001000 RSI: ffffc90013503000 RDI: ffff88808997ce80 [ 230.865921] RBP: ffff88804f537b98 R08: ffff888050d262c0 R09: ffff88812c3f0dc0 [ 230.865925] R10: 0000000000000000 R11: ffff88808997de7f R12: 0000000000001000 [ 230.865928] R13: 00007ffffffff000 R14: ffffc90013503000 R15: ffff888050d262c0 [ 230.865931] ? __probe_kernel_read+0xe8/0x1c0 [ 230.865933] read_mem+0xfc/0x2c0 [ 230.865935] do_iter_read+0x490/0x640 [ 230.865937] ? dup_iter+0x270/0x270 [ 230.865939] vfs_readv+0xf0/0x160 [ 230.865942] ? compat_rw_copy_check_uvector+0x400/0x400 [ 230.865945] ? kasan_check_read+0x11/0x20 [ 230.865947] ? __fget+0x367/0x540 [ 230.865949] ? iterate_fd+0x360/0x360 [ 230.865951] ? kasan_check_read+0x11/0x20 [ 230.865954] ? _copy_to_user+0xc9/0x120 [ 230.865956] ? __fget_light+0x1a9/0x230 [ 230.865958] do_preadv+0x1c4/0x280 [ 230.865960] ? do_readv+0x370/0x370 [ 230.865963] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 230.865965] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 230.865968] ? do_syscall_64+0x26/0x620 [ 230.865971] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.865973] ? do_syscall_64+0x26/0x620 [ 230.865975] __x64_sys_preadv+0x9a/0xf0 [ 230.865977] do_syscall_64+0xfd/0x620 [ 230.865980] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.865982] RIP: 0033:0x459a29 [ 230.865990] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.865993] RSP: 002b:00007ff3792b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 230.865999] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459a29 [ 230.866003] RDX: 0000000000000002 RSI: 0000000020000200 RDI: 0000000000000006 [ 230.866008] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 230.866014] R10: 00000000fffbc000 R11: 0000000000000246 R12: 00007ff3792ba6d4 [ 230.866020] R13: 00000000004c6d3d R14: 00000000004dc0b8 R15: 00000000ffffffff [ 230.867203] Kernel Offset: disabled [ 231.731829] Rebooting in 86400 seconds..