RCONF(NETDEV_UP): veth0: link is not ready [ 1151.375548] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1151.385669] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1151.399683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1151.415814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1151.429475] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1151.447503] 8021q: adding VLAN 0 to HW filter on device team0 [ 1151.465990] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1151.477214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1151.494076] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1151.506324] bridge0: port 1(bridge_slave_0) entered blocking state [ 1151.512794] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1151.535008] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1151.550149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1151.558467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1151.574180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1151.586728] bridge0: port 2(bridge_slave_1) entered blocking state [ 1151.593300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1151.631162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1151.639596] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1151.657933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1151.673034] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1151.681168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1151.688916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1151.700375] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1151.709139] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1151.720720] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1151.726904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1151.734999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1151.743708] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1151.759510] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1151.768783] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1151.775671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1151.783558] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1151.796302] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1151.813975] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1151.824347] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1151.831752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1151.838107] audit: type=1400 audit(1579509115.963:3591): avc: denied { map } for pid=23495 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1151.839748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1151.944310] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1151.951710] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1151.958501] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1151.969523] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1151.976405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1151.985033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1151.993858] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1152.001736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1152.011666] device veth0_vlan entered promiscuous mode [ 1152.025598] device veth1_vlan entered promiscuous mode [ 1152.031991] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1152.042640] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1152.059128] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1152.071113] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1152.078053] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1152.086267] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1152.094165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1152.102426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1152.114154] device veth0_macvtap entered promiscuous mode [ 1152.120950] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1152.130797] device veth1_macvtap entered promiscuous mode [ 1152.137031] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1152.156465] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1152.168315] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1152.178795] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1152.188801] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.198268] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1152.208252] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.218824] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1152.229461] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.238806] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1152.249201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.258415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1152.268329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.277703] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1152.287480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.297704] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1152.305105] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1152.313892] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1152.322739] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1152.329935] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1152.337929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1152.347565] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1152.358716] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.368441] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1152.378413] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.387631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1152.397709] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.406895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1152.416686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.426014] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1152.435767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.444925] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1152.454679] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.464986] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1152.472026] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1152.479568] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1152.487910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1152.526874] audit: type=1400 audit(1579509116.653:3592): avc: denied { map } for pid=23501 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1152.609890] audit: type=1400 audit(1579509116.723:3593): avc: denied { map_create } for pid=23502 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1152.876343] device bridge_slave_0 left promiscuous mode [ 1152.885517] bridge0: port 1(bridge_slave_0) entered disabled state 08:31:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, 0x0, &(0x7f0000000240), 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:31:57 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e1c000006000300"/57, 0x39}], 0x1) 08:31:57 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x7, 0x0, 0x20000000}}) 08:31:57 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e32000006000300"/57, 0x39}], 0x1) 08:31:57 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4000000014, 0xfa}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:31:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xd800, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) [ 1152.996689] audit: type=1400 audit(1579509117.123:3594): avc: denied { create } for pid=23505 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1153.005357] nla_parse: 18 callbacks suppressed [ 1153.005904] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1153.052815] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1153.085047] audit: type=1400 audit(1579509117.123:3595): avc: denied { write } for pid=23506 comm="syz-executor.0" path="socket:[93635]" dev="sockfs" ino=93635 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1153.116209] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1153.179446] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:31:57 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e33000006000300"/57, 0x39}], 0x1) [ 1153.216581] audit: type=1400 audit(1579509117.173:3596): avc: denied { write } for pid=23505 comm="syz-executor.3" path="socket:[93634]" dev="sockfs" ino=93634 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:31:57 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e1d000006000300"/57, 0x39}], 0x1) [ 1153.366048] audit: type=1400 audit(1579509117.183:3597): avc: denied { write } for pid=23505 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:31:57 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e34000006000300"/57, 0x39}], 0x1) [ 1153.506252] audit: type=1400 audit(1579509117.213:3598): avc: denied { create } for pid=23505 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1153.519024] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1153.622867] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1153.640361] audit: type=1400 audit(1579509117.243:3599): avc: denied { create } for pid=23511 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1153.665870] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:31:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b05, &(0x7f0000000000)='wlan1\x00\a\xd3~\xd4\xa2\xb8y\xe1\x04\xbe\x0e\x00\x00\x00\x00\x00\x00@!\a\xff\x8d\x92\x88\xdc\x80\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00\a\x00\x18\x9f \xfa\x91\x1b\x01U\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x02:a\xad\xef,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fk6=z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\a\x00vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa \x91d\xff9\xfa\r\xbe\x16%\xde\xa2o\xa9\\%\xc8\xfa\xd9t\xe5t\x99\xb9j\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x10\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xae\x98\xdc\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cy\xb3QOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39\xe9yT\xc4\xf0\xef\xe0X\b#\x9a\xcd\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x990\xcei\xf2\xd1\x86\xc3j2m\xf6B\x19=h\x8fe\xc2\x13\x92?||\xbf\x10\x8f$\xdf^\xba\x04^\x13\r}\xd2n?3O\xb5\xa8\xfa\xfe\xe6\x92\xfd\x1c\xbc\x15\x81G\xbeC\xb2\x80\x87\x83\xb6\xf7wz\xcf\xa3c\xac\xe56\x8cg\x15\x9e\x96c') [ 1153.697432] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:31:57 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e1e000006000300"/57, 0x39}], 0x1) 08:31:58 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e35000006000300"/57, 0x39}], 0x1) [ 1153.910727] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1153.981829] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:31:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, 0x0, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:31:58 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e36000006000300"/57, 0x39}], 0x1) [ 1155.733208] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1155.739988] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1155.748231] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1155.755124] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1155.763121] device bridge_slave_1 left promiscuous mode [ 1155.768736] bridge0: port 2(bridge_slave_1) entered disabled state [ 1155.817317] device bridge_slave_0 left promiscuous mode [ 1155.823135] bridge0: port 1(bridge_slave_0) entered disabled state [ 1155.874112] device veth1_macvtap left promiscuous mode [ 1155.879453] device veth0_macvtap left promiscuous mode [ 1155.885872] device veth1_vlan left promiscuous mode [ 1155.891031] device veth0_vlan left promiscuous mode [ 1161.413098] device hsr_slave_1 left promiscuous mode [ 1161.473600] device hsr_slave_0 left promiscuous mode [ 1161.531846] team0 (unregistering): Port device team_slave_1 removed [ 1161.543243] team0 (unregistering): Port device team_slave_0 removed [ 1161.553168] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1161.604285] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1161.677961] bond0 (unregistering): Released all slaves [ 1161.738111] IPVS: ftp: loaded support on port[0] = 21 [ 1161.814846] chnl_net:caif_netlink_parms(): no params data found [ 1161.858708] bridge0: port 1(bridge_slave_0) entered blocking state [ 1161.866211] bridge0: port 1(bridge_slave_0) entered disabled state [ 1161.874678] device bridge_slave_0 entered promiscuous mode [ 1161.930827] bridge0: port 2(bridge_slave_1) entered blocking state [ 1161.937331] bridge0: port 2(bridge_slave_1) entered disabled state [ 1161.951494] device bridge_slave_1 entered promiscuous mode [ 1161.978983] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1161.996323] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1162.027989] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1162.039834] team0: Port device team_slave_0 added [ 1162.049028] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1162.064477] team0: Port device team_slave_1 added [ 1162.097700] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1162.107016] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1162.139139] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1162.151895] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1162.158268] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1162.184116] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1162.195816] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1162.203759] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1162.293331] device hsr_slave_0 entered promiscuous mode [ 1162.337576] device hsr_slave_1 entered promiscuous mode [ 1162.421389] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1162.428854] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1162.456832] kauditd_printk_skb: 37 callbacks suppressed [ 1162.456847] audit: type=1400 audit(1579509126.583:3637): avc: denied { map } for pid=23559 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1162.568134] bridge0: port 2(bridge_slave_1) entered blocking state [ 1162.574747] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1162.581524] bridge0: port 1(bridge_slave_0) entered blocking state [ 1162.587933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1162.672792] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1162.687348] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1162.698867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1162.715469] bridge0: port 1(bridge_slave_0) entered disabled state [ 1162.728470] bridge0: port 2(bridge_slave_1) entered disabled state [ 1162.748124] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1162.755462] 8021q: adding VLAN 0 to HW filter on device team0 [ 1162.769139] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1162.783848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1162.797443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1162.805752] bridge0: port 1(bridge_slave_0) entered blocking state [ 1162.812194] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1162.822509] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1162.831988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1162.839919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1162.847721] bridge0: port 2(bridge_slave_1) entered blocking state [ 1162.854133] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1162.865161] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1162.872258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1162.889342] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1162.896384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1162.907043] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1162.914505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1162.922461] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1162.940848] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1162.950016] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1162.958016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1162.967062] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1162.978400] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1162.986114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1162.995066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1163.006757] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1163.015573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1163.024382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1163.035709] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1163.042910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1163.057284] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1163.066215] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1163.073243] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1163.079974] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1163.093707] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1163.120137] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1163.141938] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1163.149124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1163.165577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1163.173107] audit: type=1400 audit(1579509127.303:3638): avc: denied { map } for pid=23560 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1163.228509] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1163.236094] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1163.243496] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1163.260923] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1163.267888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1163.285879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1163.301521] device veth0_vlan entered promiscuous mode [ 1163.319418] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1163.327370] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1163.337264] device veth1_vlan entered promiscuous mode [ 1163.343662] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1163.356834] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1163.369190] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1163.379328] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1163.387168] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1163.395269] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1163.402827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1163.411305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1163.421363] device veth0_macvtap entered promiscuous mode [ 1163.427543] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1163.437773] device veth1_macvtap entered promiscuous mode [ 1163.444562] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1163.453756] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1163.465696] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1163.475076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1163.485075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1163.494388] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1163.504323] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1163.513533] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1163.523862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1163.533064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1163.542836] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1163.552201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1163.562832] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1163.572046] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1163.581860] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1163.592311] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1163.599349] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1163.848933] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1163.856427] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1163.863984] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1163.872226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1164.008272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1164.018138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1164.027316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1164.037672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1164.047100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1164.056902] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1164.066131] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1164.076071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1164.085416] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1164.095192] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1164.104807] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1164.114634] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1164.125168] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1164.132171] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1164.139397] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1164.148053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1164.210080] audit: type=1400 audit(1579509128.333:3639): avc: denied { map } for pid=23566 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 08:32:08 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000400)) r0 = socket$inet6(0xa, 0x801, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x7, 0x0, 0x20000000}}) 08:32:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280), 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) write(r1, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x181, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000400)) r2 = socket$inet6(0xa, 0x801, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x7, 0x0, 0x20000000}}) 08:32:08 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e21000006000300"/57, 0x39}], 0x1) 08:32:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xd900, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:32:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, 0x0, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:32:08 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e37000006000300"/57, 0x39}], 0x1) [ 1164.570287] audit: type=1400 audit(1579509128.693:3640): avc: denied { create } for pid=23575 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1164.596180] nla_parse: 3 callbacks suppressed [ 1164.596190] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1164.633201] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1164.637002] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1164.689543] audit: type=1400 audit(1579509128.723:3641): avc: denied { write } for pid=23575 comm="syz-executor.0" path="socket:[93883]" dev="sockfs" ino=93883 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:32:08 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e22000006000300"/57, 0x39}], 0x1) 08:32:08 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e38000006000300"/57, 0x39}], 0x1) [ 1164.849683] audit: type=1400 audit(1579509128.753:3642): avc: denied { create } for pid=23572 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1164.966722] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1164.967753] audit: type=1400 audit(1579509128.753:3643): avc: denied { write } for pid=23572 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1164.979616] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:32:09 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e23000006000300"/57, 0x39}], 0x1) [ 1165.094439] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1165.120501] audit: type=1400 audit(1579509128.753:3644): avc: denied { map } for pid=23574 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 08:32:09 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e39000006000300"/57, 0x39}], 0x1) [ 1165.213503] audit: type=1400 audit(1579509128.753:3645): avc: denied { create } for pid=23575 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1165.343254] audit: type=1400 audit(1579509128.763:3646): avc: denied { write } for pid=23571 comm="syz-executor.3" path="socket:[94446]" dev="sockfs" ino=94446 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1165.371846] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1165.378480] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1165.381320] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:32:09 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e24000006000300"/57, 0x39}], 0x1) 08:32:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xda00, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) [ 1165.677946] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:32:10 executing program 5: perf_event_open(&(0x7f00000010c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000300)=0x2000000000005ea, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = accept4(0xffffffffffffffff, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80, 0x80800) accept$inet(r2, &(0x7f0000000340)={0x2, 0x0, @remote}, &(0x7f0000000380)=0x10) r3 = dup(r1) r4 = gettid() capget(&(0x7f0000000180)={0x19980330, r4}, &(0x7f00000001c0)={0x4, 0x81, 0x8001, 0x5d, 0x7, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x6d, "22f40c8e6ee38f39d3e96ab78dc9c3be66c1a44f2d734acf1ca73d521ca96938760bd9f3d30abb6c5707a3d93d0ed51fb009b79c76a60964b96d9b1419337429b75dd6ecf71b57b4557ab9a951c64600fc8562ab7c61fe2a0165c29b5898790a38496273804a41be309d189c07"}, &(0x7f0000000000)=0x91) 08:32:10 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e3a000006000300"/57, 0x39}], 0x1) 08:32:10 executing program 1: getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) dup(0xffffffffffffffff) getpgrp(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75d908c9205ed3b71ea13952fe4cbe6fe94815d4296f6e66de94f42cfa66862535188bc73114cc5b7e45adbc96ada2c96fcdf56ac7d8c5df0d6217f049413454c471de840cdf462e7b21af76c2dd85cfd2af275132f78a7a2a40784f2c848cfe3e120ea0124ee07fabe1ab30355d1da3792ed03734c9d2311b8c492141e49bbd12988425f3e6416d98397d0c772f66625b0984a41111e8655de4c87c3ffc5a612004b19158174c2f52680b3bf2e418bc4e9b4a0b873e7f6926102d5cc7e6eebb2a8407b684607e441ca52eabfeca040254d87b627de25f8e6899de161d199468"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000}, 0x1) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xc4, 0x1) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000ac0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}}) 08:32:10 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e25000006000300"/57, 0x39}], 0x1) [ 1166.475993] capability: warning: `syz-executor.5' uses 32-bit capabilities (legacy support in use) [ 1167.123381] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1167.130159] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1167.139024] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1167.146437] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1167.154843] device bridge_slave_1 left promiscuous mode [ 1167.160438] bridge0: port 2(bridge_slave_1) entered disabled state [ 1167.205173] device veth1_macvtap left promiscuous mode [ 1167.210653] device veth0_macvtap left promiscuous mode [ 1167.216018] device veth1_vlan left promiscuous mode [ 1167.221136] device veth0_vlan left promiscuous mode [ 1167.683949] kauditd_printk_skb: 45 callbacks suppressed [ 1167.683965] audit: type=1400 audit(1579509131.813:3692): avc: denied { map } for pid=23649 comm="syz-executor.2" path="/root/syz-executor.2" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1167.760302] audit: type=1400 audit(1579509131.813:3693): avc: denied { map } for pid=23649 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=456 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1172.873223] device hsr_slave_1 left promiscuous mode [ 1172.914378] device hsr_slave_0 left promiscuous mode [ 1172.959642] team0 (unregistering): Port device team_slave_1 removed [ 1172.969680] team0 (unregistering): Port device team_slave_0 removed [ 1172.979872] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1173.035099] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1173.101027] bond0 (unregistering): Released all slaves [ 1173.149025] IPVS: ftp: loaded support on port[0] = 21 [ 1173.217186] chnl_net:caif_netlink_parms(): no params data found [ 1173.263340] bridge0: port 1(bridge_slave_0) entered blocking state [ 1173.270461] bridge0: port 1(bridge_slave_0) entered disabled state [ 1173.277489] device bridge_slave_0 entered promiscuous mode [ 1173.286285] bridge0: port 2(bridge_slave_1) entered blocking state [ 1173.293213] bridge0: port 2(bridge_slave_1) entered disabled state [ 1173.300518] device bridge_slave_1 entered promiscuous mode [ 1173.318330] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1173.372061] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1173.399215] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1173.414023] team0: Port device team_slave_0 added [ 1173.424497] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1173.435829] team0: Port device team_slave_1 added [ 1173.465944] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1173.475610] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1173.507932] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1173.529281] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1173.535705] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1173.568263] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1173.579873] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1173.595146] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1173.663217] device hsr_slave_0 entered promiscuous mode [ 1173.700740] device hsr_slave_1 entered promiscuous mode [ 1173.741269] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1173.748876] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1173.778888] audit: type=1400 audit(1579509137.903:3694): avc: denied { map } for pid=23652 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1173.891716] bridge0: port 2(bridge_slave_1) entered blocking state [ 1173.898139] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1173.904905] bridge0: port 1(bridge_slave_0) entered blocking state [ 1173.911340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1173.994710] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1174.015067] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1174.027475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1174.036037] bridge0: port 1(bridge_slave_0) entered disabled state [ 1174.043730] bridge0: port 2(bridge_slave_1) entered disabled state [ 1174.061082] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1174.067191] 8021q: adding VLAN 0 to HW filter on device team0 [ 1174.079945] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1174.095963] bridge0: port 1(bridge_slave_0) entered blocking state [ 1174.102432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1174.123249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1174.131717] bridge0: port 2(bridge_slave_1) entered blocking state [ 1174.138869] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1174.162579] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1174.171645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1174.179752] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1174.191138] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1174.201070] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1174.208519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1174.216980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1174.226246] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1174.234166] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1174.253897] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1174.263477] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1174.269835] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1174.281421] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1174.294879] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1174.313459] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1174.324978] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1174.332843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1174.341229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1174.353243] audit: type=1400 audit(1579509138.483:3695): avc: denied { map } for pid=23653 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1174.413392] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1174.421348] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1174.429005] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1174.441339] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1174.448055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1174.456682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1174.467770] device veth0_vlan entered promiscuous mode [ 1174.474710] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1174.483428] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1174.496334] device veth1_vlan entered promiscuous mode [ 1174.502942] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1174.514092] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1174.531370] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1174.541493] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1174.548485] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1174.556337] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1174.564572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1174.572806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1174.583408] device veth0_macvtap entered promiscuous mode [ 1174.589817] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1174.600971] device veth1_macvtap entered promiscuous mode [ 1174.607396] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1174.618974] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1174.632500] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1174.642861] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1174.652968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1174.662420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1174.672222] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1174.681986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1174.691926] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1174.701594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1174.711409] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1174.720726] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1174.730743] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1174.740066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1174.749863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1174.761531] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1174.768627] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1174.775758] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1174.783239] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1174.794628] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1174.802955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1174.822898] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1174.833013] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1174.842232] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1174.852251] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1174.861547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1174.871570] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1174.880784] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1174.891714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1174.901079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1174.911212] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1174.920479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1174.930604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1174.941424] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1174.948467] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1174.963148] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1174.971509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1175.014633] audit: type=1400 audit(1579509139.143:3696): avc: denied { map } for pid=23659 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1175.052096] audit: type=1400 audit(1579509139.183:3697): avc: denied { map_create } for pid=23660 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1175.090141] device bridge_slave_0 left promiscuous mode [ 1175.097274] bridge0: port 1(bridge_slave_0) entered disabled state 08:32:19 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, 0x0, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:32:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONT(r0, 0x4b4a, &(0x7f0000000000)='W') 08:32:19 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e3b000006000300"/57, 0x39}], 0x1) 08:32:19 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e26000006000300"/57, 0x39}], 0x1) 08:32:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xdb00, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:32:19 executing program 1: socket(0x10, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_open_dev$sndpcmc(0x0, 0x4, 0x0) fanotify_init(0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x2, 0x22c, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"/556]}, 0x2a4) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x108) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x83, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) connect$x25(r1, &(0x7f0000000100)={0x9, @remote={[], 0x2}}, 0x12) r2 = inotify_init() inotify_add_watch(r2, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000080)='.\x00', 0xfe) syz_open_procfs(0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0x77, 0x0, 0x8) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000800)={0x6, 0x6, 0x4, 0x80000, 0x4412, {}, {0x1, 0x0, 0x3, 0x1, 0x4, 0x6, "53e80c74"}, 0x1, 0x4, @offset=0x5, 0x200, 0x0, r3}) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='task\x00') fchdir(r4) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='task\x00') fchdir(r5) getdents64(r5, &(0x7f00000003c0)=""/4096, 0x1000) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='task\x00') fchdir(r6) getdents64(r6, &(0x7f00000003c0)=""/4096, 0x1000) r7 = syz_open_procfs(0x0, &(0x7f0000000200)='task\x00') fchdir(r7) write$binfmt_elf64(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbc9a5e8dd24f24b3ac273c81c2b7c8c5b06d007e4c0074313966fe3a4fa212d075205917f03000000030bef6788a2ad000000610000000000000001a25a386ed7fbcbbc4e5508505d08b26f5521b1ac0543979405e200f2ef4214efd76167e74735bfeb92974cfcaadd589f252c8b00b693479bfe5d85dc391a000000000000000000000000001200006ff084b1b5abdcac51fff4ad804a4f326d9c872a75247909341aa8e1be33e12094e59b3fb964ab30e0eb7f25ea6f91454734815c0437dcb712e81b202f045500b00a"], 0xe5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) [ 1175.220157] audit: type=1400 audit(1579509139.333:3698): avc: denied { create } for pid=23663 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1175.226598] nla_parse: 4 callbacks suppressed [ 1175.226607] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1175.279818] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1175.286520] audit: type=1400 audit(1579509139.353:3699): avc: denied { create } for pid=23671 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:32:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) [ 1175.337378] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1175.428742] audit: type=1400 audit(1579509139.353:3700): avc: denied { write } for pid=23671 comm="syz-executor.3" path="socket:[94038]" dev="sockfs" ino=94038 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:32:19 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e27000006000300"/57, 0x39}], 0x1) 08:32:19 executing program 5: perf_event_open(&(0x7f00000010c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000300)=0x2000000000005ea, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) r1 = gettid() capget(&(0x7f0000000180)={0x0, r1}, &(0x7f00000001c0)={0x4, 0x81, 0x0, 0x0, 0x7, 0x5}) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x7c, "22f40c8e6ee38f39d3e96ab78dc9c3be66c1a44f2d734acf1ca73d521ca96938760bd9f3d30abb6c5707a3d93d0ed51fb009b79c76a60964b96d9b1419337429b75dd6ecf71b57b4557ab9a951c64600fc8562ab7c61fe2a0165c29b5898790a38496273804a41be309d189c0781e119436d3cb839059a21ee8340fc"}, &(0x7f0000000000)=0xa0) [ 1175.589313] audit: type=1400 audit(1579509139.383:3701): avc: denied { create } for pid=23668 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:32:19 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e3c000006000300"/57, 0x39}], 0x1) [ 1175.741190] audit: type=1400 audit(1579509139.383:3702): avc: denied { write } for pid=23668 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1175.788030] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:32:19 executing program 5: perf_event_open(&(0x7f00000010c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) gettid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) [ 1175.828504] audit: type=1400 audit(1579509139.393:3704): avc: denied { map } for pid=23674 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 08:32:20 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e28000006000300"/57, 0x39}], 0x1) [ 1175.869048] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1175.962904] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1176.112527] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1176.192833] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:32:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x0) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:32:20 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e3d000006000300"/57, 0x39}], 0x1) 08:32:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xdc00, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:32:20 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e29000006000300"/57, 0x39}], 0x1) 08:32:20 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) 08:32:20 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x79, 0x0, 0x0) [ 1176.398244] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1176.427005] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:32:20 executing program 5: sched_setscheduler(0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75d908c9205ed3b71ea13952fe4cbe6fe94815d4296f6e66de94f42cfa66862535188bc73114cc5b7e45adbc96ada2c96fcdf56ac7d8c5df0d6217f049413454c471de840cdf462e7b21af76c2dd85cfd2af275132f78a7a2a40784f2c848cfe3e120ea0124ee07fabe1ab30355d1da3792ed03734c9d2311b8c492141e49bbd12988425f3e6416d98397d0c772f66625b0984a41111e8655de4c87c3ffc5a612004b19158174c2f52680b3bf2e418bc4e9b4a0b873e7f6926102d5cc7e6eebb2a8407b684607e441ca52eabfeca040254d87b627de25f8e6899de161d199468"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x1) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xc4, 0x1) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000ac0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}}) 08:32:20 executing program 1: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20048040}, 0x40001) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa000000fffffdfd) 08:32:20 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e3e000006000300"/57, 0x39}], 0x1) 08:32:20 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e2a000006000300"/57, 0x39}], 0x1) 08:32:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x0) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:32:20 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e41000006000300"/57, 0x39}], 0x1) 08:32:21 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e2b000006000300"/57, 0x39}], 0x1) 08:32:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f00000000c0)={0xf, 0x8}, 0x10) 08:32:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xdd00, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:32:22 executing program 5: sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) dup(0xffffffffffffffff) getpgrp(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75d908c9205ed3b71ea13952fe4cbe6fe94815d4296f6e66de94f42cfa66862535188bc73114cc5b7e45adbc96ada2c96fcdf56ac7d8c5df0d6217f049413454c471de840cdf462e7b21af76c2dd85cfd2af275132f78a7a2a40784f2c848cfe3e120ea0124ee07fabe1ab30355d1da3792ed03734c9d2311b8c492141e49bbd12988425f3e6416d98397d0c772f66625b0984a41111e8655de4c87c3ffc5a612004b19158174c2f52680b3bf2e418bc4e9b4a0b873e7f6926102d5cc7e6eebb2a8407b684607e441ca52eabfeca040254d87b627de25f8e6899de161d199468"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x1) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xc4, 0x1) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000ac0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}}) 08:32:22 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e42000006000300"/57, 0x39}], 0x1) 08:32:22 executing program 1: perf_event_open(&(0x7f00000010c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000300)=0x2000000000005ea, 0x4) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x10) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000200)={'sit0\x00', {0x2, 0x4e21, @rand_addr=0x4}}) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0xfe20) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[], 0xffffffa8) 08:32:22 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e2c000006000300"/57, 0x39}], 0x1) 08:32:22 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e2d000006000300"/57, 0x39}], 0x1) 08:32:22 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e43000006000300"/57, 0x39}], 0x1) 08:32:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='ip6erspan0\x00', 0x10) [ 1178.829241] kauditd_printk_skb: 128 callbacks suppressed [ 1178.829257] audit: type=1400 audit(1579509142.953:3832): avc: denied { create } for pid=23784 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1178.860993] audit: type=1400 audit(1579509142.963:3833): avc: denied { write } for pid=23784 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1178.885865] audit: type=1400 audit(1579509142.993:3834): avc: denied { map } for pid=23817 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1178.963736] audit: type=1400 audit(1579509143.093:3835): avc: denied { map } for pid=23818 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1179.401231] audit: type=1400 audit(1579509143.533:3836): avc: denied { map } for pid=23819 comm="syz-executor.2" path="/root/syz-executor.2" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1179.449906] audit: type=1400 audit(1579509143.563:3837): avc: denied { map } for pid=23819 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=456 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1179.518789] IPVS: ftp: loaded support on port[0] = 21 [ 1179.825509] chnl_net:caif_netlink_parms(): no params data found [ 1179.977242] bridge0: port 1(bridge_slave_0) entered blocking state [ 1179.983736] bridge0: port 1(bridge_slave_0) entered disabled state [ 1179.991353] device bridge_slave_0 entered promiscuous mode [ 1179.998533] bridge0: port 2(bridge_slave_1) entered blocking state [ 1180.005071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1180.013365] device bridge_slave_1 entered promiscuous mode [ 1180.025467] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1180.032481] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1180.040469] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1180.047227] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1180.056360] device bridge_slave_1 left promiscuous mode [ 1180.062404] bridge0: port 2(bridge_slave_1) entered disabled state [ 1180.103199] device veth1_macvtap left promiscuous mode [ 1180.109591] device veth0_macvtap left promiscuous mode [ 1180.115114] device veth1_vlan left promiscuous mode [ 1180.120340] device veth0_vlan left promiscuous mode [ 1185.816183] device hsr_slave_1 left promiscuous mode [ 1185.875122] device hsr_slave_0 left promiscuous mode [ 1185.943830] team0 (unregistering): Port device team_slave_1 removed [ 1185.954063] team0 (unregistering): Port device team_slave_0 removed [ 1185.966202] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1186.007392] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1186.077339] bond0 (unregistering): Released all slaves [ 1186.113458] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1186.123789] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1186.140812] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1186.148348] team0: Port device team_slave_0 added [ 1186.154959] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1186.162694] team0: Port device team_slave_1 added [ 1186.176644] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1186.183143] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1186.209265] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1186.221304] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1186.227723] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1186.253255] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1186.265742] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1186.274580] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1186.323253] device hsr_slave_0 entered promiscuous mode [ 1186.360708] device hsr_slave_1 entered promiscuous mode [ 1186.401338] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1186.409073] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1186.448666] audit: type=1400 audit(1579509150.573:3838): avc: denied { map } for pid=23822 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1186.568042] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1186.644818] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1186.658427] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1186.669261] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1186.686729] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1186.699257] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1186.717196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1186.729987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1186.748688] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1186.758726] 8021q: adding VLAN 0 to HW filter on device team0 [ 1186.776906] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1186.790288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1186.798426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1186.814760] bridge0: port 1(bridge_slave_0) entered blocking state [ 1186.821220] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1186.839404] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1186.847173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1186.856741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1186.865423] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1186.874121] bridge0: port 2(bridge_slave_1) entered blocking state [ 1186.880554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1186.891765] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1186.903236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1186.913885] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1186.921517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1186.941623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1186.949802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1186.967249] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1186.977837] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1186.989790] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1186.997373] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1187.013250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1187.021869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1187.037545] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1187.045619] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1187.055723] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1187.063045] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1187.070009] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1187.084443] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1187.192533] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1187.204830] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1187.212178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1187.241244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1187.287925] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1187.299467] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1187.310116] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1187.328681] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1187.339062] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1187.354331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1187.366758] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1187.383556] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1187.397238] device veth0_vlan entered promiscuous mode [ 1187.409876] device veth1_vlan entered promiscuous mode [ 1187.416759] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1187.429400] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1187.446267] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1187.457941] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1187.465598] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1187.474149] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1187.482097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1187.489992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1187.501484] device veth0_macvtap entered promiscuous mode [ 1187.508119] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1187.519445] device veth1_macvtap entered promiscuous mode [ 1187.526418] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1187.536770] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1187.549442] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1187.560925] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1187.572731] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1187.582399] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1187.592597] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1187.604180] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1187.615034] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1187.624618] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1187.635185] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1187.645233] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1187.655407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1187.664651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1187.674437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1187.684706] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1187.691966] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1187.699401] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1187.707977] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1187.716346] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1187.724481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1187.735408] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1187.746566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1187.756747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1187.767535] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1187.777181] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1187.787532] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1187.797111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1187.807270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1187.816795] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1187.826924] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1187.836391] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1187.846376] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1187.856736] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1187.863970] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1187.871579] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1187.879680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1187.948444] audit: type=1400 audit(1579509152.073:3839): avc: denied { map } for pid=23835 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1188.019366] audit: type=1400 audit(1579509152.123:3840): avc: denied { map_create } for pid=23836 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1188.078733] device bridge_slave_0 left promiscuous mode [ 1188.091678] bridge0: port 1(bridge_slave_0) entered disabled state 08:32:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x0) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:32:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xde00, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:32:32 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e44000006000300"/57, 0x39}], 0x1) 08:32:32 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e2e000006000300"/57, 0x39}], 0x1) 08:32:32 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) accept$packet(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x4e24, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 08:32:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readlink(0x0, 0x0, 0x0) [ 1188.196154] audit: type=1400 audit(1579509152.323:3841): avc: denied { create } for pid=23844 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1188.208759] nla_parse: 11 callbacks suppressed [ 1188.208786] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1188.245828] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1188.283627] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:32:32 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000280), 0x8) 08:32:32 executing program 5: [ 1188.288934] audit: type=1400 audit(1579509152.333:3842): avc: denied { write } for pid=23839 comm="syz-executor.0" path="socket:[95055]" dev="sockfs" ino=95055 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:32:32 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e2f000006000300"/57, 0x39}], 0x1) [ 1188.413470] audit: type=1400 audit(1579509152.353:3843): avc: denied { create } for pid=23841 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:32:32 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e45000006000300"/57, 0x39}], 0x1) 08:32:32 executing program 1: 08:32:32 executing program 5: [ 1188.513682] audit: type=1400 audit(1579509152.353:3844): avc: denied { write } for pid=23841 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1188.681939] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1188.688344] audit: type=1400 audit(1579509152.363:3845): avc: denied { write } for pid=23844 comm="syz-executor.3" path="socket:[95054]" dev="sockfs" ino=95054 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1188.893591] audit: type=1400 audit(1579509152.373:3846): avc: denied { map } for pid=23850 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1188.957009] audit: type=1400 audit(1579509152.403:3847): avc: denied { read } for pid=23841 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:32:33 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:32:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xdf00, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:32:33 executing program 5: 08:32:33 executing program 1: 08:32:33 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e46000006000300"/57, 0x39}], 0x1) 08:32:33 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e30000006000300"/57, 0x39}], 0x1) 08:32:33 executing program 5: [ 1189.192147] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1189.206352] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:32:33 executing program 1: [ 1189.270363] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1189.307036] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:32:33 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e47000006000300"/57, 0x39}], 0x1) 08:32:33 executing program 5: 08:32:33 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:32:33 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e31000006000300"/57, 0x39}], 0x1) 08:32:33 executing program 1: [ 1189.764915] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:32:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xe000, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:32:34 executing program 5: 08:32:34 executing program 1: 08:32:34 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e32000006000300"/57, 0x39}], 0x1) 08:32:34 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e48000006000300"/57, 0x39}], 0x1) [ 1190.441710] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:32:34 executing program 5: 08:32:34 executing program 1: 08:32:34 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e33000006000300"/57, 0x39}], 0x1) 08:32:34 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e49000006000300"/57, 0x39}], 0x1) [ 1192.285839] kauditd_printk_skb: 97 callbacks suppressed [ 1192.285857] audit: type=1400 audit(1579509156.413:3945): avc: denied { map } for pid=23955 comm="syz-executor.2" path="/root/syz-executor.2" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1192.370288] audit: type=1400 audit(1579509156.463:3946): avc: denied { map } for pid=23955 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=456 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1192.415170] audit: type=1400 audit(1579509156.463:3947): avc: denied { map } for pid=23955 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=456 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1192.448044] IPVS: ftp: loaded support on port[0] = 21 [ 1192.495623] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1192.502625] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1192.510886] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1192.517596] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1192.525830] device bridge_slave_1 left promiscuous mode [ 1192.531867] bridge0: port 2(bridge_slave_1) entered disabled state [ 1192.574995] device veth1_macvtap left promiscuous mode [ 1192.580536] device veth0_macvtap left promiscuous mode [ 1192.585860] device veth1_vlan left promiscuous mode [ 1192.591200] device veth0_vlan left promiscuous mode [ 1198.082536] device hsr_slave_1 left promiscuous mode [ 1198.136246] device hsr_slave_0 left promiscuous mode [ 1198.191217] team0 (unregistering): Port device team_slave_1 removed [ 1198.202533] team0 (unregistering): Port device team_slave_0 removed [ 1198.215633] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1198.264652] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1198.328700] bond0 (unregistering): Released all slaves [ 1198.407431] chnl_net:caif_netlink_parms(): no params data found [ 1198.449966] bridge0: port 1(bridge_slave_0) entered blocking state [ 1198.457870] bridge0: port 1(bridge_slave_0) entered disabled state [ 1198.465613] device bridge_slave_0 entered promiscuous mode [ 1198.474146] bridge0: port 2(bridge_slave_1) entered blocking state [ 1198.481448] bridge0: port 2(bridge_slave_1) entered disabled state [ 1198.488838] device bridge_slave_1 entered promiscuous mode [ 1198.510025] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1198.520972] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1198.538547] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1198.546453] team0: Port device team_slave_0 added [ 1198.552921] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1198.561240] team0: Port device team_slave_1 added [ 1198.579047] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1198.585721] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1198.612576] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1198.626071] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1198.632909] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1198.662783] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1198.721038] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1198.729437] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1198.803279] device hsr_slave_0 entered promiscuous mode [ 1198.860724] device hsr_slave_1 entered promiscuous mode [ 1198.911361] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1198.919760] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1198.946557] audit: type=1400 audit(1579509163.073:3948): avc: denied { map } for pid=23958 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1199.099322] bridge0: port 2(bridge_slave_1) entered blocking state [ 1199.105780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1199.112846] bridge0: port 1(bridge_slave_0) entered blocking state [ 1199.119851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1199.206940] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1199.229029] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1199.248855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1199.267037] bridge0: port 1(bridge_slave_0) entered disabled state [ 1199.277521] bridge0: port 2(bridge_slave_1) entered disabled state [ 1199.298886] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1199.309843] 8021q: adding VLAN 0 to HW filter on device team0 [ 1199.330582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1199.339081] bridge0: port 1(bridge_slave_0) entered blocking state [ 1199.345721] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1199.383639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1199.398981] bridge0: port 2(bridge_slave_1) entered blocking state [ 1199.405684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1199.425744] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1199.434056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1199.446124] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1199.454114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1199.472574] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1199.484430] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1199.492593] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1199.499929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1199.509364] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1199.522955] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1199.540990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1199.554759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1199.567113] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1199.574980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1199.585115] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1199.599025] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1199.607629] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1199.634662] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1199.647595] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1199.655102] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1199.662803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1199.677423] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1199.709476] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1199.728923] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1199.745043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1199.757573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1199.759454] audit: type=1400 audit(1579509163.883:3949): avc: denied { map } for pid=23959 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1199.854091] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1199.863283] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1199.871220] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1199.883923] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1199.892334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1199.901556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1199.912804] device veth0_vlan entered promiscuous mode [ 1199.921691] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1199.929375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1199.942743] device veth1_vlan entered promiscuous mode [ 1199.949545] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1199.963048] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1199.978939] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1199.991935] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1200.000931] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1200.008666] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1200.017748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1200.026567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1200.038933] device veth0_macvtap entered promiscuous mode [ 1200.047138] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1200.063324] device veth1_macvtap entered promiscuous mode [ 1200.069981] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1200.085187] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1200.096530] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1200.106052] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1200.116577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1200.126902] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1200.137615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1200.147791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1200.158376] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1200.170819] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1200.180998] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1200.190943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1200.201068] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1200.210728] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1200.221145] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1200.232680] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1200.241063] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1200.248433] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1200.256588] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1200.264484] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1200.273133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1200.284502] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1200.295442] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1200.304976] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1200.315063] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1200.325164] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1200.335321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1200.346158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1200.356438] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1200.366437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1200.377205] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1200.387355] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1200.397610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1200.409594] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1200.417140] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1200.424847] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1200.434607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1200.486274] audit: type=1400 audit(1579509164.613:3950): avc: denied { map } for pid=23965 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1200.518584] audit: type=1400 audit(1579509164.643:3951): avc: denied { map_create } for pid=23966 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1200.559308] device bridge_slave_0 left promiscuous mode [ 1200.567030] bridge0: port 1(bridge_slave_0) entered disabled state 08:32:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:32:44 executing program 5: 08:32:44 executing program 1: 08:32:44 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e34000006000300"/57, 0x39}], 0x1) 08:32:44 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e4a000006000300"/57, 0x39}], 0x1) 08:32:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xe100, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:32:44 executing program 5: [ 1200.678955] audit: type=1400 audit(1579509164.803:3952): avc: denied { create } for pid=23970 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1200.681098] nla_parse: 5 callbacks suppressed [ 1200.681108] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:32:44 executing program 1: [ 1200.724446] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1200.742302] audit: type=1400 audit(1579509164.803:3953): avc: denied { write } for pid=23974 comm="syz-executor.3" path="socket:[95856]" dev="sockfs" ino=95856 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1200.770383] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:32:45 executing program 1: 08:32:45 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e35000006000300"/57, 0x39}], 0x1) [ 1200.858395] audit: type=1400 audit(1579509164.853:3954): avc: denied { create } for pid=23969 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1200.923181] audit: type=1400 audit(1579509164.853:3955): avc: denied { write } for pid=23969 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:32:45 executing program 5: socket$kcm(0x29, 0x2, 0x0) gettid() getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000440)='tasks\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000000)) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x8, 0x0, 0x2, 0x5, 0x0, 0x2, 0x751f5ddaa7345408, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x78b}, 0x80, 0x100, 0x0, 0x8, 0x0, 0x23}, 0xffffffffffffffff, 0x1, r1, 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000440)='tasks\x00', 0x2, 0x0) r4 = gettid() perf_event_open(0x0, r4, 0xa, 0xffffffffffffffff, 0x0) write$cgroup_pid(r3, &(0x7f0000000480), 0x12) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140)=r4, 0x12) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r5, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r6}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000000)='-em1lo\'(:(\x00', r6}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r7}, 0xc) r8 = openat$cgroup_procs(r0, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r11) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r9, r10, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) write$cgroup_pid(r8, &(0x7f00000002c0)=r9, 0x12) r12 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 1200.976538] audit: type=1400 audit(1579509164.873:3956): avc: denied { create } for pid=23970 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:32:45 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e4b000006000300"/57, 0x39}], 0x1) [ 1201.059708] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1201.063720] audit: type=1400 audit(1579509164.873:3957): avc: denied { write } for pid=23970 comm="syz-executor.0" path="socket:[95862]" dev="sockfs" ino=95862 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1201.213163] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1201.273651] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:32:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:32:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$nl_route(r0, &(0x7f00000069c0)={0x0, 0x0, &(0x7f0000006980)={&(0x7f0000006480)=@setlink={0x38, 0x13, 0x24fbce10594e3291, 0x0, 0x0, {}, [@IFLA_PORT_SELF={0x4}, @IFLA_IFNAME={0x14, 0x3, 'caif0\x00'}]}, 0x38}}, 0x0) 08:32:45 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e36000006000300"/57, 0x39}], 0x1) 08:32:45 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e4c000006000300"/57, 0x39}], 0x1) 08:32:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xe200, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) [ 1201.680949] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1201.695276] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1201.706999] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:32:45 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r4 = creat(&(0x7f0000000680)='./bus\x00', 0x0) dup2(r4, r1) 08:32:45 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e37000006000300"/57, 0x39}], 0x1) 08:32:45 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e4d000006000300"/57, 0x39}], 0x1) 08:32:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/82, 0x52}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:32:46 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:32:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_set$pid(0x0, 0xffffffffffffffff, 0x0) [ 1201.994008] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:32:46 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e38000006000300"/57, 0x39}], 0x1) 08:32:46 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000d50104000000000100000000dcec6c68000074be9084baa5b5db0700000068000a0500b71feb"], 0x2a) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000240)=""/25, 0x19}], 0x1) 08:32:46 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e4e000006000300"/57, 0x39}], 0x1) 08:32:46 executing program 5: socket$nl_route(0x10, 0x3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000c80200000000000058010000580100000000000058010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00058010000000000000000000000000000000000000000380071756f74610000000000000000000000000000000000000000000000000001000000000000000700000000000000080000000000000048006e666163637400000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000030000000000000068004354000000000000000000000000000000000000000000000000000000020000000000000000000000007070747000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000e000000200000000cbeb2ca80000000076657468305f766c616e0000000000006970766c616e3100000000000000000000000000000000000000000000000000ff0000000000000000000000000000000c000118000000007000d80000000000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001000000000000000000000000736e6d705f747261700000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) 08:32:46 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e39000006000300"/57, 0x39}], 0x1) [ 1202.612258] xt_nfacct: accounting object `syz0' does not exists 08:32:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xe300, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:32:47 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e4f000006000300"/57, 0x39}], 0x1) 08:32:47 executing program 5: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) 08:32:47 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e3a000006000300"/57, 0x39}], 0x1) 08:32:47 executing program 1: ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x8000000000401, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil}) r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f00008fd000/0x2000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) shmat(r0, &(0x7f0000ffe000/0x1000)=nil, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.stat\x00', 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000080)) socket$xdp(0x2c, 0x3, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/asound/seq/clients\x00', 0x0, 0x0) read$midi(r2, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) [ 1204.030491] kauditd_printk_skb: 95 callbacks suppressed [ 1204.030507] audit: type=1400 audit(1579509168.153:4053): avc: denied { create } for pid=24077 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1204.111775] audit: type=1400 audit(1579509168.193:4054): avc: denied { write } for pid=24077 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1204.139383] audit: type=1400 audit(1579509168.223:4055): avc: denied { map } for pid=24094 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1204.164858] audit: type=1400 audit(1579509168.273:4056): avc: denied { map } for pid=24095 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1204.209753] audit: type=1400 audit(1579509168.333:4057): avc: denied { map } for pid=24096 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1204.851938] audit: type=1400 audit(1579509168.983:4058): avc: denied { map } for pid=24097 comm="syz-executor.2" path="/root/syz-executor.2" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1204.885979] audit: type=1400 audit(1579509169.013:4059): avc: denied { map } for pid=24097 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=456 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1205.068150] IPVS: ftp: loaded support on port[0] = 21 [ 1205.261201] chnl_net:caif_netlink_parms(): no params data found [ 1205.290000] bridge0: port 1(bridge_slave_0) entered blocking state [ 1205.296645] bridge0: port 1(bridge_slave_0) entered disabled state [ 1205.303977] device bridge_slave_0 entered promiscuous mode [ 1205.311637] bridge0: port 2(bridge_slave_1) entered blocking state [ 1205.318152] bridge0: port 2(bridge_slave_1) entered disabled state [ 1205.325355] device bridge_slave_1 entered promiscuous mode [ 1205.339083] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1205.346184] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1205.354936] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1205.362058] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1205.369954] device bridge_slave_1 left promiscuous mode [ 1205.375832] bridge0: port 2(bridge_slave_1) entered disabled state [ 1205.433412] device veth1_macvtap left promiscuous mode [ 1205.438821] device veth0_macvtap left promiscuous mode [ 1205.444977] device veth1_vlan left promiscuous mode [ 1205.450301] device veth0_vlan left promiscuous mode [ 1211.092833] device hsr_slave_1 left promiscuous mode [ 1211.133545] device hsr_slave_0 left promiscuous mode [ 1211.182176] team0 (unregistering): Port device team_slave_1 removed [ 1211.193962] team0 (unregistering): Port device team_slave_0 removed [ 1211.203946] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1211.234242] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1211.318641] bond0 (unregistering): Released all slaves [ 1211.363230] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1211.372482] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1211.392118] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1211.399429] team0: Port device team_slave_0 added [ 1211.405334] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1211.412984] team0: Port device team_slave_1 added [ 1211.428346] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1211.435248] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1211.460788] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1211.472909] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1211.479161] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1211.504805] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1211.521509] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1211.529241] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1211.564434] device hsr_slave_0 entered promiscuous mode [ 1211.600805] device hsr_slave_1 entered promiscuous mode [ 1211.641254] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1211.648676] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1211.694843] audit: type=1400 audit(1579509175.823:4060): avc: denied { map } for pid=24100 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1211.796517] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1211.843464] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1211.849583] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1211.860912] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1211.871712] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1211.877938] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1211.887761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1211.911203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1211.921614] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1211.927709] 8021q: adding VLAN 0 to HW filter on device team0 [ 1211.938726] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1211.946988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1211.955902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1211.964990] bridge0: port 1(bridge_slave_0) entered blocking state [ 1211.971419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1211.982530] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1211.992677] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1212.001896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1212.010021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1212.018275] bridge0: port 2(bridge_slave_1) entered blocking state [ 1212.024705] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1212.042969] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1212.050982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1212.062621] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1212.071101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1212.093100] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1212.102352] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1212.118618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1212.139062] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1212.158119] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1212.164313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1212.179883] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1212.188115] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1212.204297] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1212.214592] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1212.221991] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1212.228769] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1212.244237] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1212.311192] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1212.324640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1212.429818] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1212.438208] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1212.453140] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1212.469742] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1212.478595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1212.496669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1212.509896] device veth0_vlan entered promiscuous mode [ 1212.524367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1212.536223] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1212.556673] device veth1_vlan entered promiscuous mode [ 1212.569301] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1212.593077] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1212.617298] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1212.636112] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1212.648380] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1212.660749] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1212.668110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1212.676888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1212.687581] device veth0_macvtap entered promiscuous mode [ 1212.695169] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1212.704726] device veth1_macvtap entered promiscuous mode [ 1212.712256] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1212.723640] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1212.734659] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1212.745175] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1212.755620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1212.764953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1212.775080] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1212.784428] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1212.794229] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1212.803789] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1212.814175] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1212.824015] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1212.833837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1212.843061] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1212.853115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1212.863657] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1212.871254] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1212.878352] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1212.887168] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1212.895057] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1212.903760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1212.914315] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1212.924609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1212.933842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1212.943619] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1212.952787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1212.962764] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1212.972098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1212.981851] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1212.991030] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1213.001888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1213.011862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1213.021981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1213.033070] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1213.041108] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1213.048374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1213.056440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1213.110282] audit: type=1400 audit(1579509177.233:4061): avc: denied { map } for pid=24114 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1213.188634] audit: type=1400 audit(1579509177.303:4062): avc: denied { map_create } for pid=24115 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1213.261216] device bridge_slave_0 left promiscuous mode [ 1213.269297] bridge0: port 1(bridge_slave_0) entered disabled state 08:32:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:32:57 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e50000006000300"/57, 0x39}], 0x1) 08:32:57 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e3b000006000300"/57, 0x39}], 0x1) 08:32:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="500000002800210400"/20, @ANYRES32, @ANYBLOB="ab03000000000000000000000c0080eb8600000075700000200002000300000800000000000000000002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792a8fde2698ebe5f83bc5b1d2c1df419444001d3870e46567bfc97d324b63063fc06b6d0e583875ba0a6d9da2ca00000000ef0f"], 0x50}}, 0x0) 08:32:57 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) 08:32:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xe400, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:32:57 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f00000006c0), 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000280)={0x0, 0xa8, "7a3ac21c9eb09d00e5f704ecf4d91970bbeb161830d27c0c3a0fa4683375d40209e93478e62bc942c0cef67c3c31e7909af1aaf16e59920d46319fe36dbef91ce5eabea15ac5c2335fea456ae0462f483313f46b453fdcca648763dc67ea996629593b36ae36dcad0f352ab58266a366bb7e5587600a94633601bf5206cdfbab3db974c54dc984a92b72e12ed075bebc3cba58e520da5f72aea04aecea92089057057e88dee1c7c9"}, &(0x7f0000000140)=0x6861) [ 1213.431991] audit: type=1400 audit(1579509177.563:4063): avc: denied { create } for pid=24119 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1213.460936] nla_parse: 10 callbacks suppressed [ 1213.460946] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:32:57 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbfs(0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$rfkill(r0, 0x0, 0x2f) [ 1213.505929] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1213.547280] audit: type=1400 audit(1579509177.583:4064): avc: denied { create } for pid=24120 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:32:57 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e3c000006000300"/57, 0x39}], 0x1) [ 1213.625311] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:32:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) [ 1213.657078] audit: type=1400 audit(1579509177.583:4065): avc: denied { write } for pid=24120 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:32:57 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e51000006000300"/57, 0x39}], 0x1) [ 1213.771454] audit: type=1400 audit(1579509177.583:4066): avc: denied { write } for pid=24119 comm="syz-executor.0" path="socket:[97353]" dev="sockfs" ino=97353 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1213.813619] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1213.866219] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:32:58 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e3d000006000300"/57, 0x39}], 0x1) [ 1213.906478] audit: type=1400 audit(1579509177.593:4067): avc: denied { create } for pid=24118 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1213.933750] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1213.988818] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1214.000833] audit: type=1400 audit(1579509177.613:4068): avc: denied { map } for pid=24128 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1214.074074] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1214.119355] audit: type=1400 audit(1579509177.613:4069): avc: denied { map } for pid=24128 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1214.171025] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:32:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:32:58 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e52000006000300"/57, 0x39}], 0x1) 08:32:58 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e3e000006000300"/57, 0x39}], 0x1) 08:32:58 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x800, 0x0, 0x3, 0x100000000000001}, 0x20) 08:32:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xe500, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) [ 1214.374116] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:32:58 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e53000006000300"/57, 0x39}], 0x1) 08:32:58 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='statm\x00') preadv(r0, &(0x7f00000017c0), 0x1a2, 0x0) 08:32:58 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e41000006000300"/57, 0x39}], 0x1) 08:32:58 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 08:32:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:32:58 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e54000006000300"/57, 0x39}], 0x1) 08:32:59 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000100), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="580000000000000014010000090000000500000000040000", @ANYPTR=&(0x7f0000000a80)=ANY=[@ANYBLOB="0300000000000000"], @ANYPTR=&(0x7f0000000ac0)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="576f00f74e3f9c00000000000000370006000000000000000b000000000000002b001761000000000100000000000000b80f66ce0b254c49b3ef55718b4a48275ecf9d1ac57747040c3ac632120bc9d4e2854017b4b8422085959ecbec1717daf4befccc034f8e71c58dbdf31b5d0e1196cd52f0df5e9abb4f82c3d956d58c8d73d91e3a40ec143a358e5718c6ced44e8d049d737b8699e9ee232005f88dd6b60d28c12e6344a1f134f1f01908a32613bd2264ec3e96e16d9ca1279f823a55aacd8e841818357bb3c4f9d6cf5786915e0e0f872e521eb7f364c6c71965aa93d6d8bf065b41d73656314fc98bd51cef5279e900000000000000"], 0x58}, 0x0) 08:32:59 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e42000006000300"/57, 0x39}], 0x1) 08:32:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x24, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x3}]}, 0x24}}, 0x0) 08:32:59 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e55000006000300"/57, 0x39}], 0x1) 08:32:59 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e43000006000300"/57, 0x39}], 0x1) 08:33:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xe600, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:33:00 executing program 1: socket$kcm(0x29, 0x2, 0x0) gettid() getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000440)='tasks\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000000)) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x8, 0x0, 0x2, 0x5, 0x0, 0x2, 0x751f5ddaa7345408, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x78b}, 0x80, 0x100, 0x0, 0x8, 0x0, 0x23}, 0xffffffffffffffff, 0x1, r1, 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000440)='tasks\x00', 0x2, 0x0) r4 = gettid() perf_event_open(0x0, r4, 0xa, 0xffffffffffffffff, 0x0) write$cgroup_pid(r3, &(0x7f0000000480), 0x12) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140)=r4, 0x12) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r5, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r6}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000000)='-em1lo\'(:(\x00', r6}, 0x30) r7 = openat$cgroup_procs(r0, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf277811a07748aa6147edda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5dd2e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27190c1aee60272677e3c000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r8, r9, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) write$cgroup_pid(r7, &(0x7f00000002c0)=r8, 0x12) r11 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:33:00 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e44000006000300"/57, 0x39}], 0x1) 08:33:00 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e56000006000300"/57, 0x39}], 0x1) 08:33:00 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x34}}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xfd4f) read(r0, &(0x7f0000000140)=""/165, 0x1000000eb) [ 1216.044057] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1216.751397] kauditd_printk_skb: 112 callbacks suppressed [ 1216.751412] audit: type=1400 audit(1579509180.883:4182): avc: denied { map } for pid=24249 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1216.861952] audit: type=1400 audit(1579509180.993:4183): avc: denied { map } for pid=24250 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1217.273835] audit: type=1400 audit(1579509181.403:4184): avc: denied { map } for pid=24251 comm="syz-executor.2" path="/root/syz-executor.2" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1217.336548] audit: type=1400 audit(1579509181.433:4185): avc: denied { map } for pid=24251 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=456 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1217.403549] IPVS: ftp: loaded support on port[0] = 21 [ 1217.581875] chnl_net:caif_netlink_parms(): no params data found [ 1217.741907] bridge0: port 1(bridge_slave_0) entered blocking state [ 1217.748467] bridge0: port 1(bridge_slave_0) entered disabled state [ 1217.755819] device bridge_slave_0 entered promiscuous mode [ 1217.763718] bridge0: port 2(bridge_slave_1) entered blocking state [ 1217.770353] bridge0: port 2(bridge_slave_1) entered disabled state [ 1217.777473] device bridge_slave_1 entered promiscuous mode [ 1217.915769] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1217.928690] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1217.947207] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1217.954891] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1217.963636] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1217.970435] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1217.978277] device bridge_slave_1 left promiscuous mode [ 1217.984150] bridge0: port 2(bridge_slave_1) entered disabled state [ 1218.043064] device veth1_macvtap left promiscuous mode [ 1218.048406] device veth0_macvtap left promiscuous mode [ 1218.054635] device veth1_vlan left promiscuous mode [ 1218.059698] device veth0_vlan left promiscuous mode [ 1223.622327] device hsr_slave_1 left promiscuous mode [ 1223.695156] device hsr_slave_0 left promiscuous mode [ 1223.742510] team0 (unregistering): Port device team_slave_1 removed [ 1223.753907] team0 (unregistering): Port device team_slave_0 removed [ 1223.764425] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1223.807583] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1223.869971] bond0 (unregistering): Released all slaves [ 1223.916113] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1223.923850] team0: Port device team_slave_0 added [ 1223.932028] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1223.939226] team0: Port device team_slave_1 added [ 1223.956438] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1223.962871] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1223.988609] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1224.000393] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1224.000410] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1224.000418] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1224.001586] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1224.049636] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1224.103284] device hsr_slave_0 entered promiscuous mode [ 1224.140670] device hsr_slave_1 entered promiscuous mode [ 1224.181191] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1224.189277] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1224.203434] audit: type=1400 audit(1579509188.333:4186): avc: denied { map } for pid=24254 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1224.346404] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1224.427357] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1224.437516] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1224.447736] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1224.457381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1224.465586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1224.477001] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1224.488636] 8021q: adding VLAN 0 to HW filter on device team0 [ 1224.511890] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1224.519182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1224.528251] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1224.537549] bridge0: port 1(bridge_slave_0) entered blocking state [ 1224.544099] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1224.561919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1224.570937] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1224.578256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1224.586947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1224.594985] bridge0: port 2(bridge_slave_1) entered blocking state [ 1224.601653] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1224.612405] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1224.628058] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1224.639142] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1224.656678] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1224.668259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1224.684885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1224.697070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1224.712327] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1224.727683] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1224.735642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1224.751906] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1224.769357] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1224.780426] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1224.791427] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1224.798328] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1224.809018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1224.826612] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1224.834998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1224.844258] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1224.851327] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1224.858098] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1224.873475] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1224.894471] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1224.907267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1224.927714] audit: type=1400 audit(1579509189.053:4187): avc: denied { map } for pid=24255 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1225.039368] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1225.047722] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1225.056945] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1225.069974] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1225.077787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1225.086927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1225.098009] device veth0_vlan entered promiscuous mode [ 1225.105175] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1225.113259] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1225.133345] device veth1_vlan entered promiscuous mode [ 1225.139549] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1225.153031] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1225.169599] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1225.182187] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1225.189750] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1225.198750] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1225.208657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1225.218540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1225.229689] device veth0_macvtap entered promiscuous mode [ 1225.237605] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1225.248280] device veth1_macvtap entered promiscuous mode [ 1225.255184] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1225.265741] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1225.278458] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1225.288683] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1225.299982] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.309962] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1225.320850] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.329989] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1225.340544] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.351788] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1225.361704] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.370919] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1225.380801] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.390108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1225.399967] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.410567] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1225.417658] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1225.425457] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1225.433381] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1225.441159] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1225.449132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1225.459123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1225.469466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.479294] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1225.489141] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.498313] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1225.508267] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.517707] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1225.527626] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.536852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1225.546617] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.555843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1225.565714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.576146] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1225.585949] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1225.594548] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1225.611338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1225.655190] audit: type=1400 audit(1579509189.783:4188): avc: denied { map } for pid=24261 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1225.708412] audit: type=1400 audit(1579509189.813:4189): avc: denied { map } for pid=24261 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 08:33:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:33:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xe700, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:33:09 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e57000006000300"/57, 0x39}], 0x1) 08:33:09 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e45000006000300"/57, 0x39}], 0x1) 08:33:09 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8b38, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = gettid() clone(0x100000100001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) kcmp(r2, r0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) 08:33:09 executing program 1: socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001a80)=@ipv6_delrule={0x54, 0x21, 0x1, 0x0, 0x0, {0xa, 0x14, 0x80}, [@FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @FIB_RULE_POLICY=@FRA_GOTO={0x8}, @FRA_SRC={0x14, 0x2, @ipv4}, @FIB_RULE_POLICY=@FRA_FWMASK={0x8}]}, 0x54}}, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) setsockopt$inet_group_source_req(r2, 0x0, 0x2b, &(0x7f00000001c0)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @broadcast=0x18}}}, 0x108) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816107d08f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x206) [ 1225.743533] audit: type=1400 audit(1579509189.873:4190): avc: denied { map_create } for pid=24262 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1225.849264] audit: type=1400 audit(1579509189.973:4191): avc: denied { create } for pid=24270 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1225.884927] nla_parse: 15 callbacks suppressed [ 1225.884937] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1225.894846] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1225.929760] audit: type=1400 audit(1579509190.013:4193): avc: denied { create } for pid=24264 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1225.955349] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:33:10 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e58000006000300"/57, 0x39}], 0x1) 08:33:10 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e46000006000300"/57, 0x39}], 0x1) [ 1225.985787] audit: type=1400 audit(1579509190.013:4194): avc: denied { write } for pid=24264 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1226.120856] audit: type=1400 audit(1579509190.003:4192): avc: denied { write } for pid=24265 comm="syz-executor.3" path="socket:[96829]" dev="sockfs" ino=96829 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:33:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000000900)=""/4096, 0xfe7e, 0x0, 0x0, 0x1c4) [ 1226.232520] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1226.234346] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1226.258535] audit: type=1400 audit(1579509190.013:4195): avc: denied { write } for pid=24265 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1226.314934] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:33:10 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e47000006000300"/57, 0x39}], 0x1) 08:33:10 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e59000006000300"/57, 0x39}], 0x1) 08:33:10 executing program 5: getpgrp(0x0) gettid() r0 = getpid() sched_setattr(r0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_WRITEI_FRAMES(0xffffffffffffffff, 0x40184150, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x80}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x100000, 0x5, 0x0, 0x7f}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/config\x00') ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, 0x0) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ab64}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r6 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1}}, {{@in=@loopback}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @local}, 0x1c) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000005c0)=0x14) sendmsg$nl_route_sched(r7, &(0x7f0000000280)={0x0, 0xfffffffffffffe35, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="3800000024006d7f528e00000000000000000058", @ANYRES32=r9, @ANYBLOB="00000000ffffffff0000000008000100686866000c00020008000200000000335a18edbb00"], 0x38}}, 0x0) [ 1226.565838] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1226.575654] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:33:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:33:11 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e5a000006000300"/57, 0x39}], 0x1) 08:33:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xe800, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:33:11 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e48000006000300"/57, 0x39}], 0x1) 08:33:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:33:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) mount$9p_tcp(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0xaee7f346ebc48fd4) unshare(0x20020000) poll(0x0, 0x0, 0x400007f) rmdir(&(0x7f0000000180)='./file0\x00') [ 1227.062667] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1227.114582] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:33:11 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e5b000006000300"/57, 0x39}], 0x1) 08:33:11 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e49000006000300"/57, 0x39}], 0x1) 08:33:11 executing program 1: creat(&(0x7f0000000080)='./bus\x00', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002380), 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write(r2, &(0x7f0000000100)="d90a27b01ae04fc2dee32da9add1210cbff7fa581befc88d2cdd3899ba35db1bae2d9b", 0x413958f5) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./bus\x00', &(0x7f00000003c0)='bpf\x00', 0x200000, &(0x7f0000000580)={[{@mode={'mode'}}, {@mode={'mode', 0x3d, 0xfff}}, {@mode={'mode'}}]}) 08:33:11 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e5c000006000300"/57, 0x39}], 0x1) 08:33:11 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e4a000006000300"/57, 0x39}], 0x1) 08:33:11 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pkey_alloc(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd14}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) rmdir(0x0) dup(0xffffffffffffffff) syz_open_dev$sndseq(0x0, 0x0, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="4c0000001200ef09fffefd956fa283b7270fd917df226c24a6008000200000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f48d947f1e128a0", 0x53}], 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r4, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) syz_emit_ethernet(0x1, &(0x7f0000001640)=ANY=[@ANYRESDEC], 0x0) 08:33:12 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e5d000006000300"/57, 0x39}], 0x1) 08:33:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x2, 0x3, 0x260, 0x0, 0xf8, 0xf8, 0xf8, 0xf8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@multicast1, @dev, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@connbytes={{0x38, 'connbytes\x00'}, {[], 0x3}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) 08:33:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xe900, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:33:13 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e4b000006000300"/57, 0x39}], 0x1) [ 1229.702782] kauditd_printk_skb: 94 callbacks suppressed [ 1229.702796] audit: type=1400 audit(1579509193.833:4290): avc: denied { map } for pid=24411 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1229.781615] XFS (loop4): Invalid superblock magic number [ 1229.797439] audit: type=1400 audit(1579509193.923:4291): avc: denied { create } for pid=24401 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1229.842400] audit: type=1400 audit(1579509193.923:4292): avc: denied { write } for pid=24401 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1229.875970] audit: type=1400 audit(1579509193.953:4293): avc: denied { map } for pid=24417 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1229.977570] audit: type=1400 audit(1579509194.103:4294): avc: denied { map } for pid=24419 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1230.381393] audit: type=1400 audit(1579509194.513:4295): avc: denied { map } for pid=24420 comm="syz-executor.2" path="/root/syz-executor.2" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1230.430293] audit: type=1400 audit(1579509194.513:4296): avc: denied { map } for pid=24420 comm="syz-executor.2" path="/root/syzkaller-shm261376825" dev="sda1" ino=16497 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1230.496593] audit: type=1400 audit(1579509194.513:4297): avc: denied { map } for pid=24420 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=456 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1230.535660] IPVS: ftp: loaded support on port[0] = 21 [ 1230.707607] chnl_net:caif_netlink_parms(): no params data found [ 1230.863290] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1230.870113] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1230.878162] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1230.885350] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1230.893582] device bridge_slave_1 left promiscuous mode [ 1230.899041] bridge0: port 2(bridge_slave_1) entered disabled state [ 1230.940931] device bridge_slave_0 left promiscuous mode [ 1230.946401] bridge0: port 1(bridge_slave_0) entered disabled state [ 1230.994764] device veth1_macvtap left promiscuous mode [ 1231.000101] device veth0_macvtap left promiscuous mode [ 1231.005697] device veth1_vlan left promiscuous mode [ 1231.010839] device veth0_vlan left promiscuous mode [ 1236.683304] device hsr_slave_1 left promiscuous mode [ 1236.725504] device hsr_slave_0 left promiscuous mode [ 1236.790585] team0 (unregistering): Port device team_slave_1 removed [ 1236.800617] team0 (unregistering): Port device team_slave_0 removed [ 1236.811839] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1236.865725] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1236.928865] bond0 (unregistering): Released all slaves [ 1236.966936] bridge0: port 1(bridge_slave_0) entered blocking state [ 1236.973543] bridge0: port 1(bridge_slave_0) entered disabled state [ 1236.981158] device bridge_slave_0 entered promiscuous mode [ 1236.989158] bridge0: port 2(bridge_slave_1) entered blocking state [ 1236.995659] bridge0: port 2(bridge_slave_1) entered disabled state [ 1237.002749] device bridge_slave_1 entered promiscuous mode [ 1237.021327] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1237.030794] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1237.047771] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1237.056653] team0: Port device team_slave_0 added [ 1237.064091] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1237.071997] team0: Port device team_slave_1 added [ 1237.087667] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1237.094195] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1237.119650] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1237.132709] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1237.138983] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1237.164508] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1237.227865] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1237.236299] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1237.303481] device hsr_slave_0 entered promiscuous mode [ 1237.340683] device hsr_slave_1 entered promiscuous mode [ 1237.381385] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1237.388948] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1237.417862] audit: type=1400 audit(1579509201.543:4298): avc: denied { map } for pid=24423 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1237.533048] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1237.610510] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1237.616645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1237.627933] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1237.638110] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1237.646326] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1237.658022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1237.665731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1237.676691] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1237.683832] 8021q: adding VLAN 0 to HW filter on device team0 [ 1237.695177] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1237.703505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1237.712704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1237.726766] bridge0: port 1(bridge_slave_0) entered blocking state [ 1237.733396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1237.751860] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1237.774630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1237.782678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1237.801256] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1237.809227] bridge0: port 2(bridge_slave_1) entered blocking state [ 1237.815673] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1237.834839] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1237.851788] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1237.859658] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1237.869279] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1237.882639] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1237.893661] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1237.899768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1237.908087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1237.935214] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1237.956340] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1237.968819] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1237.979086] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1237.998666] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1238.076837] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1238.089725] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1238.097458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1238.106653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1238.175867] audit: type=1400 audit(1579509202.303:4299): avc: denied { map } for pid=24434 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1238.206354] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1238.216035] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1238.224014] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1238.236000] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1238.243418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1238.252136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1238.263221] device veth0_vlan entered promiscuous mode [ 1238.271085] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1238.278940] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1238.291487] device veth1_vlan entered promiscuous mode [ 1238.297627] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1238.309153] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1238.325110] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1238.335956] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1238.343412] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1238.351421] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1238.358605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1238.366923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1238.377357] device veth0_macvtap entered promiscuous mode [ 1238.385212] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1238.398444] device veth1_macvtap entered promiscuous mode [ 1238.405121] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1238.415920] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1238.428314] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1238.438399] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1238.448744] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1238.458219] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1238.468331] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1238.477843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1238.488064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1238.497325] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1238.507270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1238.516518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1238.526474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1238.535705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1238.545581] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1238.556853] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1238.564369] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1238.571824] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1238.579220] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1238.586798] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1238.594685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1238.605149] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1238.615620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1238.625169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1238.635388] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1238.644955] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1238.655016] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1238.664237] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1238.674029] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1238.683222] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1238.693003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1238.702179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1238.712770] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1238.723085] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1238.730144] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1238.740692] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1238.748480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1238.804964] audit: type=1400 audit(1579509202.933:4300): avc: denied { map } for pid=24436 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 08:33:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) [ 1238.858430] audit: type=1400 audit(1579509202.983:4301): avc: denied { map_create } for pid=24437 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 08:33:23 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e5e000006000300"/57, 0x39}], 0x1) 08:33:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/config\x00') lseek(r0, 0x0, 0x4) 08:33:23 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000300)=""/246) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x2}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) 08:33:23 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e4c000006000300"/57, 0x39}], 0x1) 08:33:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xea00, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) [ 1238.964987] audit: type=1400 audit(1579509203.093:4303): avc: denied { create } for pid=24442 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1238.976057] nla_parse: 14 callbacks suppressed [ 1238.976083] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1239.003123] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1239.011380] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1239.027648] audit: type=1400 audit(1579509203.083:4302): avc: denied { create } for pid=24440 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1239.053453] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:33:23 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e4d000006000300"/57, 0x39}], 0x1) [ 1239.102588] audit: type=1400 audit(1579509203.103:4304): avc: denied { write } for pid=24440 comm="syz-executor.0" path="socket:[97200]" dev="sockfs" ino=97200 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:33:23 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e5f000006000300"/57, 0x39}], 0x1) 08:33:23 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x882101, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x1, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000}]) [ 1239.270950] audit: type=1400 audit(1579509203.123:4305): avc: denied { write } for pid=24442 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1239.350399] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1239.362240] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:33:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) mount$9p_tcp(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0xaee7f346ebc48fd4) unshare(0x20020000) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0x400007f) rmdir(&(0x7f0000000180)='./file0\x00') [ 1239.402825] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1239.411796] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1239.421672] audit: type=1400 audit(1579509203.123:4306): avc: denied { create } for pid=24446 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:33:23 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e4e000006000300"/57, 0x39}], 0x1) [ 1239.559821] audit: type=1400 audit(1579509203.123:4307): avc: denied { write } for pid=24446 comm="syz-executor.3" path="socket:[98054]" dev="sockfs" ino=98054 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:33:23 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e60000006000300"/57, 0x39}], 0x1) [ 1239.666380] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1239.805124] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:33:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) mount$9p_tcp(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0xaee7f346ebc48fd4) unshare(0x20020000) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0x400007f) rmdir(&(0x7f0000000180)='./file0\x00') 08:33:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:33:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xeb00, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:33:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) read(r0, 0x0, 0x0) 08:33:24 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e61000006000300"/57, 0x39}], 0x1) 08:33:24 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e4f000006000300"/57, 0x39}], 0x1) 08:33:24 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e50000006000300"/57, 0x39}], 0x1) 08:33:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:33:24 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e62000006000300"/57, 0x39}], 0x1) 08:33:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0xfffffffffffffe35, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="3800000020006d7f528e00000000000000000058", @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100686866000c00020008000200000000335a18edbb00"], 0x38}}, 0x0) 08:33:24 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e51000006000300"/57, 0x39}], 0x1) 08:33:24 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e63000006000300"/57, 0x39}], 0x1) 08:33:24 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e64000006000300"/57, 0x39}], 0x1) 08:33:25 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 08:33:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xec00, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:33:25 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e52000006000300"/57, 0x39}], 0x1) 08:33:25 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e65000006000300"/57, 0x39}], 0x1) 08:33:25 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000002800)=0x1, 0x4) listen(r0, 0x1) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r1, &(0x7f0000004100), 0x316, 0x0, &(0x7f0000004a80)={0x77359400}) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fstatfs(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getpgid(0x0) getpid() 08:33:25 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) [ 1242.511195] kauditd_printk_skb: 91 callbacks suppressed [ 1242.511210] audit: type=1400 audit(1579509206.643:4399): avc: denied { create } for pid=24556 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1242.580343] audit: type=1400 audit(1579509206.673:4400): avc: denied { map } for pid=24574 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1242.603977] audit: type=1400 audit(1579509206.673:4401): avc: denied { write } for pid=24556 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1242.679194] audit: type=1400 audit(1579509206.803:4402): avc: denied { map } for pid=24577 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1243.419622] audit: type=1400 audit(1579509207.543:4403): avc: denied { map } for pid=24578 comm="syz-executor.2" path="/root/syz-executor.2" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1243.500424] audit: type=1400 audit(1579509207.593:4404): avc: denied { map } for pid=24578 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=456 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1243.563088] IPVS: ftp: loaded support on port[0] = 21 [ 1243.749348] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1243.756293] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1243.765454] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1243.772377] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1243.780162] device bridge_slave_1 left promiscuous mode [ 1243.785877] bridge0: port 2(bridge_slave_1) entered disabled state [ 1243.830981] device bridge_slave_0 left promiscuous mode [ 1243.836494] bridge0: port 1(bridge_slave_0) entered disabled state [ 1243.893080] device veth1_macvtap left promiscuous mode [ 1243.898430] device veth0_macvtap left promiscuous mode [ 1243.903916] device veth1_vlan left promiscuous mode [ 1243.908990] device veth0_vlan left promiscuous mode [ 1249.373363] device hsr_slave_1 left promiscuous mode [ 1249.413789] device hsr_slave_0 left promiscuous mode [ 1249.478919] team0 (unregistering): Port device team_slave_1 removed [ 1249.491238] team0 (unregistering): Port device team_slave_0 removed [ 1249.501141] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1249.526937] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1249.606705] bond0 (unregistering): Released all slaves [ 1249.657567] chnl_net:caif_netlink_parms(): no params data found [ 1249.698639] bridge0: port 1(bridge_slave_0) entered blocking state [ 1249.705152] bridge0: port 1(bridge_slave_0) entered disabled state [ 1249.712636] device bridge_slave_0 entered promiscuous mode [ 1249.719904] bridge0: port 2(bridge_slave_1) entered blocking state [ 1249.726609] bridge0: port 2(bridge_slave_1) entered disabled state [ 1249.733801] device bridge_slave_1 entered promiscuous mode [ 1249.752040] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1249.763145] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1249.783701] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1249.791171] team0: Port device team_slave_0 added [ 1249.797420] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1249.805865] team0: Port device team_slave_1 added [ 1249.825030] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1249.831502] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1249.856942] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1249.908321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1249.914984] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1249.941049] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1249.952786] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1249.961279] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1250.033109] device hsr_slave_0 entered promiscuous mode [ 1250.070662] device hsr_slave_1 entered promiscuous mode [ 1250.131392] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1250.138818] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1250.166795] audit: type=1400 audit(1579509214.293:4405): avc: denied { map } for pid=24581 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1250.276424] bridge0: port 2(bridge_slave_1) entered blocking state [ 1250.282871] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1250.289535] bridge0: port 1(bridge_slave_0) entered blocking state [ 1250.295993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1250.352192] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1250.358306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1250.376168] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1250.394093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1250.407157] bridge0: port 1(bridge_slave_0) entered disabled state [ 1250.414763] bridge0: port 2(bridge_slave_1) entered disabled state [ 1250.422532] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1250.444094] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1250.450697] 8021q: adding VLAN 0 to HW filter on device team0 [ 1250.470878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1250.479154] bridge0: port 1(bridge_slave_0) entered blocking state [ 1250.485573] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1250.522114] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1250.535675] bridge0: port 2(bridge_slave_1) entered blocking state [ 1250.542241] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1250.558217] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1250.587176] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1250.598198] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1250.609145] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1250.616887] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1250.625619] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1250.633976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1250.646382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1250.666648] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1250.675068] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1250.684392] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1250.694751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1250.707909] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1250.723882] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1250.745742] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1250.758520] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1250.768872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1250.778046] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1250.858941] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1250.866605] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1250.874193] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1250.884166] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1250.891181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1250.898815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1250.909316] device veth0_vlan entered promiscuous mode [ 1250.919251] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1250.934503] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1250.952200] device veth1_vlan entered promiscuous mode [ 1250.958430] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1250.969842] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1250.994721] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1251.009147] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1251.017278] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1251.025190] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1251.032981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1251.041107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1251.052400] device veth0_macvtap entered promiscuous mode [ 1251.058912] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1251.075922] device veth1_macvtap entered promiscuous mode [ 1251.086919] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1251.105367] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1251.119688] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1251.138250] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1251.148297] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1251.157573] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1251.167613] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1251.176947] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1251.186878] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1251.196092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1251.205863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1251.215097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1251.224978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1251.235164] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1251.245181] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1251.255705] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1251.262802] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1251.269991] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1251.277843] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1251.285311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1251.293775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1251.304908] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1251.315114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1251.324444] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1251.334439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1251.343635] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1251.353444] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1251.363578] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1251.373940] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1251.389522] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1251.400114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1251.410275] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1251.420023] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1251.430455] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1251.437387] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1251.447124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1251.455108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1251.499106] audit: type=1400 audit(1579509215.623:4406): avc: denied { map } for pid=24589 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 08:33:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) [ 1251.549367] audit: type=1400 audit(1579509215.673:4407): avc: denied { map_create } for pid=24588 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 08:33:35 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e66000006000300"/57, 0x39}], 0x1) 08:33:35 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e53000006000300"/57, 0x39}], 0x1) 08:33:35 executing program 5: memfd_create(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x744, 0x9c5], 0x0, 0x205211}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x0, 0x0, @pic={0x0, 0x8b}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:33:35 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0xfff) r3 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r7 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r7, 0x4020565b, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000240)={r6}, 0x14) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000000)={r6, 0x1000}, 0x8) 08:33:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xed00, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) [ 1251.644136] audit: type=1400 audit(1579509215.773:4408): avc: denied { create } for pid=24593 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1251.650149] nla_parse: 11 callbacks suppressed [ 1251.652806] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1251.702356] audit: type=1400 audit(1579509215.773:4409): avc: denied { write } for pid=24593 comm="syz-executor.0" path="socket:[99455]" dev="sockfs" ino=99455 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1251.708347] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1251.736109] audit: type=1400 audit(1579509215.773:4410): avc: denied { write } for pid=24593 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1251.751837] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:33:35 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r1 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bind$packet(r1, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg$inet(r1, &(0x7f0000002b00)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="96c6322ea684879088175969ec15e10d40e4719016cbc15a36a88c6c843e12b1f5cb6a73613ceec274", 0x33}], 0x1, 0x0, 0x0, 0x534}}], 0x40001c0, 0x0) [ 1251.803250] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:33:36 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e67000006000300"/57, 0x39}], 0x1) [ 1251.856807] audit: type=1400 audit(1579509215.823:4411): avc: denied { create } for pid=24595 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1251.908752] audit: type=1400 audit(1579509215.823:4412): avc: denied { write } for pid=24595 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:33:36 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e54000006000300"/57, 0x39}], 0x1) [ 1251.987557] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1251.998845] audit: type=1400 audit(1579509215.823:4413): avc: denied { create } for pid=24592 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1252.062338] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1252.111153] audit: type=1400 audit(1579509215.833:4414): avc: denied { write } for pid=24592 comm="syz-executor.3" path="socket:[99458]" dev="sockfs" ino=99458 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:33:36 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e68000006000300"/57, 0x39}], 0x1) [ 1252.153094] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:33:36 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e55000006000300"/57, 0x39}], 0x1) [ 1252.307336] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:33:36 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e69000006000300"/57, 0x39}], 0x1) [ 1252.464386] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:33:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:33:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f3646023443247900005d492bbdb874830a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b1c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e9315cdea3e448f724e57df6b2bce0ae4f07a837d930ccba7a8797486fec669bd667eee6fa74f65e887d3bc9e28bd1eebadb56844974173713074cb8aec8b601c120231699f88a25d576bd21dd7e2e305f26c46b7fa80b2fa50ef17872144d4d5c9caaf4d772939c57f55f249d5cc70fbc7ee713c85cf1354f814474c37dd8046588d44788ec8b48bd1f42df01008427a69db8ef66cbae632ebcbb77856550e235c9d5c5203aceaee8e65f61199c5767adcdb0933669988c98a7", 0x138}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 08:33:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xee00, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) [ 1252.570456] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:33:36 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e56000006000300"/57, 0x39}], 0x1) 08:33:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x744, 0x9c5], 0x0, 0x41612}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x0, 0x0, @pic={0x0, 0x8b}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:33:36 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0xa, 0x8, 0x0, @dev}, 0x1c, 0x0}, 0x0) 08:33:36 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e6a000006000300"/57, 0x39}], 0x1) 08:33:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:33:37 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e57000006000300"/57, 0x39}], 0x1) 08:33:37 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000200)={0x0, @remote, 0x4e20, 0x0, 'nq\x00', 0x4}, 0x2c) 08:33:37 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e6b000006000300"/57, 0x39}], 0x1) 08:33:37 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e58000006000300"/57, 0x39}], 0x1) 08:33:37 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd6032000e00442f00fe8000000000000000000000000000bbfe8000000000000000000000000000aa042065580000000000000800000086dd0800880000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000000000"], 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) [ 1253.294191] IPVS: set_ctl: invalid protocol: 0 172.20.20.187:20000 08:33:37 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e6c000006000300"/57, 0x39}], 0x1) [ 1253.465196] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x3 [ 1253.557934] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x3 08:33:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xef00, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:33:38 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e59000006000300"/57, 0x39}], 0x1) 08:33:38 executing program 5: bind$netlink(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfc, 0x10}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x7}, 0x0) sync() 08:33:38 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e6d000006000300"/57, 0x39}], 0x1) 08:33:38 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x6400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) [ 1255.066925] XFS (loop4): Invalid superblock magic number [ 1255.188092] kauditd_printk_skb: 103 callbacks suppressed [ 1255.188107] audit: type=1400 audit(1579509219.313:4518): avc: denied { map } for pid=24735 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1255.246577] audit: type=1400 audit(1579509219.313:4519): avc: denied { map } for pid=24735 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1255.300252] audit: type=1400 audit(1579509219.403:4520): avc: denied { map } for pid=24736 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1255.674668] audit: type=1400 audit(1579509219.803:4521): avc: denied { map } for pid=24737 comm="syz-executor.2" path="/root/syz-executor.2" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1255.733845] audit: type=1400 audit(1579509219.833:4522): avc: denied { map } for pid=24737 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=456 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1255.814181] IPVS: ftp: loaded support on port[0] = 21 [ 1256.009682] chnl_net:caif_netlink_parms(): no params data found [ 1256.157304] bridge0: port 1(bridge_slave_0) entered blocking state [ 1256.164059] bridge0: port 1(bridge_slave_0) entered disabled state [ 1256.172049] device bridge_slave_0 entered promiscuous mode [ 1256.179231] bridge0: port 2(bridge_slave_1) entered blocking state [ 1256.186221] bridge0: port 2(bridge_slave_1) entered disabled state [ 1256.193561] device bridge_slave_1 entered promiscuous mode [ 1256.333104] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1256.342370] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1256.361740] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1256.369142] team0: Port device team_slave_0 added [ 1256.378186] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1256.385824] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1256.393764] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1256.401196] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1256.409208] device bridge_slave_1 left promiscuous mode [ 1256.415055] bridge0: port 2(bridge_slave_1) entered disabled state [ 1256.471327] device bridge_slave_0 left promiscuous mode [ 1256.476873] bridge0: port 1(bridge_slave_0) entered disabled state [ 1256.533025] device veth1_macvtap left promiscuous mode [ 1256.538468] device veth0_macvtap left promiscuous mode [ 1256.543929] device veth1_vlan left promiscuous mode [ 1256.549344] device veth0_vlan left promiscuous mode [ 1262.225228] device hsr_slave_1 left promiscuous mode [ 1262.283327] device hsr_slave_0 left promiscuous mode [ 1262.329216] team0 (unregistering): Port device team_slave_1 removed [ 1262.342069] team0 (unregistering): Port device team_slave_0 removed [ 1262.353183] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1262.396039] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1262.462272] bond0 (unregistering): Released all slaves [ 1262.503303] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1262.511134] team0: Port device team_slave_1 added [ 1262.526237] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1262.532689] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1262.558214] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1262.570092] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1262.576575] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1262.601911] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1262.614172] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1262.621912] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1262.692172] device hsr_slave_0 entered promiscuous mode [ 1262.730561] device hsr_slave_1 entered promiscuous mode [ 1262.771117] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1262.778645] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1262.799114] audit: type=1400 audit(1579509226.923:4523): avc: denied { map } for pid=24740 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1262.939063] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1263.025988] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1263.047932] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1263.058297] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1263.066668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1263.074425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1263.088718] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1263.099785] 8021q: adding VLAN 0 to HW filter on device team0 [ 1263.118097] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1263.128735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1263.145487] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1263.156888] bridge0: port 1(bridge_slave_0) entered blocking state [ 1263.163324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1263.181334] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1263.198931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1263.206784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1263.224125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1263.235852] bridge0: port 2(bridge_slave_1) entered blocking state [ 1263.242378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1263.258554] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1263.267417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1263.291671] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1263.300385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1263.319696] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1263.327868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1263.344381] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1263.359755] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1263.370521] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1263.377830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1263.386686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1263.404312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1263.412123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1263.422518] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1263.428615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1263.468904] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1263.479744] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1263.493999] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1263.505440] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1263.523450] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1263.539353] audit: type=1400 audit(1579509227.663:4524): avc: denied { map } for pid=24741 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1263.579866] audit: type=1400 audit(1579509227.703:4525): avc: denied { map } for pid=24742 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1263.651813] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1263.665512] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1263.673829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1263.683387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1263.790163] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1263.797907] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1263.805385] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1263.816883] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1263.824158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1263.834984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1263.846435] device veth0_vlan entered promiscuous mode [ 1263.859001] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1263.866786] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1263.875995] device veth1_vlan entered promiscuous mode [ 1263.882228] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1263.894464] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1263.911287] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1263.922635] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1263.929566] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1263.937805] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1263.946153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1263.954850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1263.965590] device veth0_macvtap entered promiscuous mode [ 1263.973163] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1263.984355] device veth1_macvtap entered promiscuous mode [ 1263.991131] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1264.002938] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1264.013715] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1264.023186] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1264.033058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1264.042324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1264.052473] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1264.061695] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1264.071457] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1264.080872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1264.090651] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1264.099858] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1264.109803] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1264.119506] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1264.129593] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1264.140995] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1264.148044] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1264.155046] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1264.163581] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1264.171704] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1264.179725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1264.190949] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1264.202313] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1264.211892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1264.228444] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1264.237674] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1264.248666] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1264.258300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1264.268163] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1264.277465] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1264.287676] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1264.297624] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1264.307488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1264.317712] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1264.325407] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1264.332603] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1264.341130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1264.414856] audit: type=1400 audit(1579509228.543:4526): avc: denied { map } for pid=24753 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1264.473067] audit: type=1400 audit(1579509228.573:4527): avc: denied { map_create } for pid=24754 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 08:33:48 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:33:48 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e5a000006000300"/57, 0x39}], 0x1) 08:33:48 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e6e000006000300"/57, 0x39}], 0x1) 08:33:48 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:33:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xf000, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:33:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(0xffffffffffffffff, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r2 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) [ 1264.621691] audit: type=1400 audit(1579509228.753:4528): avc: denied { create } for pid=24761 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1264.703798] nla_parse: 12 callbacks suppressed [ 1264.703829] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1264.720292] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1264.769944] device bridge_slave_0 left promiscuous mode [ 1264.770671] audit: type=1400 audit(1579509228.753:4529): avc: denied { write } for pid=24761 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1264.786804] bridge0: port 1(bridge_slave_0) entered disabled state 08:33:48 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e5b000006000300"/57, 0x39}], 0x1) [ 1264.822502] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:33:49 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e6f000006000300"/57, 0x39}], 0x1) [ 1264.988021] audit: type=1400 audit(1579509228.763:4530): avc: denied { map_create } for pid=24757 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 08:33:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) [ 1265.109330] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1265.109671] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1265.125913] audit: type=1400 audit(1579509228.783:4532): avc: denied { map } for pid=24766 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1265.184599] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1265.200920] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:33:49 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e5c000006000300"/57, 0x39}], 0x1) [ 1265.221794] audit: type=1400 audit(1579509228.783:4531): avc: denied { create } for pid=24760 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:33:49 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e70000006000300"/57, 0x39}], 0x1) [ 1265.424987] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1265.462382] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:33:49 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e5d000006000300"/57, 0x39}], 0x1) [ 1265.495694] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1265.688454] device bridge_slave_0 left promiscuous mode [ 1265.694227] bridge0: port 1(bridge_slave_0) entered disabled state 08:33:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:33:50 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e71000006000300"/57, 0x39}], 0x1) 08:33:50 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e5e000006000300"/57, 0x39}], 0x1) 08:33:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xf100, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:33:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:33:50 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e72000006000300"/57, 0x39}], 0x1) 08:33:50 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e5f000006000300"/57, 0x39}], 0x1) 08:33:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:33:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:33:51 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e73000006000300"/57, 0x39}], 0x1) 08:33:51 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e60000006000300"/57, 0x39}], 0x1) 08:33:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xf200, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:33:51 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e74000006000300"/57, 0x39}], 0x1) 08:33:51 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e61000006000300"/57, 0x39}], 0x1) 08:33:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:33:51 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e75000006000300"/57, 0x39}], 0x1) [ 1267.885152] kauditd_printk_skb: 71 callbacks suppressed [ 1267.885167] audit: type=1400 audit(1579509232.013:4604): avc: denied { map } for pid=24851 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 08:33:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:33:52 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e62000006000300"/57, 0x39}], 0x1) 08:33:52 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e76000006000300"/57, 0x39}], 0x1) [ 1268.221787] audit: type=1400 audit(1579509232.353:4605): avc: denied { create } for pid=24853 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1268.327411] audit: type=1400 audit(1579509232.353:4606): avc: denied { write } for pid=24853 comm="syz-executor.3" path="socket:[100177]" dev="sockfs" ino=100177 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1268.500549] audit: type=1400 audit(1579509232.433:4607): avc: denied { create } for pid=24833 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1268.576485] audit: type=1400 audit(1579509232.433:4608): avc: denied { write } for pid=24833 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1268.667047] audit: type=1400 audit(1579509232.463:4609): avc: denied { map } for pid=24858 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1268.726148] audit: type=1400 audit(1579509232.483:4610): avc: denied { map } for pid=24858 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1268.760660] audit: type=1400 audit(1579509232.513:4611): avc: denied { map } for pid=24861 comm="syz-executor.2" path="/root/syz-executor.2" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1268.817547] audit: type=1400 audit(1579509232.523:4612): avc: denied { map } for pid=24860 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1268.877617] audit: type=1400 audit(1579509232.543:4613): avc: denied { map } for pid=24861 comm="syz-executor.2" path="/root/syzkaller-shm261376825" dev="sda1" ino=16497 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1269.002192] IPVS: ftp: loaded support on port[0] = 21 [ 1269.256648] chnl_net:caif_netlink_parms(): no params data found [ 1269.409091] bridge0: port 1(bridge_slave_0) entered blocking state [ 1269.415837] bridge0: port 1(bridge_slave_0) entered disabled state [ 1269.423670] device bridge_slave_0 entered promiscuous mode [ 1269.551803] bridge0: port 2(bridge_slave_1) entered blocking state [ 1269.558194] bridge0: port 2(bridge_slave_1) entered disabled state [ 1269.565839] device bridge_slave_1 entered promiscuous mode [ 1269.582614] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1269.592450] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1269.728297] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1269.736086] team0: Port device team_slave_0 added [ 1269.742235] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1269.749510] team0: Port device team_slave_1 added [ 1269.882066] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1269.889482] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1269.915102] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1269.929070] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1269.935761] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1269.962800] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1269.977420] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1269.984563] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1269.993676] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1270.000858] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1270.008817] device bridge_slave_1 left promiscuous mode [ 1270.014520] bridge0: port 2(bridge_slave_1) entered disabled state [ 1270.061309] device bridge_slave_0 left promiscuous mode [ 1270.066895] bridge0: port 1(bridge_slave_0) entered disabled state [ 1270.124700] device veth1_macvtap left promiscuous mode [ 1270.130309] device veth0_macvtap left promiscuous mode [ 1270.136063] device veth1_vlan left promiscuous mode [ 1270.143839] device veth0_vlan left promiscuous mode [ 1275.783517] device hsr_slave_1 left promiscuous mode [ 1275.833410] device hsr_slave_0 left promiscuous mode [ 1275.899275] team0 (unregistering): Port device team_slave_1 removed [ 1275.909740] team0 (unregistering): Port device team_slave_0 removed [ 1275.919330] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1275.946660] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1276.015141] bond0 (unregistering): Released all slaves [ 1276.084461] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1276.094643] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1276.117766] IPVS: ftp: loaded support on port[0] = 21 [ 1276.142098] device hsr_slave_0 entered promiscuous mode [ 1276.180613] device hsr_slave_1 entered promiscuous mode [ 1276.221197] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1276.228530] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1276.247615] kauditd_printk_skb: 11 callbacks suppressed [ 1276.247629] audit: type=1400 audit(1579509240.373:4625): avc: denied { map } for pid=24868 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1276.276706] audit: type=1400 audit(1579509240.373:4626): avc: denied { map } for pid=24868 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1276.350098] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1276.393337] chnl_net:caif_netlink_parms(): no params data found [ 1276.518372] bridge0: port 1(bridge_slave_0) entered blocking state [ 1276.534734] bridge0: port 1(bridge_slave_0) entered disabled state [ 1276.545795] device bridge_slave_0 entered promiscuous mode [ 1276.566820] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1276.589265] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1276.603947] bridge0: port 2(bridge_slave_1) entered blocking state [ 1276.620354] bridge0: port 2(bridge_slave_1) entered disabled state [ 1276.629390] device bridge_slave_1 entered promiscuous mode [ 1276.652143] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1276.670628] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1276.679882] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1276.695137] 8021q: adding VLAN 0 to HW filter on device team0 [ 1276.706868] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1276.719081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1276.738123] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1276.757265] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1276.765002] team0: Port device team_slave_0 added [ 1276.777564] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1276.785118] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1276.793767] team0: Port device team_slave_1 added [ 1276.800428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1276.808813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1276.816691] bridge0: port 1(bridge_slave_0) entered blocking state [ 1276.823264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1276.842734] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1276.879315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1276.885815] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1276.921939] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1276.939460] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1276.949508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1276.967337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1276.978812] bridge0: port 2(bridge_slave_1) entered blocking state [ 1276.985405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1277.003498] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1277.019822] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1277.026934] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1277.060733] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1277.078668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1277.091233] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1277.110053] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1277.117383] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1277.134092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1277.148257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1277.167211] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1277.178383] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1277.195720] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1277.210009] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1277.233730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1277.251160] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1277.293193] device hsr_slave_0 entered promiscuous mode [ 1277.360792] device hsr_slave_1 entered promiscuous mode [ 1277.401585] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1277.408610] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1277.417770] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1277.431061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1277.438888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1277.450997] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1277.466107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1277.483800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1277.491640] audit: type=1400 audit(1579509241.623:4627): avc: denied { map } for pid=24870 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1277.517896] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1277.524436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1277.548316] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1277.561241] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1277.567597] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1277.578010] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1277.622983] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1277.671928] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1277.679810] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1277.700144] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1277.719266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1277.727664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1277.775851] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1277.810716] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1277.829339] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1277.836070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1277.844412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1277.854867] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1277.862045] 8021q: adding VLAN 0 to HW filter on device team0 [ 1277.871735] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1277.879042] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1277.887530] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1277.900482] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1277.907609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1277.917043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1277.941059] bridge0: port 1(bridge_slave_0) entered blocking state [ 1277.947449] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1277.956450] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1277.966131] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1277.974781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1277.983048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1277.991337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1277.999051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1278.007669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1278.017233] bridge0: port 2(bridge_slave_1) entered blocking state [ 1278.023835] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1278.033623] device veth0_vlan entered promiscuous mode [ 1278.042945] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1278.050014] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1278.059673] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1278.068129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1278.078139] device veth1_vlan entered promiscuous mode [ 1278.085799] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1278.096141] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1278.107463] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1278.115320] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1278.122931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1278.132822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1278.140902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1278.149130] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1278.171201] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1278.180100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1278.188643] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1278.202456] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1278.211641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1278.219367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1278.229806] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1278.238458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1278.247154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1278.738936] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1278.745243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1278.762893] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1278.775186] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1278.784049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1278.792071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1279.047324] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1279.056087] device veth0_macvtap entered promiscuous mode [ 1279.062967] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1279.076977] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1279.083888] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1279.095529] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1279.102642] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1279.116677] device veth1_macvtap entered promiscuous mode [ 1279.125531] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1279.135844] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1279.156281] audit: type=1400 audit(1579509243.283:4628): avc: denied { map } for pid=24877 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1279.410113] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1279.419059] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1279.435871] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1279.447326] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1279.457512] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1279.467594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1279.477928] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1279.487253] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1279.497260] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1279.507212] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1279.517330] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1279.526672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1279.536552] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1279.545801] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1279.555974] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1279.566333] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1279.573634] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1279.826642] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1279.834878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1279.846190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1279.856652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1279.866158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1279.876297] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1279.885485] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1279.895265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1279.905104] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1279.915108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1279.925083] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1279.935096] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1279.946306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1279.956275] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1279.966467] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1279.974039] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1279.985425] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1279.994108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1280.021562] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1280.047836] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1280.060339] audit: type=1400 audit(1579509244.183:4629): avc: denied { map } for pid=24883 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1280.090404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1280.098529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1280.107073] audit: type=1400 audit(1579509244.203:4630): avc: denied { map } for pid=24885 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1280.130603] audit: type=1400 audit(1579509244.213:4631): avc: denied { map } for pid=24885 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1280.168820] audit: type=1400 audit(1579509244.293:4632): avc: denied { map_create } for pid=24884 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1280.207554] audit: type=1400 audit(1579509244.333:4633): avc: denied { map } for pid=24888 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1280.257622] audit: type=1400 audit(1579509244.373:4634): avc: denied { map } for pid=24889 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1280.515222] device bridge_slave_0 left promiscuous mode [ 1280.523628] bridge0: port 1(bridge_slave_0) entered disabled state 08:34:04 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e63000006000300"/57, 0x39}], 0x1) 08:34:04 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e77000006000300"/57, 0x39}], 0x1) 08:34:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = socket$nl_crypto(0x10, 0x3, 0x15) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r8, 0xc0205649, &(0x7f0000000100)={0x9a0000, 0x920b, 0x1f, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9e0901, 0x1ff, [], @p_u8=&(0x7f0000000000)=0x3}}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r9, 0x29, 0x41, &(0x7f0000000140)={'filter\x00', 0x2, [{}, {}]}, 0x48) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) dup2(r4, r6) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000200)={0x2, {0x2, 0x0, 0x500}}) 08:34:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xf300, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:34:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) [ 1280.673813] nla_parse: 24 callbacks suppressed [ 1280.673823] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1280.737333] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1280.746369] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:34:04 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e78000006000300"/57, 0x39}], 0x1) 08:34:05 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e64000006000300"/57, 0x39}], 0x1) [ 1281.002362] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1281.032035] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1281.041678] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1281.099843] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1282.022821] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1282.041215] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1282.055533] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1282.061831] kauditd_printk_skb: 18 callbacks suppressed [ 1282.061844] audit: type=1400 audit(1579509246.193:4653): avc: denied { map } for pid=24917 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1282.069396] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1282.378065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1282.385959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1282.396081] device veth0_vlan entered promiscuous mode [ 1282.404377] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1282.411909] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1282.668478] device veth1_vlan entered promiscuous mode [ 1282.674567] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1282.685933] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1282.699350] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1282.953293] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1282.966176] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1282.974933] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1282.981920] audit: type=1400 audit(1579509247.103:4654): avc: denied { map } for pid=24918 comm="syz-executor.1" path="/root/syz-executor.1" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1283.009543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1283.017984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1283.027138] audit: type=1400 audit(1579509247.113:4655): avc: denied { map } for pid=24918 comm="syz-executor.1" path="/root/syz-executor.1" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1283.030002] device veth0_macvtap entered promiscuous mode [ 1283.060948] audit: type=1400 audit(1579509247.113:4656): avc: denied { map } for pid=24918 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=456 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1283.087058] audit: type=1400 audit(1579509247.193:4657): avc: denied { map } for pid=24918 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=456 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1283.111181] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1283.119545] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1283.142557] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1283.149331] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1283.159158] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1283.166160] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1283.174486] device bridge_slave_1 left promiscuous mode [ 1283.179959] bridge0: port 2(bridge_slave_1) entered disabled state [ 1283.233942] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1283.240910] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1283.248766] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1283.256283] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1283.266012] device bridge_slave_1 left promiscuous mode [ 1283.271968] bridge0: port 2(bridge_slave_1) entered disabled state [ 1283.315051] device veth1_macvtap left promiscuous mode [ 1283.321671] device veth0_macvtap left promiscuous mode [ 1283.327062] device veth1_vlan left promiscuous mode [ 1283.332409] device veth0_vlan left promiscuous mode [ 1283.337936] device veth1_macvtap left promiscuous mode [ 1283.343608] device veth0_macvtap left promiscuous mode [ 1283.348951] device veth1_vlan left promiscuous mode [ 1283.354126] device veth0_vlan left promiscuous mode [ 1294.638299] device hsr_slave_1 left promiscuous mode [ 1294.684008] device hsr_slave_0 left promiscuous mode [ 1294.734036] team0 (unregistering): Port device team_slave_1 removed [ 1294.744805] team0 (unregistering): Port device team_slave_0 removed [ 1294.757811] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1294.805807] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1294.901189] bond0 (unregistering): Released all slaves [ 1295.034333] device hsr_slave_1 left promiscuous mode [ 1295.105704] device hsr_slave_0 left promiscuous mode [ 1295.162894] team0 (unregistering): Port device team_slave_1 removed [ 1295.176267] team0 (unregistering): Port device team_slave_0 removed [ 1295.186962] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1295.228157] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1295.295425] bond0 (unregistering): Released all slaves [ 1295.327888] device veth1_macvtap entered promiscuous mode [ 1295.341521] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1295.343801] IPVS: ftp: loaded support on port[0] = 21 [ 1295.370453] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1295.381946] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1295.392340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.402948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1295.413318] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.423077] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1295.433870] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.443953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1295.454525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.463844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1295.474221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.486288] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1295.494737] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1295.504686] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1295.513459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1295.537826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1295.548170] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.559042] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1295.569511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.579323] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1295.590148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.601221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1295.611703] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.621320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1295.632202] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.642864] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1295.650711] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1295.660878] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1295.669578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1295.758689] audit: type=1400 audit(1579509259.883:4658): avc: denied { map } for pid=24920 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1295.782488] chnl_net:caif_netlink_parms(): no params data found [ 1295.856069] audit: type=1400 audit(1579509259.963:4659): avc: denied { map_create } for pid=24922 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1295.887733] bridge0: port 1(bridge_slave_0) entered blocking state [ 1295.901562] bridge0: port 1(bridge_slave_0) entered disabled state [ 1295.909435] device bridge_slave_0 entered promiscuous mode [ 1295.927920] bridge0: port 2(bridge_slave_1) entered blocking state [ 1295.939521] bridge0: port 2(bridge_slave_1) entered disabled state [ 1295.952460] device bridge_slave_1 entered promiscuous mode [ 1295.973536] device bridge_slave_0 left promiscuous mode [ 1295.980809] bridge0: port 1(bridge_slave_0) entered disabled state 08:34:20 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e65000006000300"/57, 0x39}], 0x1) 08:34:20 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e79000006000300"/57, 0x39}], 0x1) 08:34:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xf400, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) [ 1296.035821] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1296.046640] bond0: Enslaving bond_slave_1 as an active interface with an up link 08:34:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) [ 1296.140480] audit: type=1400 audit(1579509260.263:4660): avc: denied { create } for pid=24927 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1296.142211] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1296.188245] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1296.205349] audit: type=1400 audit(1579509260.273:4661): avc: denied { write } for pid=24927 comm="syz-executor.0" path="socket:[100611]" dev="sockfs" ino=100611 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1296.221122] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1296.284362] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1296.317458] team0: Port device team_slave_0 added 08:34:20 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e7a000006000300"/57, 0x39}], 0x1) [ 1296.336194] audit: type=1400 audit(1579509260.363:4662): avc: denied { create } for pid=24926 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1296.361709] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1296.369643] team0: Port device team_slave_1 added 08:34:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000000)={0x8001, 0xac, 0x7ffffffe}) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000140)="10000000140019231c834b80043f679a", 0x10}], 0x1) getpeername(r0, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000180)=0x80) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x1c, 0x0, 0x20, 0x70bd24, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8008}, 0x4004) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x220202) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x7a, &(0x7f000059aff8)={r11}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000180)={r11, 0x9, 0x1000}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r7, 0x84, 0x1b, &(0x7f00000002c0)={r11, 0xcf, "86b42aea21e97688ab7189b77feae42ec2f12db203a2c9154252dd217b8a09d1d979832c250828e5d3f137259fcb7b8683e9003a1cd7d22d5565ec86abdffe6ec2b0533ce660783f7dd90a02d46fd6449ef662cc9a114da6f9dafa1e14ba4141be89e0cb55e8b490c2ef0733fc68a9928f7ad4dc79c8fc7c1b6e79064b62c44078918e9ff32c4f8c278146e2c1cf97a4622be84ab811a90c076d30bcf40dc86ac26882576997fdd7d761e14043443523ca082776451cd17bda7aba461bec66c90009665f09876848aeb7e8c602e0dd"}, &(0x7f00000003c0)=0xd7) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000380)={r11, 0x80000000}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f0000000400)={r12, 0x5}, &(0x7f0000000440)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$fb(r4, &(0x7f0000000300)="5854bf1ab29e1732a67fe9d0abaf4572ab1e3dd87fce7b761eea7db7171d435b67ba9649bb35faba4750a8fc20a3588a1f93e1c416d4920e45aa605041b6ce39981fc279aa5df517025467801fe486cf35c3029b851ccf01c04a3289", 0x5c) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) [ 1296.467517] audit: type=1400 audit(1579509260.363:4663): avc: denied { write } for pid=24926 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1296.481349] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1296.563253] audit: type=1400 audit(1579509260.373:4664): avc: denied { map } for pid=24931 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1296.613827] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:34:20 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e66000006000300"/57, 0x39}], 0x1) [ 1296.656468] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1296.677053] audit: type=1400 audit(1579509260.393:4665): avc: denied { read } for pid=24926 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1296.829081] audit: type=1400 audit(1579509260.413:4666): avc: denied { create } for pid=24925 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1296.964243] audit: type=1400 audit(1579509260.413:4667): avc: denied { write } for pid=24925 comm="syz-executor.3" path="socket:[100615]" dev="sockfs" ino=100615 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1297.009083] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1297.111060] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1297.144681] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1297.221434] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1297.319062] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1297.377501] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1297.400317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1297.456908] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1297.479544] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1297.499017] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1297.583099] device hsr_slave_0 entered promiscuous mode [ 1297.647598] device hsr_slave_1 entered promiscuous mode [ 1297.701193] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1297.719475] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1297.923424] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1298.039501] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1298.059101] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1298.077577] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1298.086040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1298.102785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1298.114245] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1298.121059] 8021q: adding VLAN 0 to HW filter on device team0 [ 1298.132521] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1298.139938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1298.149433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1298.168089] bridge0: port 1(bridge_slave_0) entered blocking state [ 1298.174566] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1298.193339] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1298.208985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1298.218187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1298.234907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1298.243581] bridge0: port 2(bridge_slave_1) entered blocking state [ 1298.250310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1298.261488] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1298.271508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1298.286995] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1298.294596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1298.314895] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1298.335397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1298.347772] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1298.359102] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1298.375823] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1298.385883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1298.398770] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1298.427621] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1298.438364] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1298.450526] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1298.458155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1298.466464] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1298.475025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1298.489515] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1298.498104] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1298.505049] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1298.513415] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1298.524990] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1298.544007] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1298.555880] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1298.564805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1298.574802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1298.658018] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1298.666222] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1298.673464] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1298.692649] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1298.700448] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1298.709012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1298.720651] device veth0_vlan entered promiscuous mode [ 1298.728226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1298.736790] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1298.766459] device veth1_vlan entered promiscuous mode [ 1298.773827] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1298.787511] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1298.802693] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1298.816376] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1298.824268] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1298.832894] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1298.841745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1298.850763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1298.861724] device veth0_macvtap entered promiscuous mode [ 1298.869664] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1298.883116] device veth1_macvtap entered promiscuous mode [ 1298.891370] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1298.904648] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1298.917390] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1298.928351] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1298.940054] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1298.951881] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1298.962205] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1298.972361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1298.983731] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1298.994482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1299.006276] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1299.015858] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1299.027231] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1299.037281] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1299.060305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1299.078134] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1299.086233] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1299.094308] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1299.104120] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1299.112267] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1299.123556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1299.141223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1299.152959] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1299.162858] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1299.173091] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1299.182808] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1299.192676] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1299.202793] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1299.213056] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1299.222446] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1299.232624] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1299.242214] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1299.252751] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1299.263771] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1299.272111] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1299.286733] IPVS: ftp: loaded support on port[0] = 21 [ 1299.336490] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1299.353293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 08:34:23 executing program 1: setsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x2, &(0x7f00000000c0)}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() getpid() syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = getpid() syz_open_procfs(r1, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f0000000180)) inotify_rm_watch(0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="04d80adce20f9259329568b6080100ec"}, {0x2, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000, 0x0, 0x4]}}}}, 0x48) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000300)) r3 = add_key(&(0x7f0000000040)='big_key\x00', 0x0, &(0x7f00000001c0)='g', 0x1, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) r4 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="fa19ef91bc718e65e6abce69f14eb267e0c3bfa09077fe5d61b3af096551667cb1de94af93a41895333a25161be1c09b49a3fe5b5025781c3801f7ebebe85afa28317d6e85a0801ec7025d4fdf399eddbedaf7f71fbf07f401eaba29081331b7b9f4ee4d40713bd403be445b4092c4b9477a70be279ba25d8fcb1d8e4ce4890f9f4cd96eb1c255192d989937a0569b65b97fc490d7025137d68ca54d1210a9e4b8dfa61d6855c831b1482a095f78e6eeca81626535388a0e4d2bad1c24e5e864f9b90c5a23c6af8ea54c8cef7dd4", 0xce, r3) r5 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)='g', 0x524, 0xfffffffffffffffb) keyctl$revoke(0x3, r5) keyctl$unlink(0x9, r4, r5) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000040)) getpid() getpid() 08:34:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xf500, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:34:23 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e7b000006000300"/57, 0x39}], 0x1) 08:34:23 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e67000006000300"/57, 0x39}], 0x1) 08:34:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001fc0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000002040)={0x7, 0x8, 0xfa00, {r2}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000040)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000000000)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) r4 = msgget$private(0x0, 0x4) msgsnd(r4, &(0x7f0000000140)={0x1, "f5ae50ac455e8bd2b301d60d9d88b899584e5b21ba9db2afcb57bf98c36c019944bf3ba03a84d6134a6b9944a0fa04f3b714da7f813175c1879692bcb0edbbc6a0564ceba2122aaeb1d768b7f592296c3c880bddfa82afd20ff3d804b34cbf2df4421971bfea808c3fdbf51c86e6628591f67c4bd82f11aadc8d725e07e024ff7b498735106e02ffb5b3818cef436ffac3b54497b0ef1378b22f79df28b2e9b8bd6b260d6c69e2c4aee334d5b5f76ece3ae9bc3cc09d2855cf892ed746e3bb58383ecfc0376c30b43497da4335393c5e9aff354ebd97e503a12e3ad8f3850fe26061a6517d5796db49b39b7a2557ba7580705eb9d131f308163173e4871c3f71d98cf530f999c6b53479340c21e936db4626ab1b1a806f055e32dd8c45f7548c7986ddbad12c8f8e8bcfe88de5c5aa085feb162786561087b8d2eba72d8cf07c680d4044a7c626cbe6a7bc4a544e68afc93e70b757268f0bb7aa627f16365fce082d369c0de8de748c23a74dc9e0a3ac1e4cf1df65d232fbc2d46f2af31ed88dffc7a6ee3991be64f35a63a21518cd33cace7fcc4dcb1afcb5d63306fee26962ec8285bb6ffd5a57e60082ff9bf444a46907a8732bb36f797ed9599f248e7ce3960bde41d69d0f4b615e3238dcee45953f7c812106f217af0802a6738cab32e0374948c41b41c6725b9b26746de30d7ae5e1363b19531c36bd88c6e07a3f665452723314cbbf2bb76190eb228e12878b0e12c94eec57bb03b60b79c0b86485ec6da97a444453c27435e9bc2091dfda9e1be1b8d745674d7beb8e5c3459364dd739a6b99c5a70cfd4c8bce123d1bb5a5ad854cf6c16aa7c82a8eafaaf5fdab75d5d1aeab515e2f9420d8db7ff08ced0b71d634ef139c098aacc4bbb6bbaca79e86b59ec2c633ce57c675b191024f81190a2d947271faf5346fa8616148fd1de6d8a16ba22df787accd31d8e2998284ea5eaf75f7f3d1ecf694bbe05364b5b2139e78378685dac40ae5474f6df8687130ed91256b670e747ecd9d4bc3a1800eec1dec7b2918f09f1cd638a8f96b7fba6f5957ce0f8b32fb979a2d47b4f27579ccae50ceea3a4fc17ca1af25d7bd7e80da03d0eaef4b2f415fa408f673206496abfcaddd201ba1c0cef9a914faef9f5c220eca2f738dc2a5764a370c2b0a5a0c13a00c233362edc42962f8709818c14accd4897608bce4d79e6053ba16840112c33e6ce85c805dd60b0fbddf71b9996b5fe840935053685e85775eb1afdf65c5a493dfb1e201dc94f2379b4d9a03164d3d9d38281728374c39d4f5203469d1475799de31eeeee457b39edb7d16b62f781a8acface11486e843176369da45ff7f757d221946d681c935c8df30cce17ef074085d962de3b90a70283c49eeafd5f1513d57f0090482f4b3b463d76d253e634b8905e94005da905a6a497908e78205d93771a3850f60e869f7a24d416446cfb06d18e7f1a56137595a47391820954cba4ac1c4f8592c140775873c744204cdeaa3c4bfed9f3d2cc14f24104db5a2bd5fa6934661379a39cb2ffc9e52f93b31ba71c36fd4d894a13ff1ef56783c1f268fe3f7bac2c4af905db76f15e2f7bc89c3b46b01c711fc1e016bc749daf7f1f8323a7ff4e7a58f8f91e41310babdcd1fb762af6d263876a453ab2d5e932d77f3c0c808d1edce352498b5a3076d501f86e4dce6c4f34986ac72424e76731461a55dec396b0e4f441b191bf2e35a5732faf15bb2112ce2d01c65fa8485ec69990d7739a7205c61a200d0e5e9cd5c3e20fefb7ed1da71f409b7546c25d5105a33154becf4a807378d776d9c432c028b7c7c6488bd79a766ec678d25e7f5b207166a5e2894af7ddc797c1ca0a9a5317091d62a4b703d3c06cd9ad194b15ade0440f0dbd72eedc8ee2e5a02f9e82d7bbd700206a774a2d1a42321c3e877b190c86307d00b30bd9a249a0152df27c703e6bce93a60cee705e2160f3456ade236579e688671819b1d78d2bb07ba80b2396a5423f70c59f382ba4af5d9d8f03e2b14c9e0cfc385e2c0140c90175c2bb577647834d84a4e019ed2a5d384fc7fb99b7e62e2c551b53355512f91bc3011b0300c7fb19dae8f89ce669dd98267cda2b2c02ce79ec10d9422f977c253f1381e8902a6c6aabf51be5883bdebe5c6162e372d758888d9a0b0b9565bbd562fd93c8b4fd24da00b99d5bc8e2fd09ec0f61d72020af1e996a1f440392012205c56b4e720f79a62bbbeb28326e6e99458ea88551761e303823b7941befb815f457c2e700c779c79d1b06ee3a38e78c44c72e1050dc35939785b09a2428c8d296635b915d7882364e8f332630b5be36b9a083ff7a93367340c25b73022062d74cb8322244b15890c4b217f2a5aa5940a3bdace67dc27a3da9a42cb2b1ce41625d66753376646745283236abb64c53c91f6a293e1868b0818d00510d63e62f38ae40252b147f8369720638c45516f210d7379fcb83204a1fc1da3672f4de63fcd958888607fdfe44a4e2e33dc99addb7d715fdb4bf0f6778eb3813f8c9da8469198dd737e56a46a556faea40a4002ddffa4a65c40ece53039d976981500a948ec91a44064a50cfc4daba7ced71045861ca4d2431e703e6ec409ec1b243527b7df8e2636b686066d61d55cbd7d4b764fed751a8c88b321c3896e89c796712aec150768757c817a27e1e6f1f2609eaa09b3115be7b03c31e65bf998611edc777884053f39b0997f5db2a43951ce0dcce7c236266136753be1603b38fa5d58a4a89df259468be7de2e4b5f4d247f4e4ea80ead88081baa6e168f9330cd8f5576180bb9cdb68aae7fc568e7b70af2ec3da74a38c648aa5fa07ea828bb7105180c76eb8e25a3670c660bae560126217a43c008bdd3a39d3a509fa7d020fe47d939b5279926d73fb435deb1dcb5101222612d33115278e1d14969cc1aa2f3f529d1bf0e1154d668b0ae82eeb96334feb2da2ba0ba346700818c9bbd5b3fdac85ee2998754b35b45c536d91e15c8449ed2111d8df5ac5d643c0e9f3702961603d908dc6fc6a195cc5af0c1df13344645c641b9bd0b14da87877363be83eb322b90b0ca5609c64308b7c694a21abc1b87f5c61bc17e9d9451227c82dffe2d7b10b98f1c2d3e54967dae01a5c3109a2c9debd168f500e35e444f3107a69658ef66fbdb780e34569ddfa3cdc30f72c5a3c8eb38d1a213e9b56fbe15a3c18eaef73d0919b272cd5aea83cfd8bcc9c997e5dbaabc16b2b65c9d8f8eb03095f1112c330580799670010b09d3aeb312cb4aec530d05cbbbda3d186dcabc4eaeb6ed9b5e7515fc11357413b0ea07e09a2fa6e845645aef22880e1d086d629a9082209282e4e297c12932a4e6e075d6d9eb8f0c64662a501ae72fff5c4c3cc58caf5544d24718b2b66b792ab41896640ee5a6905606a708711612e282b19b2aab45bb5946ef0f3e5b514b898f8473b10f6642b2527126cd7f384ce4b347168aae8e25e040bfada5a9e7b5541a578fee583cab9ac686f96c8137baed499f618b145cd830adb8d7e6706d765fdfce7722fe9898c98e01058e896a2c16da119a19cca7e3d4704053cce6e14daa4edf1bc8580ae06cf509e0dbe8993e815fcfb138e7f2b3f54e80534a090c0ce8755dacfb9fe315807a81ad8f171e782cb567fa2e465398da31c92511857980c7c6dd90252665c1d0879c2c5024d77e2e636158a00955a0abf051eb366d483b65296e6910e091a8420cd6a4fb55a4dccfdf47701db70ae9d6e59e2b51f931ce6fb3821afe9241cf676743744bc408d46b0c0d72527ea1d9abca37b5b519d5fc7ba3313479e40e8aaa1c211abff89fc85c1b0c20311c4f311b11350abe12229392a9fa1034a076c2b4b251dd3b9b5645298018e6c6e0fe42af73df53693332dd87484a6130ae58932df6ef7284e18547fde7533225a6d9cac46a3edb6b985fad24cea0b63c2478b36bda365c254b7475aecccb51fbb67585f11684160e0a4d3fac3f61758459822f51e11fe9584afc6a5137b6654391f8d28c8c45f9bbc37dbc57d0833b09a11bf751b57aaac7256f3ee085dc8161a3d55d0ee9915e9f2d7fc201ee4c2e2279a13b7c56ac789dfcb9e5bae3d9af0f0201cdeb479d404b6b66bfd6a38dfa92d8f1e74cd3fb69d72c365a2c3a6fd0c9b57fed1dec8d3f8581382c954503ee0c82158a2f101516e83d27e304d915dbd4fc14911d9efec8ebd93b34af4c80e30a2c9b5ba5814b9515a53221efeee6bfacd3f5bba4fbdb14839704710932267ce5ac979ea8b61ad7d47f46256048d3650c8659a1da1d062dcde63d1ec7825b04319bf99c2d3580fc4a93e534507be53b64ca5a69042b77dbf60cf0c88ff64cb9ba2852005c780ff0a745c52a794ba0ec89d131b2cd1ab90669b5c15c4a1faed953ec3ac2509d91d48315ef9486697a9cf7a184f077a2194781a873198dcf9194d96c94325208ca6d37386c0121c1af8516152d9679fcb9f671a9f9a25b0890c54ee22792386cf51c6759e393654e9dac40f671dc2915f90cef40acfe1109ca85072f875064ba08ed546cff669006adb3e75222c17a810b5b8430689d0c734226cc66a4669df443fa1e80a60b13e6bc9e9a0506723143ac9d8e5763a1d57209e541fe936d22e87026d89c6b6f7d06a488fb87864358d07bcff1aa7bc1d8917d5d590b1103be0b37b6265dae9929d3a29c2080cd04ad52404f0e7d2777ee4a8c19dbdb9d0f1b65f8b3774c521a58a8dd13aaa86af1842bdb6923ea134c62c3acd19ad2646fb9bc8d3de7fefdcf339d51d4803db6ff2c9f68fd6cd2c31453372fb6c17064f0caadfe3e83061e11d659118d4b4ef28548e62ed86784680830834723ee98448f8799e602316e044ada117de46737c4b42e8e66a0dfd5063b63e879975d5cfdc38193b0c0225e8f9d73fd9b2c38dc8c863a0608a80ad42f0144dc24c02d989d9f1826f9a9484e161380d6225128ce348fbe2b448f5585408cae91d15f779bfc53462cad73b9b4b19fdc4542c39ac1dbb149b017f5a810b8f0a480e4b10b0101a5637df7540d299d709aee6d42497dac3ea2bcc4139f51924dd5aab6acc8cbdc7285f8f765e4409f1766c50a38fdd197320af67a8c4a7bcd5b5c8f15c2b0324713b79f03bfe86a0f83854628b967e4844e8cbfda5b14250db5419ea1936079c9d434bd8bb39142071380486284711bd9791c4289f44b83deae082302dbb59d5f4f0d58d6d61e2cbee143d17fc0f5204b019a30904fb7f2ba4e6a78fac1c0920a1541b052e9b6cf699ca4ee857148e24d6565aaeb4268a5680d6d15827498cd0eee8f04634fd076d540c2e4613ae55b3f179bc21d6b4331e0712c11ab614350606cfca347abd93918a5cb4c4e2245e96825694f299cc466b2d2a996ca49f31222406b529d7c52a77748f74234dc133dd28c266ed97b8465c699e3ed0529b8fdd43a22e6a6e2a4455ca624923950b1cf3e0db6229675cd57f2748960aa5c37913eca2a7b2d5318b5db3a51f118015a46859ff4236f055a543be815029381c478f84249b475f0b8b2be2798e42ac2143d7e772674fc9a20c8c9e56e1c524e501e2af4ef14f5f140adae2746e536ad84209ed36ae8b1fab0317921a4f0b30aa3598ff4be276e883ea5b1fddbbc5d7aff778126a4babdcfcc79d3ccc3c49556f1add3181363e96e4886b74e567ea2cdc38b5257c4bdecdac4387f15d40a085fd329eab6a181d45ed9478cba929a0602a908049eeb63542780ef748c9e44e39b7f33bcf9b92a0f5beb440436c034c303167fa"}, 0x1008, 0x800) [ 1299.564880] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1299.589573] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1299.629385] chnl_net:caif_netlink_parms(): no params data found 08:34:23 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e68000006000300"/57, 0x39}], 0x1) 08:34:23 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e7c000006000300"/57, 0x39}], 0x1) 08:34:24 executing program 1: setsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x2, &(0x7f00000000c0)}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() getpid() syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = getpid() syz_open_procfs(r1, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f0000000180)) inotify_rm_watch(0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="04d80adce20f9259329568b6080100ec"}, {0x2, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000, 0x0, 0x4]}}}}, 0x48) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000300)) r3 = add_key(&(0x7f0000000040)='big_key\x00', 0x0, &(0x7f00000001c0)='g', 0x1, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) r4 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="fa19ef91bc718e65e6abce69f14eb267e0c3bfa09077fe5d61b3af096551667cb1de94af93a41895333a25161be1c09b49a3fe5b5025781c3801f7ebebe85afa28317d6e85a0801ec7025d4fdf399eddbedaf7f71fbf07f401eaba29081331b7b9f4ee4d40713bd403be445b4092c4b9477a70be279ba25d8fcb1d8e4ce4890f9f4cd96eb1c255192d989937a0569b65b97fc490d7025137d68ca54d1210a9e4b8dfa61d6855c831b1482a095f78e6eeca81626535388a0e4d2bad1c24e5e864f9b90c5a23c6af8ea54c8cef7dd4", 0xce, r3) r5 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)='g', 0x524, 0xfffffffffffffffb) keyctl$revoke(0x3, r5) keyctl$unlink(0x9, r4, r5) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000040)) getpid() getpid() [ 1301.140480] bridge0: port 1(bridge_slave_0) entered blocking state [ 1301.148327] bridge0: port 1(bridge_slave_0) entered disabled state [ 1301.159283] device bridge_slave_0 entered promiscuous mode [ 1301.225855] kauditd_printk_skb: 52 callbacks suppressed [ 1301.225869] audit: type=1400 audit(1579509265.353:4720): avc: denied { map } for pid=25004 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1301.534611] bridge0: port 2(bridge_slave_1) entered blocking state [ 1301.541257] bridge0: port 2(bridge_slave_1) entered disabled state [ 1301.548717] device bridge_slave_1 entered promiscuous mode [ 1301.569128] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1301.580018] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1301.858402] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1301.867897] team0: Port device team_slave_0 added [ 1301.874512] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1301.882651] team0: Port device team_slave_1 added [ 1302.145937] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1302.155241] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1302.186490] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1302.201101] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1302.208464] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1302.234852] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1302.247522] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1302.262355] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1302.323511] device hsr_slave_0 entered promiscuous mode [ 1302.367500] audit: type=1400 audit(1579509266.493:4721): avc: denied { map } for pid=25005 comm="syz-executor.5" path="/root/syz-executor.5" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1302.397665] device hsr_slave_1 entered promiscuous mode [ 1302.411517] audit: type=1400 audit(1579509266.493:4722): avc: denied { map } for pid=25005 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=456 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1302.481511] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1302.489497] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1302.512255] audit: type=1400 audit(1579509266.643:4723): avc: denied { map } for pid=25007 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1302.514289] IPVS: ftp: loaded support on port[0] = 21 [ 1303.108295] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1303.684585] chnl_net:caif_netlink_parms(): no params data found [ 1303.986126] bridge0: port 1(bridge_slave_0) entered blocking state [ 1303.993185] bridge0: port 1(bridge_slave_0) entered disabled state [ 1304.002600] device bridge_slave_0 entered promiscuous mode [ 1304.013412] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1304.025191] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1304.033483] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1304.041990] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1304.051135] device bridge_slave_1 left promiscuous mode [ 1304.058158] bridge0: port 2(bridge_slave_1) entered disabled state [ 1304.113681] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1304.121400] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1304.130008] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1304.137204] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1304.147820] device bridge_slave_1 left promiscuous mode [ 1304.154974] bridge0: port 2(bridge_slave_1) entered disabled state [ 1304.214946] device veth1_macvtap left promiscuous mode [ 1304.221424] device veth0_macvtap left promiscuous mode [ 1304.229464] device veth1_vlan left promiscuous mode [ 1304.236060] device veth0_vlan left promiscuous mode [ 1304.241924] device veth1_macvtap left promiscuous mode [ 1304.248734] device veth0_macvtap left promiscuous mode [ 1304.255381] device veth1_vlan left promiscuous mode [ 1304.261331] device veth0_vlan left promiscuous mode [ 1315.895410] device hsr_slave_1 left promiscuous mode [ 1315.944367] device hsr_slave_0 left promiscuous mode [ 1315.990324] team0 (unregistering): Port device team_slave_1 removed [ 1316.002494] team0 (unregistering): Port device team_slave_0 removed [ 1316.013994] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1316.044457] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1316.126015] bond0 (unregistering): Released all slaves [ 1316.273389] device hsr_slave_1 left promiscuous mode [ 1316.325426] device hsr_slave_0 left promiscuous mode [ 1316.372206] team0 (unregistering): Port device team_slave_1 removed [ 1316.383834] team0 (unregistering): Port device team_slave_0 removed [ 1316.393379] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1316.438337] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1316.503062] bond0 (unregistering): Released all slaves [ 1316.573399] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1316.579631] bridge0: port 2(bridge_slave_1) entered blocking state [ 1316.586216] bridge0: port 2(bridge_slave_1) entered disabled state [ 1316.594842] device bridge_slave_1 entered promiscuous mode [ 1316.612753] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1316.623998] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1316.631694] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1316.653441] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1316.663056] team0: Port device team_slave_0 added [ 1316.669571] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1316.676515] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1316.684456] team0: Port device team_slave_1 added [ 1316.690665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1316.698185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1316.721428] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1316.727719] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1316.757452] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1316.769637] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1316.780066] 8021q: adding VLAN 0 to HW filter on device team0 [ 1316.787525] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1316.794413] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1316.820370] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1316.831566] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1316.839849] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1316.855342] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1316.866978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1316.875512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1316.883794] bridge0: port 1(bridge_slave_0) entered blocking state [ 1316.890461] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1316.897635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1316.953431] device hsr_slave_0 entered promiscuous mode [ 1317.010592] device hsr_slave_1 entered promiscuous mode [ 1317.062753] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1317.070592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1317.078579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1317.087243] bridge0: port 2(bridge_slave_1) entered blocking state [ 1317.093685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1317.105018] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1317.114911] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1317.131272] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1317.131767] audit: type=1400 audit(1579509281.263:4724): avc: denied { map } for pid=25009 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1317.161177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1317.184401] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1317.192179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1317.204981] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1317.212195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1317.220812] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1317.235241] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1317.246475] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1317.261248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1317.269091] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1317.334014] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1317.390509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1317.398586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1317.421410] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1317.437238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1317.446060] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1317.464763] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1317.477822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1317.489696] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1317.513101] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1317.532188] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1317.538533] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1317.554938] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1317.575734] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1317.605174] audit: type=1400 audit(1579509281.733:4725): avc: denied { map } for pid=25010 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1317.676400] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1317.688081] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1317.699425] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1317.706976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1317.715141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1317.726447] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1317.733239] 8021q: adding VLAN 0 to HW filter on device team0 [ 1317.744852] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1317.752093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1317.760141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1317.769491] bridge0: port 1(bridge_slave_0) entered blocking state [ 1317.775989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1317.787988] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1317.795913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1317.804107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1317.819913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1317.827779] bridge0: port 2(bridge_slave_1) entered blocking state [ 1317.834295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1317.853631] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1317.866339] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1317.887911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1317.899490] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1317.917876] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1317.926851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1317.935884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1317.944596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1317.956411] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1317.964921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1317.975355] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1317.995329] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1318.004150] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1318.016455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1318.028528] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1318.047375] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1318.056177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1318.065172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1318.076550] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1318.096209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1318.107966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1318.133653] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1318.139796] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1318.173799] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1318.184979] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1318.197114] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1318.212544] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1318.233990] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1318.249814] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1318.258845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1318.275957] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1318.289668] device veth0_vlan entered promiscuous mode [ 1318.301572] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1318.308822] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1318.326664] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1318.334262] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1318.355449] device veth1_vlan entered promiscuous mode [ 1318.362807] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1318.372107] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1318.389060] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1318.418302] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1318.439038] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1318.451946] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1318.460009] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1318.483604] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1318.492077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1318.500105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1318.513988] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1318.525704] device veth0_macvtap entered promiscuous mode [ 1318.532478] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1318.539503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1318.549450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1318.581081] device veth1_macvtap entered promiscuous mode [ 1318.587428] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1318.595706] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1318.607491] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1318.618333] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1318.642325] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1318.656465] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1318.667484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1318.676775] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1318.686993] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1318.696276] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1318.706521] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1318.715807] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1318.726882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1318.736301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1318.746088] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1318.756977] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1318.764346] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1318.772904] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1318.781330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1318.791105] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1318.801406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1318.817402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1318.828716] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1318.846174] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1318.857034] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1318.869308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1318.879174] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1318.888441] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1318.898521] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1318.918939] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1318.926143] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1318.946833] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1318.955397] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1318.963265] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1318.969576] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1318.979086] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1318.995445] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1319.011983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1319.028390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1319.037104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1319.045635] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1319.057943] device veth0_vlan entered promiscuous mode [ 1319.074273] device veth1_vlan entered promiscuous mode [ 1319.080762] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1319.096864] audit: type=1400 audit(1579509283.223:4726): avc: denied { map } for pid=25028 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1319.098110] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1319.181956] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1319.206940] audit: type=1400 audit(1579509283.323:4727): avc: denied { map_create } for pid=25029 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1319.208043] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1319.238317] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1319.247273] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1319.310792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1319.318943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1319.342768] device veth0_macvtap entered promiscuous mode [ 1319.349190] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1319.361702] device veth1_macvtap entered promiscuous mode [ 1319.368012] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1319.379259] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1319.392652] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready 08:34:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b8"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:34:43 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e69000006000300"/57, 0x39}], 0x1) 08:34:43 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e7d000006000300"/57, 0x39}], 0x1) 08:34:43 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6572726f72733d77697468647261772c6c6f63636f6f6b69652c006bdf47fde3a91ae6297bda55550f70579927f52884d7e18b7940c34b2c8311ab4d3c476c422c65fc0539305db243e87c64f261340b135d23fd72076fbf39fa027824dd153e8bc468a555cf6844ea5ce5893f656f9735ca0835f2637c89d7d7e21ea12ac03c243cc7b6185d8618d50de11e1d1e93c6c7b73ac45d1f8ed9a4a9af24962fb6123c77297b88abd97b8c46d757"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(r2, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) ioctl$VT_GETMODE(r3, 0x5601, &(0x7f00000000c0)) openat$cgroup_ro(r3, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) 08:34:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xf600, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) [ 1319.405354] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1319.415555] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1319.428402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1319.438989] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1319.481617] audit: type=1400 audit(1579509283.603:4728): avc: denied { create } for pid=25036 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1319.489157] nla_parse: 4 callbacks suppressed [ 1319.489185] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1319.516142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1319.540723] gfs2: not a GFS2 filesystem 08:34:43 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e6a000006000300"/57, 0x39}], 0x1) [ 1319.570339] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1319.590389] audit: type=1400 audit(1579509283.613:4729): avc: denied { write } for pid=25036 comm="syz-executor.3" path="socket:[101702]" dev="sockfs" ino=101702 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:34:43 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e7e000006000300"/57, 0x39}], 0x1) [ 1319.650391] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1319.680001] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1319.711943] audit: type=1400 audit(1579509283.643:4730): avc: denied { create } for pid=25034 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1319.740290] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1319.744390] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1319.774214] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 08:34:44 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e6b000006000300"/57, 0x39}], 0x1) [ 1319.805376] audit: type=1400 audit(1579509283.643:4731): avc: denied { write } for pid=25034 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1319.829403] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1319.837885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1319.850091] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1319.877207] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1319.906555] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1319.915960] audit: type=1400 audit(1579509283.643:4732): avc: denied { create } for pid=25032 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1319.938409] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1319.951753] gfs2: not a GFS2 filesystem [ 1319.998910] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1320.031882] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1320.039426] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1320.044963] audit: type=1400 audit(1579509283.683:4734): avc: denied { map } for pid=25045 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1320.063134] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1320.120418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1320.144408] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1320.156871] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1320.181041] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1320.192684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1320.212759] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1320.225566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1320.269730] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1320.308871] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1320.331353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1320.347657] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1320.358257] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1320.369124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1320.379271] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1320.389586] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1320.396627] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1320.603416] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1320.611722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 08:34:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet_sctp(0x2, 0x5, 0x84) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x104000000000000, 0x40, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x220, 0xe8, 0xe8, 0x0, 0xe8, 0xe8, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x280) ppoll(&(0x7f0000000440)=[{0xffffffffffffffff, 0xc000}, {}, {r0}, {}], 0x4, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e24, 0x5, @loopback, 0x101}, 0x1c) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)='sit0\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MPATH(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=ANY=[@ANYRES16, @ANYBLOB="15000c0099000000000000000000080003007c4c53399bce3dd3a5652dc2a551594d721f0cf5c9b7f0f693ca0a2dc5311e88984da9161a0a3eb965d244bd33fe9d67efbf1ddccc82fd87bdfe96e0668fb8df2b023ce9c97f788382e74f0d", @ANYRES32=0x0, @ANYBLOB], 0x4}}, 0x4000080) syz_genetlink_get_family_id$tipc(0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000040)={0x2, 'syzkaller1\x00', {0xee67}}) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={0x0}}, 0x0) 08:34:44 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e82000006000300"/57, 0x39}], 0x1) 08:34:44 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e6c000006000300"/57, 0x39}], 0x1) 08:34:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xf700, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:34:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:34:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='erspan0\x00', 0xff89) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x40000, 0x0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_DBG_G_CHIP_INFO(r3, 0xc0c85666, &(0x7f0000000140)={{0x2, @addr=0x3}, "78c1eb4655099f455f0fec7d3ec621337e50dab22a0885f1b0cb3350347d3726", 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000100)=0x1, 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x100000000000000) [ 1320.870600] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1320.874096] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1320.882327] Cannot find add_set index 0 as target [ 1320.916418] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:34:45 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e83000006000300"/57, 0x39}], 0x1) 08:34:45 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e6d000006000300"/57, 0x39}], 0x1) [ 1321.132920] Cannot find add_set index 0 as target [ 1321.218098] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:34:45 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x1) write$evdev(r0, &(0x7f0000000240)=[{{0x0, 0x2710}, 0x11, 0xfff7}], 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000001580)={0x5, 0x5, 0x1, 0x80, 0xc, "c58e0705684174c68b250649a4519d5fa017fc"}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_type(r2, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r4 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, r4) keyctl$read(0xb, r4, &(0x7f00000015c0), 0x0) writev(r3, &(0x7f0000001500)=[{&(0x7f0000000040)="0351e591bf7212a65e29c763c0b0c5b0756e9652ba9d7b9ee7f78303b6fea71fa1bf0b0a6f28f29e2d76ff9c832deffc5e54c0f7ec013d56ce0243daa2", 0x3d}, {&(0x7f00000000c0)="f824783085778d2d0083c5ce284d2d7a2f93c38a04a7570e645ff7ad0ec633753df458ca66d7edf99531295fa9dbaf73aa2c8c5b6623b0572835bd8c8e255ba26583b51ab3d70d13e637ba22ba2bf9327dd04174e8d901a8eba2afefb6fe66f737e60aa633e42fac73095c8236ce1c37d91d23bf0450d354fed4bd8e390252314d8ea71b1cc2f80a93d5aeb2c206e5321440a2b971f7e3112128223242fc6aaec4ae3cde7ffb071065386bd59256e9e594b7d2753724059c88743754345a8434103616f6f819957af7987ecec9d787a81db4a775f87cdb10f963b9e7643e1a8566dae08c7b3a57af87d79ce3e741462187", 0xf1}, {&(0x7f0000000280)="9f46fd2fd4fee6c1c53557614b858db8644c662683e573a10724988ec0ee9b350e1924168b483b51d0a2c5588a012fe6f186a911384503bcbca2d207adccfc8a782cba7e983002aa79d7406d1f906ec257f1ca6617aab45e005d79738d40cc625d10b14735fbc57928dfd9721e73f23c8b85858b82aca98d19ee9529b0dcfafa305262d0d8c20eb77ad1f0", 0x8b}, {&(0x7f0000000340)="6a3a937c0d33d2099b08aa5f95fd12d66b281e703f947ac1f6e36ce6a91c89de08a0a0a921ad56d902a2dd7b77d75dad4f814ee9cc7d057ef97d4cba44069645a7beea6a89f99caa30431750105d6cae9d21819be9a7122fba736c25db9101fc19f6824a52184458be889e6dd6224fa99e9c8d8a8a58cb9216fbda9f733c85352b2688373c39898f77e188d3f5d06c0c4ab608feda751cf92a262bb4619ce0a67f5aa821c0823f53abfc0196533ac62054e9836c259009bc48baba63c173c6b9d66cb36bcae8f498cd85d869d39ec1df875ac3944898695b845769934f7297", 0xdf}, {&(0x7f00000001c0)="d9ea3db2cafbcaeec755590805e2fdf7e4e394eaea7a5ab7534d64d31e08a760d11d4cf7020122b8932a449bdf113ad15e43d335689095292d0602fa81c8f01f002b8326cc35e4b10e661926eccb52f179", 0x51}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="7660f0e8a4afbe5d77e315969adbbabf41e19586ab5abd955e5083e271359fb68c9c38506006ca1c72df8d7de5e7c2db53f6a63a583ce0258f015eb24ee1c7c04c800acb71b568e4ff9d31179ebd9466e77fd26f5e9db01c365183ba4ee2c28f85f78ca3a8832b52df30ac729f6a9b79b43973b3fc911b80fae3de9e79c4744ce6f94bee2582d43233801423ff1e1318c46514d872ee4d836455681f6632e5b333ec2e617f3114a2569824ea", 0xac}], 0x7) 08:34:45 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e6e000006000300"/57, 0x39}], 0x1) 08:34:45 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e84000006000300"/57, 0x39}], 0x1) 08:34:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet_sctp(0x2, 0x5, 0x84) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x104000000000000, 0x40, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x220, 0xe8, 0xe8, 0x0, 0xe8, 0xe8, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x280) ppoll(&(0x7f0000000440)=[{0xffffffffffffffff, 0xc000}, {}, {r0}, {}], 0x4, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e24, 0x5, @loopback, 0x101}, 0x1c) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)='sit0\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MPATH(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=ANY=[@ANYRES16, @ANYBLOB="15000c0099000000000000000000080003007c4c53399bce3dd3a5652dc2a551594d721f0cf5c9b7f0f693ca0a2dc5311e88984da9161a0a3eb965d244bd33fe9d67efbf1ddccc82fd87bdfe96e0668fb8df2b023ce9c97f788382e74f0d", @ANYRES32=0x0, @ANYBLOB], 0x4}}, 0x4000080) syz_genetlink_get_family_id$tipc(0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000040)={0x2, 'syzkaller1\x00', {0xee67}}) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={0x0}}, 0x0) [ 1321.567432] Cannot find add_set index 0 as target 08:34:45 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e85000006000300"/57, 0x39}], 0x1) 08:34:45 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e6f000006000300"/57, 0x39}], 0x1) 08:34:46 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e86000006000300"/57, 0x39}], 0x1) [ 1322.146757] kauditd_printk_skb: 100 callbacks suppressed [ 1322.146773] audit: type=1400 audit(1579509286.273:4834): avc: denied { map } for pid=25146 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 08:34:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xf800, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) [ 1322.407665] audit: type=1400 audit(1579509286.513:4835): avc: denied { map } for pid=25149 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1322.510692] audit: type=1400 audit(1579509286.563:4836): avc: denied { map } for pid=25149 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1322.580517] audit: type=1400 audit(1579509286.633:4837): avc: denied { create } for pid=25150 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1322.648198] audit: type=1400 audit(1579509286.633:4839): avc: denied { map } for pid=25152 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1322.731486] audit: type=1400 audit(1579509286.633:4838): avc: denied { write } for pid=25150 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1322.781618] audit: type=1400 audit(1579509286.683:4840): avc: denied { map } for pid=25155 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1322.859194] audit: type=1400 audit(1579509286.733:4841): avc: denied { read } for pid=25150 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1323.297560] audit: type=1400 audit(1579509287.423:4842): avc: denied { create } for pid=25150 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1323.323690] audit: type=1400 audit(1579509287.423:4843): avc: denied { write } for pid=25150 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1324.135989] IPVS: ftp: loaded support on port[0] = 21 [ 1324.333607] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1324.340992] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1324.349227] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1324.356091] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1324.365095] device bridge_slave_1 left promiscuous mode [ 1324.370886] bridge0: port 2(bridge_slave_1) entered disabled state [ 1324.411824] device bridge_slave_0 left promiscuous mode [ 1324.417353] bridge0: port 1(bridge_slave_0) entered disabled state [ 1324.473301] device veth1_macvtap left promiscuous mode [ 1324.478639] device veth0_macvtap left promiscuous mode [ 1324.487089] device veth1_vlan left promiscuous mode [ 1324.492368] device veth0_vlan left promiscuous mode [ 1329.865375] device hsr_slave_1 left promiscuous mode [ 1329.925416] device hsr_slave_0 left promiscuous mode [ 1329.992573] team0 (unregistering): Port device team_slave_1 removed [ 1330.005050] team0 (unregistering): Port device team_slave_0 removed [ 1330.015192] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1330.064045] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1330.151245] bond0 (unregistering): Released all slaves [ 1330.205954] chnl_net:caif_netlink_parms(): no params data found [ 1330.240040] bridge0: port 1(bridge_slave_0) entered blocking state [ 1330.247005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1330.254633] device bridge_slave_0 entered promiscuous mode [ 1330.262519] bridge0: port 2(bridge_slave_1) entered blocking state [ 1330.269140] bridge0: port 2(bridge_slave_1) entered disabled state [ 1330.276660] device bridge_slave_1 entered promiscuous mode [ 1330.293366] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1330.303863] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1330.325024] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1330.332510] team0: Port device team_slave_0 added [ 1330.338377] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1330.345898] team0: Port device team_slave_1 added [ 1330.410569] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1330.416874] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1330.449342] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1330.469029] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1330.475637] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1330.508135] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1330.527226] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1330.535314] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1330.623365] device hsr_slave_0 entered promiscuous mode [ 1330.660595] device hsr_slave_1 entered promiscuous mode [ 1330.701250] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1330.708622] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1330.745099] kauditd_printk_skb: 6 callbacks suppressed [ 1330.745114] audit: type=1400 audit(1579509294.873:4850): avc: denied { map } for pid=25163 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1330.849078] bridge0: port 2(bridge_slave_1) entered blocking state [ 1330.855562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1330.862254] bridge0: port 1(bridge_slave_0) entered blocking state [ 1330.868775] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1330.942548] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1330.948664] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1330.958649] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1330.971107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1330.979180] bridge0: port 1(bridge_slave_0) entered disabled state [ 1330.986927] bridge0: port 2(bridge_slave_1) entered disabled state [ 1330.994604] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1331.014459] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1331.021042] 8021q: adding VLAN 0 to HW filter on device team0 [ 1331.032745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1331.041796] bridge0: port 1(bridge_slave_0) entered blocking state [ 1331.048395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1331.067524] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1331.075570] bridge0: port 2(bridge_slave_1) entered blocking state [ 1331.082032] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1331.102792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1331.111884] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1331.128637] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1331.149829] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1331.161720] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1331.168534] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1331.184927] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1331.197562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1331.217795] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1331.227197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1331.238358] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1331.245985] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1331.254198] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1331.267423] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1331.296238] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1331.311339] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1331.318657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1331.328911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1331.347064] audit: type=1400 audit(1579509295.473:4851): avc: denied { map } for pid=25164 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1331.414477] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1331.422305] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1331.429401] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1331.441692] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1331.448404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1331.456774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1331.467669] device veth0_vlan entered promiscuous mode [ 1331.474684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1331.482794] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1331.496123] device veth1_vlan entered promiscuous mode [ 1331.504089] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1331.523484] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1331.535876] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1331.547817] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1331.555640] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1331.563940] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1331.571863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1331.579681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1331.590979] device veth0_macvtap entered promiscuous mode [ 1331.597570] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1331.609265] device veth1_macvtap entered promiscuous mode [ 1331.616039] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1331.626627] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1331.646156] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1331.663465] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1331.673510] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.683026] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1331.692819] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.702153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1331.712088] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.721252] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1331.731046] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.740300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1331.750132] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.759596] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1331.770513] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.781146] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1331.788152] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1331.795892] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1331.803575] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1331.811355] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1331.819159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1331.843133] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1331.857715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.867503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1331.877670] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.887438] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1331.897547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.908334] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1331.918278] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.928768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1331.938885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.948204] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1331.957959] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.968391] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1331.975927] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1331.984764] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1331.992830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1332.038478] audit: type=1400 audit(1579509296.163:4852): avc: denied { map } for pid=25170 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1332.064122] audit: type=1400 audit(1579509296.193:4853): avc: denied { map_create } for pid=25171 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1332.105833] device bridge_slave_0 left promiscuous mode [ 1332.116546] bridge0: port 1(bridge_slave_0) entered disabled state 08:34:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:34:56 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e87000006000300"/57, 0x39}], 0x1) 08:34:56 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e70000006000300"/57, 0x39}], 0x1) 08:34:56 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000011000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000040)="f30f2ba686c98394b20007baf80c66b8badead8466efbafc0cb000ee660f388072000f4ae00f209b0fb957a7360f21aef30f01e8f080a8f61000", 0x3a}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:34:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/asound/seq/clients\x00', 0x0, 0x0) syz_mount_image$f2fs(&(0x7f00000015c0)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0xf5ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c00004c0900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000", 0x63, 0x1400}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) sendmsg$NLBL_UNLABEL_C_ACCEPT(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="ac000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT, @ANYRES16=r2, @ANYRES16=r4], @ANYBLOB="000226bd7000fedbdf250100000008000400e00000022900070073797374656d5f753a6f626a6563745f723a69707461626c65735f657865635f743a733000000000050001000100000014000200ff010000000000000000000000000001080005007f00000114000600766c616e3100000000000000000000002900070073797374656d5f753a6f626a6563745f723a68616c645f61636c42657865635f743a733000000000"], 0x3}, 0x1, 0x0, 0x0, 0x4041}, 0x4008010) 08:34:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xf900, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) [ 1332.237476] audit: type=1400 audit(1579509296.363:4854): avc: denied { create } for pid=25176 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1332.267874] nla_parse: 10 callbacks suppressed [ 1332.267884] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1332.278645] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1332.330119] audit: type=1400 audit(1579509296.393:4855): avc: denied { create } for pid=25175 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1332.339422] f2fs_msg: 4 callbacks suppressed [ 1332.339473] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1332.413530] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:34:56 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e88000006000300"/57, 0x39}], 0x1) 08:34:56 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e71000006000300"/57, 0x39}], 0x1) [ 1332.442056] audit: type=1400 audit(1579509296.393:4856): avc: denied { write } for pid=25175 comm="syz-executor.3" path="socket:[101295]" dev="sockfs" ino=101295 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1332.449874] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 1332.520680] F2FS-fs (loop1): Invalid Fs Meta Ino: node(0) meta(0) root(3) [ 1332.549773] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 1332.578655] audit: type=1400 audit(1579509296.393:4857): avc: denied { create } for pid=25178 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1332.621889] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1332.629227] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 1332.646599] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1332.656445] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1332.675394] audit: type=1400 audit(1579509296.393:4858): avc: denied { write } for pid=25178 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1332.704353] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1332.709083] F2FS-fs (loop1): Invalid Fs Meta Ino: node(0) meta(0) root(3) 08:34:56 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e89000006000300"/57, 0x39}], 0x1) [ 1332.730108] audit: type=1400 audit(1579509296.423:4859): avc: denied { map } for pid=25185 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1332.761458] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 08:34:56 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e72000006000300"/57, 0x39}], 0x1) [ 1332.919636] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1332.974183] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 1332.989072] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1333.104520] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1333.114094] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:34:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:34:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xfa00, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:34:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:34:57 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e73000006000300"/57, 0x39}], 0x1) 08:34:57 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e8a000006000300"/57, 0x39}], 0x1) 08:34:57 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="5500000018007f5f00fe01b2a4a290930206040208000001028140003900090035004c0a010000401900050023", 0x2d}], 0x1}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xffb8) socket(0x10, 0x80002, 0x0) splice(r0, 0x0, r2, 0x0, 0x200008000004ffe0, 0x0) [ 1333.480495] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:34:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) [ 1333.648046] device bridge_slave_0 left promiscuous mode [ 1333.656086] bridge0: port 1(bridge_slave_0) entered disabled state 08:34:57 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e8b000006000300"/57, 0x39}], 0x1) 08:34:57 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e74000006000300"/57, 0x39}], 0x1) [ 1333.756414] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25242 comm=syz-executor.5 [ 1333.821269] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25242 comm=syz-executor.5 [ 1333.905711] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25242 comm=syz-executor.5 [ 1333.930719] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25242 comm=syz-executor.5 08:34:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f00000000c0)=0x2, 0xffbf) r1 = getpid() sched_rr_get_interval(r1, &(0x7f0000000000)) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r0, 0x0, 0x0, 0x20044882, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}}, 0x1c) ioctl$NBD_SET_SOCK(r3, 0xab00, r3) 08:34:58 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e8c000006000300"/57, 0x39}], 0x1) [ 1334.020629] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25242 comm=syz-executor.5 08:34:58 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e75000006000300"/57, 0x39}], 0x1) [ 1334.067203] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25242 comm=syz-executor.5 [ 1334.153586] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25242 comm=syz-executor.5 08:34:58 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e8d000006000300"/57, 0x39}], 0x1) [ 1334.213294] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25242 comm=syz-executor.5 [ 1334.240680] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25242 comm=syz-executor.5 08:34:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xfb00, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:34:58 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e76000006000300"/57, 0x39}], 0x1) [ 1334.352015] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25242 comm=syz-executor.5 08:34:58 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e8e000006000300"/57, 0x39}], 0x1) 08:34:58 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e77000006000300"/57, 0x39}], 0x1) 08:34:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0xaaaaaaaaaaaaab5, &(0x7f0000000580)=[{&(0x7f00000002c0)="3de34462d9e83aa70984a67e6d7990509644f9fc504f232a05bedf2933286e9a7a992d4cf09592bfc9d07958dad8cad69a8084056d920adb6c72c7f3e19f4dae64edd0d75f3ca7dfb7595c22eee96c997f2b9c363f3b64279da9c56ce79550549d29b8760bd9add380dd7a8537ea793d6a58c945d490dcb1501d5bf481d955f3ce106c7c228c4da819218e13cb5fa67278b9bfbf57c041a22d9378f396cd802a3f97e157a035eefca7635688b67af0185c40b3dafaf88d15252cb13466f2", 0x0, 0x40}, {&(0x7f00000003c0)="edd73371e8e9b60eeabc601d90503cc34897eced12dce893829211132ec600eeb606329be249795c6f46f8315bb05dac078e26fb755ec7942c14e5ee7d291747ffe5296a105ddc293f8f1cfefea9dbad91011e3736f443928e370c4cae6a7338ec105f1ddc810f291f5ca6ee7203f113d24de9bfc2c07fd3bfee34a7443303f8238bef4914f9dc9bc5f8", 0x0, 0x2}, {&(0x7f0000000740)="2ae37c9a79eb574a2f3e00632d2d17422c1cc5bfdf121d84d200b404a2a9a9cc1afbf330fe8b5ed65d982be7dc139b47a717582c7708f991577fc0a17839c54c424888812843fd09325ae14f77271cfaf8eb8a02e82c61277160ad34daa7414433623a11099cf1d4632a1dc388908dc424570bd6ccaabad6808a310e9e9f778221474e468f98143adf16c9151ba4a2887d792b777d51a21be672dc47987f9483229fc708c1668d9e0afe36550572dc6bd7052d323bd6331945fad7eb85d8fe307337f217de71680948a70616e36123", 0x0, 0xe7d}, {&(0x7f0000000480)="7f97dc337f9d283474130e465e11d37978aca503de4ca1d4d56fe1196f5046d08cfed81d106edd65aa962a379bd9a93cec5942000a7353d161e9130a3cee8e283b51b251581d010c46f8e74eac971e004da59a3569729d9453cd09", 0x0, 0x5}, {&(0x7f0000000840)="79e6ef08b96f0a3accc4b75e7e275720de1f197da59f6a766b94dd7d35cf91208bdb4fb9a3bd5871983880ff502ad6b90e887ac122ade872fb82d95c2d2d70f2536442dee2804b8db0229e88e7ec06549beb4791a4af5b19a6360a8cf39fd520d55c47d01cf66cc144fe7ce2b2c8c97c7d877c3ce678277d82b17eeadfbdd8314e93880197883994255ac7bff8b04b819d10c5d563e520dc", 0x0, 0x4}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x8800, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xd44c2, 0x1a4) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x435) accept$unix(r1, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e) r3 = open(&(0x7f0000000280)='./file0\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x100010, r3, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') sendfile(r1, r2, 0x0, 0x7fffffa7) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'nr0\x00', {0x1ff}, 0x8000}) [ 1335.775282] kauditd_printk_skb: 100 callbacks suppressed [ 1335.775298] audit: type=1804 audit(1579509299.903:4960): pid=25297 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir354505515/syzkaller.1GE6IF/5/file0" dev="sda1" ino=16723 res=1 [ 1335.844133] audit: type=1400 audit(1579509299.903:4961): avc: denied { map } for pid=25289 comm="syz-executor.5" path="/root/syzkaller-testdir354505515/syzkaller.1GE6IF/5/file0" dev="sda1" ino=16723 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1335.881559] audit: type=1804 audit(1579509299.903:4962): pid=25300 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir354505515/syzkaller.1GE6IF/5/file0" dev="sda1" ino=16723 res=1 [ 1335.914932] audit: type=1400 audit(1579509300.013:4963): avc: denied { map } for pid=25301 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1336.617513] audit: type=1400 audit(1579509300.743:4964): avc: denied { map } for pid=25302 comm="syz-executor.2" path="/root/syz-executor.2" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1336.663652] audit: type=1400 audit(1579509300.783:4965): avc: denied { map } for pid=25302 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=456 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1336.844454] IPVS: ftp: loaded support on port[0] = 21 [ 1337.029348] chnl_net:caif_netlink_parms(): no params data found [ 1337.183501] bridge0: port 1(bridge_slave_0) entered blocking state [ 1337.189934] bridge0: port 1(bridge_slave_0) entered disabled state [ 1337.197309] device bridge_slave_0 entered promiscuous mode [ 1337.205243] bridge0: port 2(bridge_slave_1) entered blocking state [ 1337.211967] bridge0: port 2(bridge_slave_1) entered disabled state [ 1337.219330] device bridge_slave_1 entered promiscuous mode [ 1337.227694] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1337.234603] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1337.244040] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1337.250949] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1337.258839] device bridge_slave_1 left promiscuous mode [ 1337.264696] bridge0: port 2(bridge_slave_1) entered disabled state [ 1337.323681] device veth1_macvtap left promiscuous mode [ 1337.329176] device veth0_macvtap left promiscuous mode [ 1337.338415] device veth1_vlan left promiscuous mode [ 1337.343621] device veth0_vlan left promiscuous mode [ 1343.035732] device hsr_slave_1 left promiscuous mode [ 1343.095668] device hsr_slave_0 left promiscuous mode [ 1343.161971] team0 (unregistering): Port device team_slave_1 removed [ 1343.173419] team0 (unregistering): Port device team_slave_0 removed [ 1343.183239] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1343.236442] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1343.311449] bond0 (unregistering): Released all slaves [ 1343.379692] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1343.388883] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1343.411547] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1343.419010] team0: Port device team_slave_0 added [ 1343.424909] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1343.432807] team0: Port device team_slave_1 added [ 1343.447146] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1343.453644] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1343.478925] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1343.490804] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1343.497077] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1343.522515] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1343.533954] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1343.542757] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1343.592596] device hsr_slave_0 entered promiscuous mode [ 1343.630709] device hsr_slave_1 entered promiscuous mode [ 1343.671200] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1343.678716] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1343.713153] audit: type=1400 audit(1579509307.843:4966): avc: denied { map } for pid=25305 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1343.821922] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1343.902348] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1343.908450] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1343.929238] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1343.946740] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1343.957634] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1343.974917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1343.985867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1344.000882] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1344.006979] 8021q: adding VLAN 0 to HW filter on device team0 [ 1344.018482] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1344.026319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1344.035019] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1344.050887] bridge0: port 1(bridge_slave_0) entered blocking state [ 1344.057266] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1344.068098] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1344.075883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1344.084421] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1344.092962] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1344.105018] bridge0: port 2(bridge_slave_1) entered blocking state [ 1344.111455] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1344.129219] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1344.137801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1344.169164] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1344.198879] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1344.209307] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1344.220506] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1344.227520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1344.235710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1344.244165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1344.261389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1344.277105] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1344.292006] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1344.307659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1344.316432] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1344.330775] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1344.342549] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1344.361978] audit: type=1400 audit(1579509308.493:4967): avc: denied { map } for pid=25306 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1344.445662] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1344.457136] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1344.464602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1344.474737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1344.562536] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1344.570011] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1344.577369] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1344.588161] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1344.595249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1344.603635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1344.614958] device veth0_vlan entered promiscuous mode [ 1344.621660] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1344.628764] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1344.643057] device veth1_vlan entered promiscuous mode [ 1344.649127] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1344.669664] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1344.693558] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1344.712970] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1344.719908] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1344.737305] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1344.746048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1344.754020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1344.764359] device veth0_macvtap entered promiscuous mode [ 1344.771522] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1344.782485] device veth1_macvtap entered promiscuous mode [ 1344.789030] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1344.799956] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1344.812984] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1344.823339] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1344.833541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.843036] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1344.852854] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.862100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1344.872793] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.882063] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1344.891957] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.901146] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1344.910982] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.920098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1344.929903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.940162] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1344.947499] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1344.954737] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1344.963229] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1344.970806] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1344.980766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1344.991201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1345.001637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1345.011764] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1345.021597] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1345.030781] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1345.041182] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1345.050563] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1345.060379] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1345.069518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1345.079398] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1345.088613] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1345.098415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1345.108685] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1345.115753] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1345.123527] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1345.132061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1345.190007] audit: type=1400 audit(1579509309.313:4968): avc: denied { map } for pid=25318 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1345.266745] audit: type=1400 audit(1579509309.363:4969): avc: denied { map_create } for pid=25319 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 08:35:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:35:09 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e8f000006000300"/57, 0x39}], 0x1) 08:35:09 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e78000006000300"/57, 0x39}], 0x1) 08:35:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xfc00, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:35:09 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/uts\x00') 08:35:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f00000000c0)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="24000000200007041dfffd946f610500020000001f2d1f0000000800050018000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r5, 0xc}, 0x10) [ 1345.397505] audit: type=1400 audit(1579509309.523:4970): avc: denied { create } for pid=25323 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1345.441728] nla_parse: 14 callbacks suppressed [ 1345.441738] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1345.456787] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1345.475637] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1345.485759] audit: type=1400 audit(1579509309.533:4971): avc: denied { create } for pid=25322 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1345.521106] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:35:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc028aa03, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000480)=""/248) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$VIDIOC_G_JPEGCOMP(0xffffffffffffffff, 0x808c563d, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f0000000040)) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f00000000c0)={0x0, 0x2000b, 0x199}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, &(0x7f0000000380)={0x3, &(0x7f0000000340)=[{0x97a4, 0x0, 0x4, 0xfffff510}, {0x2, 0x4, 0x7, 0x7f}, {0x0, 0x7, 0xff, 0x1}]}) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000300)=&(0x7f00000002c0)) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 08:35:09 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e79000006000300"/57, 0x39}], 0x1) 08:35:09 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e90000006000300"/57, 0x39}], 0x1) [ 1345.639166] audit: type=1400 audit(1579509309.533:4972): avc: denied { write } for pid=25322 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1345.784622] audit: type=1400 audit(1579509309.543:4973): avc: denied { map } for pid=25328 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1345.817897] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1345.830054] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1345.878568] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1345.890421] audit: type=1400 audit(1579509309.553:4974): avc: denied { create } for pid=25324 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:35:10 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e91000006000300"/57, 0x39}], 0x1) 08:35:10 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e7a000006000300"/57, 0x39}], 0x1) [ 1346.013156] audit: type=1400 audit(1579509309.553:4975): avc: denied { read } for pid=25322 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:35:10 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) r0 = perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x80, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)={0x0, 0x1c9c380}) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000240)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}, {&(0x7f00000004c0)="d92c31835ca43f3de7d4ee4d48f2573fbca6f955eea625ed4260fda424beccaf9f218a30197486e215fd8160c2dc57ad58a35f063edf3147492abee9211592e71db12baf74e2273c3b337b52fcf52f27346596e141e38d236c7cb222c52c4e0c2597ccd8241b09c0a3405ada9be6bde272a1cf850a698f8b7f0c20d28e144f902e895e5479db5cbfd1", 0x89}], 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80900, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000002c0)={0x0, 'veth1_vlan\x00', 0x1}, 0x18) r2 = gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f00000005c0)='/dev/snapshot\x00'}, 0x30) syz_open_procfs(r3, &(0x7f00000001c0)='net/ipv6_route\x00') r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) syz_open_procfs(0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380), 0x12) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r7, 0x660c) writev(0xffffffffffffffff, 0x0, 0x0) r8 = socket$netlink(0x10, 0x3, 0xc) writev(r8, &(0x7f0000000000)=[{&(0x7f0000000080)="39000000100003044026064ba478fc650000ff3f010e0000450001070000181419001a0015000a00040008000100000010b1932da4e9d44c46", 0x39}], 0x1) write$binfmt_elf64(r6, &(0x7f0000000480)=ANY=[@ANYRES16, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRESDEC, @ANYRES16=r0, @ANYPTR64], @ANYRES64=0x0, @ANYRESOCT=r0, @ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESOCT], @ANYRES64=r2], 0x39) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuacct.usage_sys\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, 0x0) close(r4) [ 1346.195247] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1346.257400] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1346.268021] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:35:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:35:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xfd00, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:35:11 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e92000006000300"/57, 0x39}], 0x1) 08:35:11 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e7b000006000300"/57, 0x39}], 0x1) 08:35:11 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x400000, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000240)=@int=0x1, 0x4) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000280)={'IDLETIMER\x00'}, &(0x7f0000000340)=0x1e) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)={0x1c, r4, 0xb, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}]}, 0x1c}}, 0x0) sendmsg$TIPC_NL_NET_SET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYRESHEX=r1, @ANYRESOCT, @ANYPTR64], 0x3}}, 0x20044c91) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000180)={0x8, {{0x2, 0x0, @multicast1}}}, 0x88) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) socket(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="5500000018007f5f00fe01b2a4a280930206000100000001020b00000a0007003500280014000000090005407f", 0x3f2}], 0x1}, 0x0) write$binfmt_misc(r8, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r7, 0x0, r9, 0x0, 0x4ffe2, 0x0) r10 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r11, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r10, 0x2405, r11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r10, 0x2405, r11) ioctl$FIGETBSZ(r10, 0x2, &(0x7f0000000000)) [ 1347.712214] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 1347.720638] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 1347.728551] selinux_nlmsg_perm: 5 callbacks suppressed [ 1347.728569] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25386 comm=syz-executor.5 [ 1347.747184] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25386 comm=syz-executor.5 [ 1347.770694] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25386 comm=syz-executor.5 [ 1347.797579] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25386 comm=syz-executor.5 [ 1347.849853] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25386 comm=syz-executor.5 [ 1347.870886] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25386 comm=syz-executor.5 [ 1347.890618] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25386 comm=syz-executor.5 [ 1347.922242] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25386 comm=syz-executor.5 [ 1347.950769] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25386 comm=syz-executor.5 [ 1347.970630] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25386 comm=syz-executor.5 [ 1348.379521] IPVS: ftp: loaded support on port[0] = 21 [ 1348.713856] chnl_net:caif_netlink_parms(): no params data found [ 1348.865608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1348.872478] bridge0: port 1(bridge_slave_0) entered disabled state [ 1348.879722] device bridge_slave_0 entered promiscuous mode [ 1348.887139] bridge0: port 2(bridge_slave_1) entered blocking state [ 1348.893622] bridge0: port 2(bridge_slave_1) entered disabled state [ 1348.901085] device bridge_slave_1 entered promiscuous mode [ 1349.036112] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1349.045938] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1349.066066] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1349.072989] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1349.081141] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1349.087854] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1349.098063] device bridge_slave_1 left promiscuous mode [ 1349.103775] bridge0: port 2(bridge_slave_1) entered disabled state [ 1349.163453] device veth1_macvtap left promiscuous mode [ 1349.168781] device veth0_macvtap left promiscuous mode [ 1349.174293] device veth1_vlan left promiscuous mode [ 1349.179370] device veth0_vlan left promiscuous mode [ 1354.876424] device hsr_slave_1 left promiscuous mode [ 1354.925861] device hsr_slave_0 left promiscuous mode [ 1354.991792] team0 (unregistering): Port device team_slave_1 removed [ 1355.003445] team0 (unregistering): Port device team_slave_0 removed [ 1355.015135] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1355.066411] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1355.150942] bond0 (unregistering): Released all slaves [ 1355.217183] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1355.224615] team0: Port device team_slave_0 added [ 1355.233118] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1355.240752] team0: Port device team_slave_1 added [ 1355.255897] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1355.263568] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1355.289118] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1355.302889] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1355.309157] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1355.334716] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1355.346333] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1355.354090] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1355.424661] device hsr_slave_0 entered promiscuous mode [ 1355.460585] device hsr_slave_1 entered promiscuous mode [ 1355.501131] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1355.508559] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1355.533165] kauditd_printk_skb: 60 callbacks suppressed [ 1355.533179] audit: type=1400 audit(1579509319.663:5036): avc: denied { map } for pid=25395 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1355.662431] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1355.710648] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1355.720673] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1355.732235] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1355.739040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1355.747278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1355.758664] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1355.767578] 8021q: adding VLAN 0 to HW filter on device team0 [ 1355.791174] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1355.798308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1355.814432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1355.826344] bridge0: port 1(bridge_slave_0) entered blocking state [ 1355.832865] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1355.853347] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1355.861266] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1355.868551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1355.877447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1355.885861] bridge0: port 2(bridge_slave_1) entered blocking state [ 1355.892275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1355.911412] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1355.930794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1355.946888] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1355.955367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1355.974804] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1355.990028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1355.999128] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1356.025987] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1356.039697] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1356.049073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1356.061309] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1356.078878] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1356.089199] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1356.107788] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1356.115521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1356.131637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1356.139507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1356.169526] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1356.183269] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1356.189647] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1356.204950] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1356.221084] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1356.319037] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1356.339468] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1356.350468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1356.359210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1356.476378] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1356.486144] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1356.499170] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1356.518790] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1356.527531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1356.543946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1356.559339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1356.568779] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1356.577391] device veth0_vlan entered promiscuous mode [ 1356.598354] device veth1_vlan entered promiscuous mode [ 1356.606643] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1356.625322] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1356.642709] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1356.654415] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1356.661456] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1356.668803] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1356.677154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1356.685177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1356.696361] device veth0_macvtap entered promiscuous mode [ 1356.703086] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1356.713151] device veth1_macvtap entered promiscuous mode [ 1356.722721] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1356.733549] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1356.745179] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1356.755583] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1356.766038] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1356.776043] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1356.786272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1356.795801] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1356.805992] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1356.816320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1356.826707] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1356.836666] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1356.847297] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1356.856500] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1356.866395] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1356.876829] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1356.884126] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1356.892356] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1356.899901] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1356.908227] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1356.916891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1356.929385] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1356.940524] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1356.949772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1356.960984] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1356.970814] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1356.981150] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1356.990691] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1357.001356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1357.011365] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1357.021354] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1357.030715] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1357.040551] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1357.052050] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1357.059577] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1357.067755] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1357.075677] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1357.123148] audit: type=1400 audit(1579509321.253:5037): avc: denied { map } for pid=25408 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1357.157025] audit: type=1400 audit(1579509321.273:5038): avc: denied { map } for pid=25408 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1357.185832] nla_parse: 6 callbacks suppressed [ 1357.185841] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 08:35:21 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e7c000006000300"/57, 0x39}], 0x1) 08:35:21 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e93000006000300"/57, 0x39}], 0x1) 08:35:21 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:35:21 executing program 1: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000680)=@sco, 0x80, &(0x7f0000000400)=[{&(0x7f0000000bc0)="babf1ba9496ece259c6f6e79c717850e8bf67670c2baf37041f51a45e09d641e03b55de0c1977368a0a670e29ab99825576139dd90cb92673011fc44428468f4a83fa2e0ba9ccbf9660f4e405f3b46c62a6512f781f2d82b84fa0dc21e11d8c242446464eee1e413c2027c4e1df7366594184fa25bd8b36915d19d95c553c0258814babf24029d266358fbc3250d947a23446ad29d57b8f6a1d701219359a11117d485ffa79e47d509f441c7dee64101271b1d817253502332e3a8ea9ae36225b2c168b62d476b307a5b8a48798c4569f9870b2dafc7013e5f774025a85a2c391e717017f893f8c13fb712a74587d6add9469d", 0xf3}, {&(0x7f0000000ec0)="a87466277a0c7be86cb49b2b02c79350d69e3414767f087d02739afaa27b11f3f5e32fe686f4a88381620b534d0e8bca38221c133552", 0x36}], 0x2}, 0x40004) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r2, 0x0, 0xf800000000000000) r3 = perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0xd, r2, 0x1) socket$kcm(0x29, 0xa, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x40, 0xccd, 0x0, 0x3, 0x0, 0x1f, 0x5f7984277df46f7b, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x1, 0x6, 0x3}, r4, 0xe, r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r4, r1, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) ioctl$TUNSETFILTEREBPF(r0, 0x6611, 0x0) r5 = gettid() r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0xfb, 0x0, 0x1, 0x0, 0x1, 0x100, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000180), 0x9}, 0x200, 0x0, 0x1, 0x9, 0x8000, 0x8000, 0x20}, r5, 0xe, r6, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r5, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x4, 0x0, 0x4, 0x39, 0x0, 0x0, 0x2100, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x9ae, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x40, 0x40, 0x8, 0x8, 0x6, 0x6cec, 0x3b}, r5, 0xc, r0, 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc020660b, &(0x7f00000001c0)=0xffffffff000) write$cgroup_subtree(r8, &(0x7f0000000a40)=ANY=[@ANYBLOB="00a18255f288afabbf191be3565ba1692572e903338efa2d0616342342ec86f4c8a403ad3b3da1a3347986ac34c82ad2b4f4139958a9b714bbbf96a574c6edbdf616d4e9d8162a9e5ade4a06e160497063a14ff869b2de51830aa832ae8ea67392badb7e3702ca3b4d8fff591c48dfeed1f824c3561fb8cd8704ecb659fb0307000000000000009c57084f3e5ae8120ae1ddeaa48bd13edc5ecebbcb38fa44b9bc7d47430276d0a0463c191196eccf301a8c7ea2539e45943207bfcada5e520df2cbd16184e74d274262e44eb81ddf4c8deac424188dd57d3c0457f0cf859638a9d9d39e1059c1bda237b147c1031ae00000"], 0xf2) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r9, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) openat$cgroup_ro(r9, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) 08:35:21 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x29cb5a25, &(0x7f0000000340), 0x0, 0x0, 0xffbe}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x0, 0x81, 0x35, &(0x7f00000000c0)="c3084b470802f553b6508c2452165ab30ebb50c88dab996ea143ffb3ea12c736b4d962656b88c289968fe8bb9f97323a9c08edfe400fdcfabd453e8c0f487da63737cfc3139364d459c04c82bdd51ed9feec97da58d98385639b208b1efc8a1cfa799c660a668cf701c95947866b2175b4870000eb8ca6fe8c8a514b328e2d128e", &(0x7f0000000000)=""/53, 0x80000000, 0x0, 0x98, 0xea, &(0x7f0000000180)="5eb710babf2af54bd509f8d5c13d9d194f90ee3d4ac92fd70879f65c7dd5f41d2cc4828c38da3ee2a16d233f5f6cd8bdf4d60958dd78532ff3813eb3f8bc00d57fa37f32b0e59b8731ff5580799fc9682397900fe3810231b4564e1af96b9599a83521eb1b11f528bdf90c9e62c1e8499c40d96670c95868aaeba0bd9659fed7bb32d9782417d988cfd1ad83e67c06df06edeee33715daf8", &(0x7f0000000280)="f39e1e591aa1f440ef5364c79b5471ee271fa3e939736a7471355cdba67ae391d3af8ef87e4bc60b50101993ff334c9d25f0d312ad08b91bf08bb6ed0c946f91c1ff15e6fa31c9427a2278a7acf3c4bcf86752c015932823dad32ad9921ef3762da28180c50b3a7aa6835b96a621586e7874bc392a42d81ad3e532563978dc3fa7fc7a3695322f32ea507124e059297fc6af48e35c17cedcbfa3761c77b62401282906eeaa1f71bbb75a18eb5ad08a47e517f31d2fbd4f3849ae135dd1967ecae38334452ca51d0f99e2c5f8d4507b623cf9ef67068e1ec082b6260486f7e210e77ee8d1eacab469bba0"}, 0x40) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa20c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x400000000800}, 0x0, 0x5, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x220202) r9 = socket$inet(0x2, 0x4000000805, 0x0) r10 = socket$inet_sctp(0x2, 0x5, 0x84) r11 = dup3(r9, r10, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r11, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r10, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r11, 0x84, 0x7a, &(0x7f000059aff8)={r12}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000180)={r12, 0x9, 0x1000}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r8, 0x84, 0x1b, &(0x7f00000002c0)={r12, 0xcf, "86b42aea21e97688ab7189b77feae42ec2f12db203a2c9154252dd217b8a09d1d979832c250828e5d3f137259fcb7b8683e9003a1cd7d22d5565ec86abdffe6ec2b0533ce660783f7dd90a02d46fd6449ef662cc9a114da6f9dafa1e14ba4141be89e0cb55e8b490c2ef0733fc68a9928f7ad4dc79c8fc7c1b6e79064b62c44078918e9ff32c4f8c278146e2c1cf97a4622be84ab811a90c076d30bcf40dc86ac26882576997fdd7d761e14043443523ca082776451cd17bda7aba461bec66c90009665f09876848aeb7e8c602e0dd"}, &(0x7f00000003c0)=0xd7) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r6, 0x84, 0x78, &(0x7f00000003c0)=r12, 0x4) write(r5, &(0x7f00000000c0), 0x0) syz_open_dev$vbi(0x0, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$VIDIOC_G_PRIORITY(0xffffffffffffffff, 0x80045643, 0x4) 08:35:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xfe00, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) [ 1357.476297] audit: type=1400 audit(1579509321.603:5039): avc: denied { create } for pid=25415 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1357.537293] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:35:21 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e94000006000300"/57, 0x39}], 0x1) [ 1357.568671] audit: type=1400 audit(1579509321.653:5040): avc: denied { create } for pid=25417 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1357.618105] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:35:21 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e7d000006000300"/57, 0x39}], 0x1) [ 1357.736392] audit: type=1400 audit(1579509321.663:5041): avc: denied { write } for pid=25417 comm="syz-executor.0" path="socket:[103785]" dev="sockfs" ino=103785 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:35:21 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r2, &(0x7f0000000900)={0x2c, 0x2}, 0xd) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000300), 0x12) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/nullb0\x00', 0x40400, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000001400), 0x0) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) io_setup(0x0, &(0x7f0000000280)) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockname$packet(r8, &(0x7f0000001540)={0x11, 0x0, 0x0}, &(0x7f0000001480)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r6, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(0xffffffffffffffff, &(0x7f0000000900)={0x2c, 0x1, r9}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', r9}) syz_open_dev$usbmon(0x0, 0x0, 0x0) r10 = semget(0x1, 0x0, 0x104) semctl$IPC_SET(r10, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, 0x0, 0xffffffffffffffff}}) 08:35:22 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = socket$kcm(0x2, 0x1, 0x84) close(r4) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='cgroup.controllers\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r5, 0xb) setsockopt$sock_attach_bpf(r4, 0x10d, 0xb, &(0x7f0000000000)=r5, 0x4) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r6, 0xc0, &(0x7f000000acc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ab80)=0x1, 0x0, 0x0, 0x0, &(0x7f000000abc0)={0x106, 0x2}, 0x0, 0x0, &(0x7f0000000500)={0x1, 0x20d, 0x7ff, 0xffffffff}, &(0x7f000000ac40)=0x80000007, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac80)=0x4}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xb8, &(0x7f0000001440)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xfffffffe}, 0x10, r8}, 0xfffffd50) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000059000000000000000000040018110000", @ANYRES32=r0], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x7, r2, 0x8, &(0x7f0000000400)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xa, 0xff, 0x400}, 0x10, r8}, 0x78) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r10 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r10, 0x1, 0x3e, &(0x7f00000002c0)=r9, 0x161) openat$cgroup(r9, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, 0x0, 0x200002, 0x0) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) sendmsg$kcm(r11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r12 = socket$kcm(0xa, 0x6, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r12, 0x8936, 0x0) r13 = socket$kcm(0xa, 0x6, 0x0) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x441, 0x0) ioctl$TUNSETNOCSUM(r14, 0x400454c8, 0x0) setsockopt$sock_attach_bpf(r13, 0x10d, 0xb, &(0x7f0000000000), 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000), 0x4) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r15, &(0x7f0000000000), 0x10000000c) ioctl$TUNSETFILTEREBPF(r15, 0x6609, 0x0) [ 1357.919024] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1357.962304] audit: type=1400 audit(1579509321.673:5043): avc: denied { map } for pid=25419 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1357.995970] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1358.066379] audit: type=1400 audit(1579509321.673:5042): avc: denied { create } for pid=25420 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1358.142495] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:35:22 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e95000006000300"/57, 0x39}], 0x1) [ 1358.201467] audit: type=1400 audit(1579509321.703:5044): avc: denied { write } for pid=25420 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1358.275713] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:35:22 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e7e000006000300"/57, 0x39}], 0x1) [ 1358.336470] audit: type=1400 audit(1579509321.733:5045): avc: denied { create } for pid=25417 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:35:22 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e96000006000300"/57, 0x39}], 0x1) [ 1358.525584] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1358.579661] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1358.590653] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:35:22 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e82000006000300"/57, 0x39}], 0x1) [ 1360.545713] kauditd_printk_skb: 44 callbacks suppressed [ 1360.545728] audit: type=1400 audit(1579509324.673:5090): avc: denied { map } for pid=25478 comm="syz-executor.2" path="/root/syz-executor.2" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1360.610487] audit: type=1400 audit(1579509324.683:5091): avc: denied { map } for pid=25478 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=456 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1360.705217] IPVS: ftp: loaded support on port[0] = 21 [ 1360.997886] chnl_net:caif_netlink_parms(): no params data found [ 1361.027720] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1361.036363] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1361.046740] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1361.053865] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1361.063374] device bridge_slave_1 left promiscuous mode [ 1361.068995] bridge0: port 2(bridge_slave_1) entered disabled state [ 1361.111312] device bridge_slave_0 left promiscuous mode [ 1361.116797] bridge0: port 1(bridge_slave_0) entered disabled state [ 1361.164977] device veth1_macvtap left promiscuous mode [ 1361.170427] device veth0_macvtap left promiscuous mode [ 1361.175740] device veth1_vlan left promiscuous mode [ 1361.180887] device veth0_vlan left promiscuous mode [ 1366.764279] device hsr_slave_1 left promiscuous mode [ 1366.804350] device hsr_slave_0 left promiscuous mode [ 1366.849589] team0 (unregistering): Port device team_slave_1 removed [ 1366.859965] team0 (unregistering): Port device team_slave_0 removed [ 1366.870731] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1366.903780] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1366.976877] bond0 (unregistering): Released all slaves [ 1367.026792] bridge0: port 1(bridge_slave_0) entered blocking state [ 1367.033755] bridge0: port 1(bridge_slave_0) entered disabled state [ 1367.041478] device bridge_slave_0 entered promiscuous mode [ 1367.048561] bridge0: port 2(bridge_slave_1) entered blocking state [ 1367.055115] bridge0: port 2(bridge_slave_1) entered disabled state [ 1367.062545] device bridge_slave_1 entered promiscuous mode [ 1367.083693] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1367.096315] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1367.113385] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1367.121833] team0: Port device team_slave_0 added [ 1367.127586] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1367.135106] team0: Port device team_slave_1 added [ 1367.152799] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1367.159516] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1367.184909] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1367.196982] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1367.203399] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1367.229690] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1367.244009] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1367.252513] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1367.293307] device hsr_slave_0 entered promiscuous mode [ 1367.330716] device hsr_slave_1 entered promiscuous mode [ 1367.381494] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1367.421012] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1367.437710] audit: type=1400 audit(1579509331.563:5092): avc: denied { map } for pid=25481 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1367.539810] bridge0: port 2(bridge_slave_1) entered blocking state [ 1367.546647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1367.597772] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1367.604728] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1367.615605] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1367.627393] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1367.634246] bridge0: port 2(bridge_slave_1) entered disabled state [ 1367.643136] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1367.652688] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1367.659916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1367.671561] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1367.677990] 8021q: adding VLAN 0 to HW filter on device team0 [ 1367.689518] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1367.697591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1367.706806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1367.716748] bridge0: port 1(bridge_slave_0) entered blocking state [ 1367.723221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1367.752383] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1367.762504] bridge0: port 2(bridge_slave_1) entered blocking state [ 1367.768885] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1367.797739] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1367.808971] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1367.833151] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1367.843828] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1367.855774] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1367.863266] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1367.871394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1367.879259] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1367.895538] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1367.902620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1367.912041] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1367.921307] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1367.928137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1367.940044] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1367.964939] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1367.978583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1368.078106] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1368.094213] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1368.107275] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1368.121690] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1368.128358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1368.145088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1368.160943] device veth0_vlan entered promiscuous mode [ 1368.178208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1368.186210] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1368.204305] device veth1_vlan entered promiscuous mode [ 1368.217504] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1368.237252] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1368.265876] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1368.284705] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1368.298138] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1368.309175] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1368.335186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1368.347411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1368.362833] device veth0_macvtap entered promiscuous mode [ 1368.369462] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1368.388594] device veth1_macvtap entered promiscuous mode [ 1368.398994] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1368.409772] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1368.427175] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1368.440160] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1368.457478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1368.471438] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1368.484749] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1368.494252] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1368.504313] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1368.513825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1368.524094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1368.533492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1368.543403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1368.552645] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1368.562743] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1368.573343] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1368.581838] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1368.588984] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1368.597104] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1368.604582] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1368.612556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1368.622912] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1368.633192] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1368.644085] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1368.653940] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1368.663269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1368.674987] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1368.684164] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1368.694155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1368.703750] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1368.713578] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1368.723240] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1368.734524] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1368.744950] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1368.752101] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1368.759046] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1368.767879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1368.828940] audit: type=1400 audit(1579509332.953:5093): avc: denied { map } for pid=25488 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1368.890113] audit: type=1400 audit(1579509333.013:5094): avc: denied { map_create } for pid=25489 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1368.928859] device bridge_slave_0 left promiscuous mode [ 1368.938275] bridge0: port 1(bridge_slave_0) entered disabled state 08:35:33 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:35:33 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e97000006000300"/57, 0x39}], 0x1) 08:35:33 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e83000006000300"/57, 0x39}], 0x1) 08:35:33 executing program 1: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e95000006000300"/57, 0x39}], 0x1) 08:35:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xff00, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:35:33 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_RESET(r2, 0x5000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000000019, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffd73, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r3, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2000) ioctl$SIOCGSTAMP(r3, 0x8906, &(0x7f0000000040)) write$FUSE_NOTIFY_DELETE(r1, &(0x7f00000000c0)={0x29, 0x6, 0x0, {0x2, 0x5}}, 0x29) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0xe], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r5}) socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r3, 0x0, 0x0, 0x20) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) [ 1369.074089] audit: type=1400 audit(1579509333.203:5096): avc: denied { create } for pid=25494 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1369.092992] nla_parse: 3 callbacks suppressed [ 1369.093019] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1369.102871] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1369.115351] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1369.148514] audit: type=1400 audit(1579509333.193:5095): avc: denied { create } for pid=25493 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:35:33 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e98000006000300"/57, 0x39}], 0x1) [ 1369.226616] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1369.295509] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1369.306533] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:35:33 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e84000006000300"/57, 0x39}], 0x1) [ 1369.395620] audit: type=1400 audit(1579509333.213:5097): avc: denied { write } for pid=25493 comm="syz-executor.3" path="socket:[104101]" dev="sockfs" ino=104101 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:35:33 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e99000006000300"/57, 0x39}], 0x1) 08:35:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) fcntl$getown(0xffffffffffffffff, 0x9) open(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x90022, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r8, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r8) r9 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r10, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r10) ioctl$FITRIM(r2, 0xc0185879, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) r11 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r11, 0x4c03, &(0x7f0000000180)) r12 = memfd_create(&(0x7f0000000140)='&ppp0\x00', 0x0) getdents64(r12, &(0x7f00000027c0)=""/4096, 0x1000) fchmod(0xffffffffffffffff, 0x800000100000024) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) [ 1369.599230] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1369.639333] audit: type=1400 audit(1579509333.253:5098): avc: denied { write } for pid=25494 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1369.706104] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1369.734575] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1369.792573] audit: type=1400 audit(1579509333.263:5099): avc: denied { create } for pid=25492 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:35:33 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e85000006000300"/57, 0x39}], 0x1) 08:35:34 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e9a000006000300"/57, 0x39}], 0x1) [ 1369.862916] audit: type=1400 audit(1579509333.293:5100): avc: denied { map } for pid=25504 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1370.036552] audit: type=1400 audit(1579509333.323:5101): avc: denied { write } for pid=25492 comm="syz-executor.1" path="socket:[104104]" dev="sockfs" ino=104104 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1370.079108] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:35:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:35:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xff0f, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:35:34 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) lseek(r0, 0xfffffffffffffff8, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = inotify_init() r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_POLICY={0x8}]}], {0x14}}, 0x6c}}, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r5, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r4, 0x0, r6, 0x0, 0x4ffe1, 0x0) 08:35:34 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e86000006000300"/57, 0x39}], 0x1) 08:35:34 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e9b000006000300"/57, 0x39}], 0x1) 08:35:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32], 0x2}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:35:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) fcntl$getown(0xffffffffffffffff, 0x9) open(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x90022, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r8, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r8) r9 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r10, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r10) ioctl$FITRIM(r2, 0xc0185879, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) r11 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r11, 0x4c03, &(0x7f0000000180)) r12 = memfd_create(&(0x7f0000000140)='&ppp0\x00', 0x0) getdents64(r12, &(0x7f00000027c0)=""/4096, 0x1000) fchmod(0xffffffffffffffff, 0x800000100000024) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 08:35:34 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e87000006000300"/57, 0x39}], 0x1) 08:35:34 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e9c000006000300"/57, 0x39}], 0x1) 08:35:35 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e88000006000300"/57, 0x39}], 0x1) 08:35:35 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e9d000006000300"/57, 0x39}], 0x1) 08:35:35 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e9e000006000300"/57, 0x39}], 0x1) 08:35:35 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e89000006000300"/57, 0x39}], 0x1) 08:35:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0x7539c999, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:35:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) fcntl$getown(0xffffffffffffffff, 0x9) open(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x90022, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r8, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r8) r9 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r10, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r10) ioctl$FITRIM(r2, 0xc0185879, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) r11 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r11, 0x4c03, &(0x7f0000000180)) r12 = memfd_create(&(0x7f0000000140)='&ppp0\x00', 0x0) getdents64(r12, &(0x7f00000027c0)=""/4096, 0x1000) fchmod(0xffffffffffffffff, 0x800000100000024) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 08:35:36 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e8a000006000300"/57, 0x39}], 0x1) 08:35:36 executing program 1: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) r3 = socket$inet(0x2, 0x3, 0x29) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1010005}, 0xc, &(0x7f0000000200)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="68000000840bbd88c38c25121d159981d3e36afe376f483bb4775742eb78a9b4aa0100dc448d4b17d190885156157e100e65c791a40d4789dbd2b81cf042a457af81c7eec447e323e45e3b09b20050b38c36bf6fb7fdf215410eb9078cc708e235bd1ed18695e9e5dc000007a66a000000e16cc239ca24be908646e8000000fdb35b4cae64cf9077543a05871f483b289f88ad8726eb968e472b71fe07273db12d5cf9b6f6e5846aac6435d5a1e87bc77f87e96cd1000047a0aa400ada9407cadb301dd609318ee17e65ee7d030f0246cdda08cde1b595b749416def3a54e9804d58a1ace0c31ad30b81d50d0e0d6b8976929df7f0361b437f3c4c93fb1322dee9fe898a1736a22631ae034e2b7142cf0c5d4d5dede3bb6b4e808355bb4c6b3acff71a33ae417402a609de04aeaf4ae83cad2c46d2d861b01db6569c047f847d97ae87545019b87c1b0c7d7d1ca557a8939249085cf1f9e8e2cc89ce21fbe1659cb464f9b1434cbd4d9dd40a1855dfcc05879122689f2ed73a7dc88f5c3733ee5055c4ec96b161659fffad0801779639199942db54fbe6ae43d39a04dcfbe5dd6db2a9a410ae50a62f18870bae", @ANYRES16=r6, @ANYBLOB="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"], 0x68}, 0x1, 0x0, 0x0, 0x20008000}, 0x8000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x30, r6, 0x300, 0x70bd27, 0x25dfdbfc, {{}, {}, {0x14, 0x18, {0x1000, @bearer=@l2={'ib', 0x3a, 'bridge0\x00'}}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000844}, 0x4000810) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1372.453376] kauditd_printk_skb: 96 callbacks suppressed [ 1372.453390] audit: type=1400 audit(1579509336.583:5198): avc: denied { map } for pid=25620 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1372.568766] audit: type=1400 audit(1579509336.693:5199): avc: denied { map } for pid=25621 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1372.814388] audit: type=1400 audit(1579509336.943:5200): avc: denied { create } for pid=25609 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1372.899086] audit: type=1400 audit(1579509337.023:5201): avc: denied { map } for pid=25622 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1373.633132] audit: type=1400 audit(1579509337.763:5202): avc: denied { map } for pid=25623 comm="syz-executor.2" path="/root/syz-executor.2" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1373.668005] audit: type=1400 audit(1579509337.793:5203): avc: denied { map } for pid=25623 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=456 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1373.853339] IPVS: ftp: loaded support on port[0] = 21 [ 1374.035993] chnl_net:caif_netlink_parms(): no params data found [ 1374.048100] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1374.055583] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1374.064643] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1374.071559] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1374.079500] device bridge_slave_1 left promiscuous mode [ 1374.085332] bridge0: port 2(bridge_slave_1) entered disabled state [ 1374.133334] device veth1_macvtap left promiscuous mode [ 1374.139174] device veth0_macvtap left promiscuous mode [ 1374.144640] device veth1_vlan left promiscuous mode [ 1374.149830] device veth0_vlan left promiscuous mode [ 1379.703861] device hsr_slave_1 left promiscuous mode [ 1379.743561] device hsr_slave_0 left promiscuous mode [ 1379.789352] team0 (unregistering): Port device team_slave_1 removed [ 1379.843666] team0 (unregistering): Port device team_slave_0 removed [ 1379.857679] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1379.916082] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1379.980864] bond0 (unregistering): Released all slaves [ 1380.042823] bridge0: port 1(bridge_slave_0) entered blocking state [ 1380.051608] bridge0: port 1(bridge_slave_0) entered disabled state [ 1380.058608] device bridge_slave_0 entered promiscuous mode [ 1380.066574] bridge0: port 2(bridge_slave_1) entered blocking state [ 1380.073313] bridge0: port 2(bridge_slave_1) entered disabled state [ 1380.080431] device bridge_slave_1 entered promiscuous mode [ 1380.098033] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1380.107403] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1380.125977] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1380.133729] team0: Port device team_slave_0 added [ 1380.139627] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1380.147359] team0: Port device team_slave_1 added [ 1380.165368] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1380.171863] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1380.197246] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1380.208631] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1380.214987] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1380.240375] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1380.252484] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1380.260638] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1380.363386] device hsr_slave_0 entered promiscuous mode [ 1380.420699] device hsr_slave_1 entered promiscuous mode [ 1380.482296] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1380.489647] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1380.516655] audit: type=1400 audit(1579509344.643:5204): avc: denied { map } for pid=25626 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1380.594102] bridge0: port 2(bridge_slave_1) entered blocking state [ 1380.600549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1380.607294] bridge0: port 1(bridge_slave_0) entered blocking state [ 1380.613863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1380.687517] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1380.700817] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1380.710741] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1380.721482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1380.729626] bridge0: port 1(bridge_slave_0) entered disabled state [ 1380.744174] bridge0: port 2(bridge_slave_1) entered disabled state [ 1380.756342] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1380.772453] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1380.778676] 8021q: adding VLAN 0 to HW filter on device team0 [ 1380.791719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1380.799443] bridge0: port 1(bridge_slave_0) entered blocking state [ 1380.805887] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1380.820758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1380.828745] bridge0: port 2(bridge_slave_1) entered blocking state [ 1380.835793] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1380.861897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1380.870066] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1380.892287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1380.901636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1380.909286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1380.918488] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1380.925966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1380.944510] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1380.952938] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1380.959732] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1380.975357] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1380.997314] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1381.016925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1381.124525] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1381.133653] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1381.141262] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1381.161378] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1381.168117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1381.176365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1381.186181] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1381.198600] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1381.209173] device veth0_vlan entered promiscuous mode [ 1381.223086] device veth1_vlan entered promiscuous mode [ 1381.229086] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1381.239952] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1381.257909] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1381.268972] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1381.276770] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1381.296274] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1381.304497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1381.312831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1381.323555] device veth0_macvtap entered promiscuous mode [ 1381.329703] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1381.338775] device veth1_macvtap entered promiscuous mode [ 1381.345310] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1381.356258] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1381.367973] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1381.378600] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1381.388815] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1381.398427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1381.408576] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1381.424984] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1381.437614] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1381.456126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1381.466612] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1381.476081] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1381.485846] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1381.495099] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1381.504929] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1381.515170] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1381.522442] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1381.529596] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1381.537579] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1381.544974] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1381.553328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1381.563602] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1381.573915] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1381.583554] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1381.594483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1381.604978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1381.615465] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1381.624658] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1381.635243] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1381.644431] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1381.654281] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1381.663482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1381.673279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1381.684390] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1381.691648] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1381.699014] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1381.707952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1381.756541] audit: type=1400 audit(1579509345.883:5205): avc: denied { map } for pid=25633 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1381.825990] audit: type=1400 audit(1579509345.933:5206): avc: denied { map_create } for pid=25634 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1381.885639] device bridge_slave_0 left promiscuous mode [ 1381.895234] bridge0: port 1(bridge_slave_0) entered disabled state 08:35:46 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32], 0x2}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:35:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0x7539c99f, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:35:46 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e9f000006000300"/57, 0x39}], 0x1) 08:35:46 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e8b000006000300"/57, 0x39}], 0x1) 08:35:46 executing program 1: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) r3 = socket$inet(0x2, 0x3, 0x29) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1010005}, 0xc, &(0x7f0000000200)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES16=r6, @ANYBLOB="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"], 0x68}, 0x1, 0x0, 0x0, 0x20008000}, 0x8000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x30, r6, 0x300, 0x70bd27, 0x25dfdbfc, {{}, {}, {0x14, 0x18, {0x1000, @bearer=@l2={'ib', 0x3a, 'bridge0\x00'}}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000844}, 0x4000810) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 08:35:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000013c0)={0x990000, 0xfff, 0x10001, r1, 0x0, &(0x7f0000001380)={0x9909e0, 0x5, [], @p_u16=&(0x7f0000000040)=0x3}}) r4 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r5) newfstatat(0xffffffffffffff9c, &(0x7f0000001400)='./file0\x00', &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) write$FUSE_ENTRY(r3, &(0x7f00000014c0)={0x90, 0x0, 0x6, {0x3, 0x3, 0x4, 0xfffffffffffffffc, 0xad5, 0xd35, {0x1, 0x4fc, 0x2ed, 0x8, 0x1, 0x7, 0xfff, 0x5, 0x8, 0x1, 0xc7a, r5, r6, 0x214, 0x817}}}, 0x90) r7 = dup(r0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000001600)=@isdn, 0x80, &(0x7f0000001940)=[{&(0x7f0000001880)=""/150, 0x96}, {&(0x7f0000001700)=""/30, 0x1e}, {&(0x7f0000002040)=""/4096, 0x1000}], 0x3, &(0x7f0000001980)=""/21, 0x15}, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$inet_sctp(r7, &(0x7f0000001340)={&(0x7f0000000000)=@in6={0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, [], 0xc}}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000040)}, {&(0x7f0000000080)="b7c9abb407a36ca106a6d8679ff7c5212dcf", 0x12}, {&(0x7f0000000240)="3c689e8130c60900f85fd142154d2b52fec965fb7733073d890f338b3b06c8a493e17fba15c616d4a22eeb19dc860df263d94a1907fad0083233eee544934d1f5ecceb2d7d477ee57b6dda0365970a7dc46520d3fe79639725a714259e53cb5d8ff99c327f4afdf0cded2e30ef45298a606792839bfdf5f3a62501ee5ca1f7ac6483963f9ce788d516c7e4028d208b388bfceade47d9ce5550039c8a7ddcdfb7fb317dbffe043daf7a2a5fc9349e1abf18516ca1ea3972368ea8ebea9606e43f61374a2125dff374c3e86ff50c8a46fae420dc311ee5117b9eea4307bf38fd8e8e2ea2ef960824d9f7912b80e789bc7d", 0xf0}, {&(0x7f0000003040)="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", 0x1000}], 0x4, &(0x7f0000000100)=[@dstaddrv6={0x20, 0x84, 0x8, @remote}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}, @authinfo={0x18, 0x84, 0x6, {0x8}}, @dstaddrv4={0x18, 0x84, 0x7, @local}], 0x68, 0x1}, 0xbb6a25bc63cad89b) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0xf, 0x0, &(0x7f0000002000)) r8 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) mq_timedsend(r8, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r8, &(0x7f0000000180)=""/130, 0x9a2733f6c2698b56, 0x20000180, 0x0) r9 = userfaultfd(0x0) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f00000015c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001680)={&(0x7f0000001740)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="08002508000000080006000600727c5a4d0d22043397d0cf64d700000c000200080008000500000044000200080006000800000008000800000000000800f3ff0800000005000d0000000000060002004e2100002800060001000000060002004e20000008000400018000007e163a36371ae1edb4bd04fd1bc3402ef4b4eeca62d79e98288130ce7753e6a8656be871a09beae776a62c0b6f5c9d8ed25e10e6b3a138d2b1e1a289ab53ecd8df205e1f30167dfbaa75980b9a1e8d8178db896a5e3e8dfb61ce7cd026473ac8689bf97172864b18b99ed0808f99fffff74b3215fed3eaf0883d1c0eebddf13442cb1195d6c3fd0ab6c36a18d728cab0d0d3c43e48d2a1cabbab35a658b541997c3a617c0000"], 0x6c}, 0x1, 0x0, 0x0, 0x20008880}, 0x4004000) ioctl$UFFDIO_REGISTER(r9, 0xc020aa00, 0x0) ioctl$SNDCTL_DSP_SYNC(0xffffffffffffffff, 0x5001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$TIOCCONS(r12, 0x541d) [ 1382.022611] audit: type=1400 audit(1579509346.153:5207): avc: denied { create } for pid=25638 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1382.070030] nla_parse: 16 callbacks suppressed [ 1382.070040] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1382.076636] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1382.118066] audit: type=1400 audit(1579509346.173:5208): avc: denied { write } for pid=25639 comm="syz-executor.3" path="socket:[103174]" dev="sockfs" ino=103174 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1382.137137] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:35:46 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e8c000006000300"/57, 0x39}], 0x1) [ 1382.227435] audit: type=1400 audit(1579509346.213:5209): avc: denied { create } for pid=25637 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:35:46 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea0000006000300"/57, 0x39}], 0x1) [ 1382.357445] audit: type=1400 audit(1579509346.213:5210): avc: denied { write } for pid=25637 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:35:46 executing program 5: sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) write$P9_RREMOVE(r1, &(0x7f0000000000)={0x7}, 0x7) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="51d82eebed355631fb70de0622d41b5468b67ee8e59c2d3fc74053da842394b4647325d6345c635adaa9a9f035edc90e7af2ae3e8cbbf32065b7c0da4763779f51f7b29e5107f318cdb155f13bca885399b9d7c1ce7bdfb5b7a0b188"], 0x5c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000280), 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYPTR64=&(0x7f0000000400)=ANY=[]], 0x8) syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x401, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x7) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4000a1d1) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x8400, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @local}, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) r6 = open(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r6, 0x0) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r7, r6, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r8, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0xd}, 0x80000000}}, 0x1, 0x3, 0x6, 0x5, 0xa}, &(0x7f00000001c0)=0x98) sendmsg$TIPC_CMD_SET_LINK_PRI(r6, 0x0, 0x4000) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32=r12, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="aaf200000700"/19], 0x48}}, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[]}}, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r13, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="840000002c00015f00"/20, @ANYRES32=r12, @ANYBLOB="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"], 0x3}}, 0x0) [ 1382.512177] audit: type=1400 audit(1579509346.233:5211): avc: denied { map } for pid=25649 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1382.568704] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1382.572121] audit: type=1400 audit(1579509346.243:5212): avc: denied { create } for pid=25639 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1382.627594] audit: type=1400 audit(1579509346.243:5213): avc: denied { write } for pid=25639 comm="syz-executor.3" path="socket:[104519]" dev="sockfs" ino=104519 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:35:46 executing program 1: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) r3 = socket$inet(0x2, 0x3, 0x29) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1010005}, 0xc, &(0x7f0000000200)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES16=r6, @ANYBLOB="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"], 0x68}, 0x1, 0x0, 0x0, 0x20008000}, 0x8000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x30, r6, 0x300, 0x70bd27, 0x25dfdbfc, {{}, {}, {0x14, 0x18, {0x1000, @bearer=@l2={'ib', 0x3a, 'bridge0\x00'}}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000844}, 0x4000810) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1382.686387] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:35:46 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e8d000006000300"/57, 0x39}], 0x1) 08:35:46 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea1000006000300"/57, 0x39}], 0x1) [ 1382.903669] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1382.928640] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1383.057783] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:35:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32], 0x2}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:35:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0x7ffffff9, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:35:47 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea2000006000300"/57, 0x39}], 0x1) 08:35:47 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e8e000006000300"/57, 0x39}], 0x1) 08:35:47 executing program 5: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x1c8bf4ef94364938) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm_plock\x00', 0x301400, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000180)=0x2, 0xfffffffffffffdc9) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0x97}, @sack_perm], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r4, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="10000000e70046da8b95ab44000800000000"], 0x1}}, 0x4000) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r4) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r5, r5) ioctl$FICLONE(r2, 0x40049409, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1383.454753] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1383.466991] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:35:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=ANY=[@ANYBLOB="850000002200000004000000000000009500000000000000"], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4090, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff96}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x26, 0x0, &(0x7f0000001180)="f00000a7f8875a7613a5edb74305440fb3aa45d22c4c10c1e5b6d2c12938de6d76da5dba5d83", 0x0}, 0x28) r1 = getpid() sched_getaffinity(r1, 0x8, &(0x7f0000000040)) ioctl$void(r0, 0x5450) syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x4, 0x40) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc012002}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040010}, 0x25) keyctl$chown(0x4, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:35:47 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e8f000006000300"/57, 0x39}], 0x1) 08:35:47 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea3000006000300"/57, 0x39}], 0x1) 08:35:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32, @ANYBLOB], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:35:48 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e90000006000300"/57, 0x39}], 0x1) 08:35:48 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea4000006000300"/57, 0x39}], 0x1) 08:35:48 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e91000006000300"/57, 0x39}], 0x1) 08:35:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000380)=0x2) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) r5 = dup(r3) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x0, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x99dcbd4b00249585) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$RNDGETENTCNT(r13, 0x80045200, &(0x7f00000003c0)) r14 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10000400}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r15 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r15, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r14, 0x2405, r15) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r14, 0x2405, r15) ioctl$VIDIOC_DQBUF(r7, 0xc0585611, &(0x7f00000001c0)={0x401, 0x8, 0x4, 0x800, 0x820, {r8, r9/1000+30000}, {0x7, 0xc, 0x9, 0x7f, 0x90, 0x7, "3def70f6"}, 0x9, 0x2, @fd=r11, 0x1ff, 0x0, r14}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r17 = dup(r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) getsockopt$bt_BT_FLUSHABLE(r17, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000140)=0x4) write(r0, &(0x7f0000000040)="fc0000004900071f8a092504090007000aab80ffffff00000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e0004000000000000001720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f06f70cce190a60aa47e9883997f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64e00ccf19a494c8cf", 0xfc) 08:35:48 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea5000006000300"/57, 0x39}], 0x1) [ 1384.780711] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 08:35:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xffffff1f, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:35:48 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e92000006000300"/57, 0x39}], 0x1) 08:35:49 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x8, @ipv4={[], [], @broadcast}, 0x1}, 0x1c) listen(0xffffffffffffffff, 0x13) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x3, 0x0) ioctl$SIOCAX25GETINFO(r3, 0x89ed, &(0x7f0000000140)) sendmmsg$inet(r0, &(0x7f0000000700)=[{{&(0x7f00000001c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10, &(0x7f0000002640)=[{&(0x7f00000000c0)}], 0x1}}], 0x1, 0x0) 08:35:49 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea6000006000300"/57, 0x39}], 0x1) 08:35:49 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e93000006000300"/57, 0x39}], 0x1) 08:35:49 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e94000006000300"/57, 0x39}], 0x1) [ 1385.719724] kauditd_printk_skb: 100 callbacks suppressed [ 1385.719738] audit: type=1400 audit(1579509349.843:5314): avc: denied { create } for pid=25750 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1385.779565] audit: type=1400 audit(1579509349.883:5315): avc: denied { map } for pid=25772 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1385.836815] audit: type=1400 audit(1579509349.963:5316): avc: denied { map } for pid=25773 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1386.790141] audit: type=1400 audit(1579509350.913:5317): avc: denied { map } for pid=25774 comm="syz-executor.2" path="/root/syz-executor.2" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1386.822042] audit: type=1400 audit(1579509350.953:5318): avc: denied { map } for pid=25774 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=456 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1387.007750] IPVS: ftp: loaded support on port[0] = 21 [ 1387.200946] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1387.207989] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1387.215959] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1387.222774] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1387.232322] device bridge_slave_1 left promiscuous mode [ 1387.237817] bridge0: port 2(bridge_slave_1) entered disabled state [ 1387.293286] device veth1_macvtap left promiscuous mode [ 1387.298608] device veth0_macvtap left promiscuous mode [ 1387.304060] device veth1_vlan left promiscuous mode [ 1387.309216] device veth0_vlan left promiscuous mode [ 1392.774515] device hsr_slave_1 left promiscuous mode [ 1392.813477] device hsr_slave_0 left promiscuous mode [ 1392.859106] team0 (unregistering): Port device team_slave_1 removed [ 1392.871976] team0 (unregistering): Port device team_slave_0 removed [ 1392.882744] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1392.934501] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1393.010026] bond0 (unregistering): Released all slaves [ 1393.051721] chnl_net:caif_netlink_parms(): no params data found [ 1393.088921] bridge0: port 1(bridge_slave_0) entered blocking state [ 1393.095841] bridge0: port 1(bridge_slave_0) entered disabled state [ 1393.103914] device bridge_slave_0 entered promiscuous mode [ 1393.111663] bridge0: port 2(bridge_slave_1) entered blocking state [ 1393.118129] bridge0: port 2(bridge_slave_1) entered disabled state [ 1393.125949] device bridge_slave_1 entered promiscuous mode [ 1393.145032] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1393.156475] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1393.176508] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1393.184557] team0: Port device team_slave_0 added [ 1393.190309] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1393.198040] team0: Port device team_slave_1 added [ 1393.262062] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1393.268651] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1393.303358] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1393.324244] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1393.335586] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1393.371618] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1393.388475] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1393.398852] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1393.465286] device hsr_slave_0 entered promiscuous mode [ 1393.510737] device hsr_slave_1 entered promiscuous mode [ 1393.551245] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1393.559241] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1393.587465] audit: type=1400 audit(1579509357.713:5319): avc: denied { map } for pid=25777 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1393.669252] bridge0: port 2(bridge_slave_1) entered blocking state [ 1393.676155] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1393.683072] bridge0: port 1(bridge_slave_0) entered blocking state [ 1393.689480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1393.767545] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1393.781449] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1393.798360] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1393.808853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1393.819024] bridge0: port 1(bridge_slave_0) entered disabled state [ 1393.826413] bridge0: port 2(bridge_slave_1) entered disabled state [ 1393.838249] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1393.858386] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1393.865129] 8021q: adding VLAN 0 to HW filter on device team0 [ 1393.877086] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1393.885968] bridge0: port 1(bridge_slave_0) entered blocking state [ 1393.892384] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1393.918102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1393.935128] bridge0: port 2(bridge_slave_1) entered blocking state [ 1393.941759] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1393.973568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1393.982395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1393.997187] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1394.006903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1394.025049] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1394.038004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1394.047761] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1394.078248] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1394.093140] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1394.099478] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1394.118195] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1394.131289] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1394.150889] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1394.165034] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1394.181606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1394.191240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1394.239132] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1394.246923] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1394.254275] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1394.265520] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1394.273142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1394.281393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1394.291784] device veth0_vlan entered promiscuous mode [ 1394.301804] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1394.308911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1394.321340] device veth1_vlan entered promiscuous mode [ 1394.327910] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1394.339407] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1394.362549] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1394.381199] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1394.388136] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1394.396477] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1394.404152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1394.413324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1394.424307] device veth0_macvtap entered promiscuous mode [ 1394.431882] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1394.442153] device veth1_macvtap entered promiscuous mode [ 1394.448536] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1394.459367] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1394.472353] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1394.494716] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1394.505614] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.515472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1394.526182] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.535567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1394.545394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.554607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1394.564415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.573596] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1394.585604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.594785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1394.605141] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.615582] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1394.622867] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1394.629965] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1394.638052] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1394.645929] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1394.654700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1394.665871] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1394.676983] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.686742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1394.696837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.706333] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1394.717411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.727915] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1394.738263] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.747501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1394.757285] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.766508] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1394.776327] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.786547] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1394.793793] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1394.815715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1394.824008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1394.884122] audit: type=1400 audit(1579509359.013:5320): avc: denied { map } for pid=25784 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1394.937452] audit: type=1400 audit(1579509359.043:5321): avc: denied { map } for pid=25784 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1394.971872] audit: type=1400 audit(1579509359.063:5322): avc: denied { map_create } for pid=25785 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1395.006402] device bridge_slave_0 left promiscuous mode [ 1395.016458] bridge0: port 1(bridge_slave_0) entered disabled state 08:35:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32, @ANYBLOB], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:35:59 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x301802, 0x0) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x1, 0x3, 0x0, 0x0, 0x41c1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x8040, 0x0, 0x0, 0x0, 0x6b3}, 0x0, 0x10, r2, 0x8) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f00000000c0)=[@in={0x2, 0x0, @remote}]}, &(0x7f00000001c0)=0x10) socket(0x0, 0x0, 0x0) open(0x0, 0x21a200, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 08:35:59 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea7000006000300"/57, 0x39}], 0x1) 08:35:59 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e95000006000300"/57, 0x39}], 0x1) 08:35:59 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYRES64=0x0, @ANYRES32=r0, @ANYRESOCT=r4, @ANYBLOB="a67fae2537ab15576c7855bf58e275713e11ba75222b3f6179a2052942d2b83967f1c17028083fbd55a850efb15a3841cb449273db9752daed9d", @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=r6]], 0x5}}, 0x0) 08:35:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xffff88809fd0b498, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) [ 1395.142989] audit: type=1400 audit(1579509359.273:5323): avc: denied { create } for pid=25788 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1395.184143] nla_parse: 16 callbacks suppressed [ 1395.184193] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1395.186707] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1395.229146] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1395.244518] audit: type=1400 audit(1579509359.303:5325): avc: denied { create } for pid=25790 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1395.270008] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:35:59 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e96000006000300"/57, 0x39}], 0x1) 08:35:59 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea8000006000300"/57, 0x39}], 0x1) [ 1395.378932] audit: type=1400 audit(1579509359.313:5326): avc: denied { write } for pid=25790 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1395.485558] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1395.514490] audit: type=1400 audit(1579509359.303:5324): avc: denied { write } for pid=25789 comm="syz-executor.0" path="socket:[105626]" dev="sockfs" ino=105626 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:35:59 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e97000006000300"/57, 0x39}], 0x1) [ 1395.593744] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1395.616100] audit: type=1400 audit(1579509359.333:5327): avc: denied { map } for pid=25797 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1395.672619] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1395.757357] audit: type=1400 audit(1579509359.353:5328): avc: denied { read } for pid=25790 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1395.813627] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:36:00 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea9000006000300"/57, 0x39}], 0x1) [ 1395.859558] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:36:00 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e98000006000300"/57, 0x39}], 0x1) [ 1396.051286] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:36:00 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e99000006000300"/57, 0x39}], 0x1) 08:36:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32, @ANYBLOB], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) [ 1397.909146] IPVS: ftp: loaded support on port[0] = 21 [ 1398.094342] chnl_net:caif_netlink_parms(): no params data found [ 1398.238628] bridge0: port 1(bridge_slave_0) entered blocking state [ 1398.246763] bridge0: port 1(bridge_slave_0) entered disabled state [ 1398.254718] device bridge_slave_0 entered promiscuous mode [ 1398.265341] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1398.272166] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1398.280496] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1398.290312] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1398.298754] device bridge_slave_1 left promiscuous mode [ 1398.304729] bridge0: port 2(bridge_slave_1) entered disabled state [ 1398.361319] device bridge_slave_0 left promiscuous mode [ 1398.367194] bridge0: port 1(bridge_slave_0) entered disabled state [ 1398.404726] device veth1_macvtap left promiscuous mode [ 1398.410077] device veth0_macvtap left promiscuous mode [ 1398.415752] device veth1_vlan left promiscuous mode [ 1398.421175] device veth0_vlan left promiscuous mode [ 1404.096306] device hsr_slave_1 left promiscuous mode [ 1404.143827] device hsr_slave_0 left promiscuous mode [ 1404.189394] team0 (unregistering): Port device team_slave_1 removed [ 1404.203148] team0 (unregistering): Port device team_slave_0 removed [ 1404.214101] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1404.244909] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1404.313388] bond0 (unregistering): Released all slaves [ 1404.354644] bridge0: port 2(bridge_slave_1) entered blocking state [ 1404.361848] bridge0: port 2(bridge_slave_1) entered disabled state [ 1404.369419] device bridge_slave_1 entered promiscuous mode [ 1404.389359] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1404.398816] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1404.419030] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1404.428128] team0: Port device team_slave_0 added [ 1404.435078] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1404.446474] team0: Port device team_slave_1 added [ 1404.464598] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1404.471503] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1404.499914] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1404.512905] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1404.519186] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1404.544740] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1404.556468] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1404.564511] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1404.623237] device hsr_slave_0 entered promiscuous mode [ 1404.680714] device hsr_slave_1 entered promiscuous mode [ 1404.731565] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1404.771581] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1404.789787] kauditd_printk_skb: 33 callbacks suppressed [ 1404.789801] audit: type=1400 audit(1579509368.913:5362): avc: denied { map } for pid=25841 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1404.880748] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1404.930969] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1404.937229] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1404.948637] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1404.959358] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1404.967880] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1404.977472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1404.985377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1404.996284] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1405.003512] 8021q: adding VLAN 0 to HW filter on device team0 [ 1405.014353] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1405.022277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1405.031966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1405.039921] bridge0: port 1(bridge_slave_0) entered blocking state [ 1405.046387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1405.058088] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1405.066808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1405.075248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1405.084047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1405.092942] bridge0: port 2(bridge_slave_1) entered blocking state [ 1405.099596] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1405.121880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1405.131049] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1405.152822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1405.161998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1405.169662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1405.179576] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1405.187119] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1405.206959] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1405.215662] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1405.226019] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1405.233821] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1405.257023] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1405.354216] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1405.366564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1405.479332] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1405.487454] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1405.495316] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1405.507061] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1405.514371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1405.523427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1405.535475] device veth0_vlan entered promiscuous mode [ 1405.542829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1405.549950] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1405.564530] device veth1_vlan entered promiscuous mode [ 1405.571479] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1405.585145] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1405.603485] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1405.615144] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1405.622972] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1405.631841] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1405.639314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1405.649451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1405.661217] device veth0_macvtap entered promiscuous mode [ 1405.667743] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1405.679114] device veth1_macvtap entered promiscuous mode [ 1405.686250] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1405.697160] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1405.710123] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1405.721811] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1405.732552] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1405.742676] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1405.752853] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1405.763112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1405.773311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1405.783164] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1405.794275] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1405.803924] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1405.814838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1405.824320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1405.835094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1405.846719] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1405.854525] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1405.861837] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1405.869262] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1405.876693] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1405.884756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1405.899273] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1405.915807] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1405.929776] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1405.946751] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1405.956108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1405.966183] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1405.975721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1405.985741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1405.995178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1406.005226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1406.015404] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1406.025271] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1406.035870] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1406.043345] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1406.051643] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1406.059588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1406.129608] audit: type=1400 audit(1579509370.253:5363): avc: denied { map } for pid=25854 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 08:36:10 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e9a000006000300"/57, 0x39}], 0x1) 08:36:10 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eaa000006000300"/57, 0x39}], 0x1) 08:36:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a827b1d7827afd2d144b81e55b3f31672797fc0f06d533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 08:36:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xffff8880a3e360a0, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) [ 1406.195226] audit: type=1400 audit(1579509370.323:5364): avc: denied { map } for pid=25859 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 08:36:10 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) [ 1406.302721] nla_parse: 3 callbacks suppressed [ 1406.302730] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1406.326601] audit: type=1400 audit(1579509370.393:5365): avc: denied { map } for pid=25860 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1406.362165] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:36:10 executing program 5: ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000100)={0x9b0000, 0x3, 0x3c9b, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a091a, 0x6b2, [], @value64=0x10001}}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000140)={0x18, 0xfffffffffffffffe, 0x7, {0x7b9}}, 0x18) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r8, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') r12 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r14, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x5}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$nl_route(r12, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="7c0000001000810500"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000005400120009000100766c616e000000004400020006000100000000001c0003000c00010000000000000000000c00010000000000000000001c0004000c000100000000000000000001000100000000000000000008000500", @ANYRES32=r14, @ANYBLOB="00001800000001000000010000000400622731d86da920f59ff7196e4931a7a600000100000004009a0c485daf45e69fd15ce6d5bf92d9a20100010000000400762aed1f1534e212f18cdbbcf7df3b6a0000010000000000000005005c7b32cb7877f3f7e9d7d447bd32ceff000004000bc569b9cdc6250d65f7e1c1ccb9f72300000500fe04eb939c5fabfc94de3985a076c28e000001000000050055b8f0f451fb93ca754a1337703f58df00000500d55705e79ffcb1f876097e0fc830f24400000500bf9d8b68807b120f9d9fa18578f5b5ad"], 0x7c}}, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r10, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r11, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @random="8eece78216b6"}, @NL80211_ATTR_MAC={0xa, 0x6, @dev={[], 0x34}}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r14}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r8) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYBLOB="6ca13796360d4854fd5d44f920ca4e5625a0db12d20c2fc22847de8b7f022d3130f14524f993c6837b40dc80335d097f34d49cb8dff52c8aad6bdf8213144d8d4008cc0a1002d72aaaa7d69407b50cde557546739e5c005a3c9fc8f4d1ee3436735482100ce7a5a07bc32e610792d5eede7b1bb45dd7adac5ef0def23281d0ae9649ad448708e1e527c16654632dc53dcc421bbf74e49feac82ea7330058c860b8e1", @ANYRESDEC, @ANYRES16, @ANYPTR=&(0x7f0000000540)=ANY=[@ANYRESDEC, @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRESOCT=r1, @ANYRESHEX=0x0, @ANYPTR], @ANYPTR64=&(0x7f0000000400)=ANY=[@ANYBLOB="8249119db0c31af7ae806ab556b6b3b703d2419d6874530703776edffc70d3ef4dc9546951faea4268d6e5314477be50b18325d754e687415b3253be32eb4b20b7d1fe5c44d41064486eacc53299fdb2ae5e14f7a91d353ca894c48f1245", @ANYRES16, @ANYRES32, @ANYRESDEC, @ANYRES64=0x0, @ANYRESHEX=r4], @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRESOCT=r6], @ANYRESHEX=0x0, @ANYPTR, @ANYPTR=&(0x7f0000000500)=ANY=[@ANYPTR64], @ANYRES32], @ANYBLOB="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", @ANYRES32=r8, @ANYRESDEC=r3], 0x10ef) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1406.411578] audit: type=1400 audit(1579509370.423:5366): avc: denied { prog_load } for pid=25864 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1406.435500] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:36:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) socket$inet6(0xa, 0x1000000000002, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x20000, 0x0) syz_genetlink_get_family_id$ipvs(0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/nfsfs\x00') getdents(r5, &(0x7f00000000c0)=""/45, 0x12c) getdents(r5, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='net/nfsfs\x00') getdents(r6, &(0x7f00000000c0)=""/45, 0x12c) getdents(r6, 0x0, 0x0) openat$fb0(0xffffffffffffff9c, &(0x7f0000000900)='/dev/fb0\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/45, 0x12c) getdents(0xffffffffffffffff, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/45, 0x12c) getdents(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/nfsfs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000080)='net/nfsfs\x00') getdents(r7, 0x0, 0x0) getdents(r7, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/nfsfs\x00') r8 = socket$unix(0x1, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/nfsfs\x00') getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/45, 0x12c) getdents(r10, 0x0, 0x0) r11 = syz_open_procfs(0x0, 0x0) getdents(r11, &(0x7f00000000c0)=""/45, 0x12c) getdents(r11, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000a40)={{{@in6, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000980)=0xe8) r12 = gettid() ptrace$setopts(0xffffffffffffffff, r12, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ipx\x00') getgid() getdents(0xffffffffffffffff, 0x0, 0x0) r13 = syz_open_procfs(0x0, &(0x7f0000000080)='net/nfsfs\x00') getdents(r13, 0x0, 0x0) lstat(&(0x7f00000024c0)='./file0\x00', &(0x7f0000003ec0)) lstat(&(0x7f0000002380)='./file0\x00', &(0x7f00000023c0)) syz_open_dev$sndtimer(&(0x7f0000002500)='/dev/snd/timer\x00', 0x0, 0x109400) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) r14 = socket$unix(0x1, 0x0, 0x0) r15 = fcntl$dupfd(0xffffffffffffffff, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) r16 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSID(r16, 0x5429, &(0x7f0000000480)) fstat(0xffffffffffffffff, &(0x7f0000002580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xffffffdc) lchown(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r17 = syz_open_procfs(0x0, &(0x7f0000000080)='net/nfsfs\x00') getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/45, 0x12c) getdents(r17, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002600)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$cgroup_int(r0, &(0x7f0000002640)='notify_on_release\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/nfsfs\x00') getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/45, 0x12c) getdents(0xffffffffffffffff, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/45, 0x12c) syz_open_procfs(0x0, &(0x7f0000000080)='net/nfsfs\x00') getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/45, 0x12c) openat$hwrng(0xffffffffffffff9c, &(0x7f0000003980)='/dev/hwrng\x00', 0x400000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000039c0)='/proc/consoles\x00', 0x0, 0x0) getpid() creat(&(0x7f0000000640)='./file0\x00', 0x2a2) r18 = openat$bsg(0xffffffffffffff9c, &(0x7f0000002440)='/dev/bsg\x00', 0x40, 0x0) getsockopt$inet_IP_XFRM_POLICY(r18, 0x0, 0x11, &(0x7f0000000f80)={{{@in=@initdev, @in6=@initdev}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xffffffdc) lchown(&(0x7f0000000240)='./file0\x00', 0x0, r19) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) lchown(&(0x7f0000000240)='./file0\x00', r20, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{{@in6=@remote, @in6=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000003b00)=0xe8) stat(&(0x7f0000003b40)='./file0\x00', &(0x7f0000003b80)) getdents(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1406.544522] audit: type=1400 audit(1579509370.433:5367): avc: denied { create } for pid=25862 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:36:10 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e9b000006000300"/57, 0x39}], 0x1) 08:36:10 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eab000006000300"/57, 0x39}], 0x1) [ 1406.701249] audit: type=1400 audit(1579509370.433:5368): avc: denied { write } for pid=25862 comm="syz-executor.3" path="socket:[105899]" dev="sockfs" ino=105899 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1406.814127] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1406.926353] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1406.983548] audit: type=1400 audit(1579509370.453:5369): avc: denied { create } for pid=25861 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1406.985900] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:36:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="01000000e0ff00001c0012000c000100626f6e64000000000c00020008000100060000006b7e198ce2e0eafd12712725216c5de3fd38c2080000000000000000046aa106df20e457e8344673460d34d5837a7a5b83a7b440a66fdb53c657a59e2ae7c0c3fc9b35ab643f48200df5ce87f074602a02b575ad5a32c1bbcead140e44c398b3eae621d257390839ca7170c78692c5aedbe296d638d2cb4e6eb874a1f005aacfb82e152db0714287efec2a8a94502ca9c06df4273f4afc3744ff4902a9b65657aaa665bb7646404a3217f1f155e640ed7a5f158950bc1138d9821e763624695f96e6026df01bb2af11fceec3409da2cedb"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0045982c00e04feb0b304f004112000b08010067726574740af161d3e162826b1cb663e733dd7f4b799045a6786c9ac17cb3665f9686c6e58c7307d40fc87e8d801838dc628ae1bfcdfeaae64a94237c2ad24034876ddf352e204ed197d34bd562081894408e66a4c8e61db5425e368664fa46df", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3, @ANYBLOB], 0x44}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) [ 1407.048101] audit: type=1400 audit(1579509370.453:5370): avc: denied { write } for pid=25861 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1407.105445] audit: type=1400 audit(1579509370.453:5371): avc: denied { create } for pid=25863 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:36:11 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e9c000006000300"/57, 0x39}], 0x1) [ 1407.337316] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 08:36:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xffff8880a951c2d8, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:36:11 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eac000006000300"/57, 0x39}], 0x1) [ 1407.377607] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1407.403190] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 08:36:11 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, r0, 0x5, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = eventfd2(0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x1}, &(0x7f0000000040)=0x8) creat(&(0x7f00000000c0)='./bus\x00', 0x6) ftruncate(r3, 0x200004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) 08:36:11 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e9d000006000300"/57, 0x39}], 0x1) [ 1407.670512] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:36:12 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ead000006000300"/57, 0x39}], 0x1) [ 1408.022149] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1408.365818] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 1409.702493] IPVS: ftp: loaded support on port[0] = 21 [ 1410.005302] chnl_net:caif_netlink_parms(): no params data found [ 1410.036169] bridge0: port 1(bridge_slave_0) entered blocking state [ 1410.042870] bridge0: port 1(bridge_slave_0) entered disabled state [ 1410.049915] device bridge_slave_0 entered promiscuous mode [ 1410.178862] bridge0: port 2(bridge_slave_1) entered blocking state [ 1410.185366] bridge0: port 2(bridge_slave_1) entered disabled state [ 1410.196536] device bridge_slave_1 entered promiscuous mode [ 1410.208743] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1410.215643] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1410.224751] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1410.231592] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1410.239519] device bridge_slave_1 left promiscuous mode [ 1410.245168] bridge0: port 2(bridge_slave_1) entered disabled state [ 1410.293099] device veth1_macvtap left promiscuous mode [ 1410.298442] device veth0_macvtap left promiscuous mode [ 1410.307927] device veth1_vlan left promiscuous mode [ 1410.313057] device veth0_vlan left promiscuous mode [ 1416.043986] device hsr_slave_1 left promiscuous mode [ 1416.085065] device hsr_slave_0 left promiscuous mode [ 1416.142705] team0 (unregistering): Port device team_slave_1 removed [ 1416.155527] team0 (unregistering): Port device team_slave_0 removed [ 1416.166464] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1416.214107] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1416.283298] bond0 (unregistering): Released all slaves [ 1416.337159] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1416.346644] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1416.363251] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1416.371319] team0: Port device team_slave_0 added [ 1416.378188] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1416.385798] team0: Port device team_slave_1 added [ 1416.401893] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1416.408158] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1416.433926] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1416.446583] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1416.453099] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1416.478500] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1416.489877] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1416.497915] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1416.542242] device hsr_slave_0 entered promiscuous mode [ 1416.590723] device hsr_slave_1 entered promiscuous mode [ 1416.671130] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1416.678583] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1416.696767] kauditd_printk_skb: 75 callbacks suppressed [ 1416.696781] audit: type=1400 audit(1579509380.823:5447): avc: denied { map } for pid=25956 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1416.801386] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1416.875775] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1416.883283] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1416.893596] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1416.904895] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1416.911477] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1416.921435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1416.928530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1416.939496] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1416.946745] 8021q: adding VLAN 0 to HW filter on device team0 [ 1416.960823] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1416.968546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1416.977619] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1416.986559] bridge0: port 1(bridge_slave_0) entered blocking state [ 1416.993073] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1417.004776] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1417.012689] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1417.028067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1417.036185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1417.058694] bridge0: port 2(bridge_slave_1) entered blocking state [ 1417.065366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1417.076640] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1417.085046] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1417.105342] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1417.119811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1417.151506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1417.159740] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1417.169237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1417.183213] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1417.194740] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1417.201564] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1417.209082] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1417.217502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1417.234163] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1417.246116] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1417.256990] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1417.264056] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1417.284106] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1417.303833] audit: type=1400 audit(1579509381.433:5448): avc: denied { map } for pid=25957 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1417.415515] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1417.435373] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1417.446746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1417.460923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1417.538820] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1417.554056] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1417.561898] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1417.573525] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1417.581168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1417.588799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1417.598351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1417.616091] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1417.629660] device veth0_vlan entered promiscuous mode [ 1417.645879] device veth1_vlan entered promiscuous mode [ 1417.652171] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1417.665063] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1417.682977] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1417.695374] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1417.702692] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1417.711227] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1417.718600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1417.729249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1417.742662] device veth0_macvtap entered promiscuous mode [ 1417.748878] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1417.759558] device veth1_macvtap entered promiscuous mode [ 1417.766574] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1417.778934] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1417.791169] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1417.801722] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1417.811597] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1417.821656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1417.831932] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1417.841276] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1417.851717] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1417.861255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1417.871126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1417.880344] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1417.890056] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1417.899259] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1417.909187] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1417.919487] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1417.927346] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1417.935327] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1417.943558] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1417.952397] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1417.960310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1417.970906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1417.980842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1417.989979] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1417.999757] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.009397] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1418.019397] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.028625] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1418.038726] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.048051] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1418.057930] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.067140] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1418.076914] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.088325] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1418.096373] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1418.103792] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1418.112639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1418.188563] audit: type=1400 audit(1579509382.313:5449): avc: denied { map } for pid=25969 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1418.226028] audit: type=1400 audit(1579509382.353:5450): avc: denied { map_create } for pid=25970 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1418.259736] device bridge_slave_0 left promiscuous mode [ 1418.266124] bridge0: port 1(bridge_slave_0) entered disabled state 08:36:22 executing program 1: getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)=0x401) prlimit64(r0, 0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendfile(r2, r1, 0x0, 0x72439a6b) 08:36:22 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e9e000006000300"/57, 0x39}], 0x1) 08:36:22 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eae000006000300"/57, 0x39}], 0x1) 08:36:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000340)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:36:22 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="f2c8e3da0b84226bd1ea5a44d53f86857ca90ce0e4ce9143474776036126d4", 0x1f, 0x2}, {&(0x7f0000000180)="2426174faed840018f84b1e412afc4f197fa05326df1e3ea6084ed00637c2788fed1d1a05d1bb83fb4124aaa44f7d76d14cb8b642d85115c81fb4976d67609f993e32f994c4b207f5d7a6334347cb8808d4251fb03e43261a8bace8eb2743fb013ead94b70399a77", 0x68, 0x80000000}], 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000140)="c157e99272057c925f2b5a2bb6c93d5489150a47cbe4be6dc8b8e8a5c225a407d6b2302b165061bd28ebf16f6bd833a51df65819999e2b56b4ca3f86c3c18f73", 0x16, 0x0, 0x0, 0x1}]) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_REWIND(r2, 0x40084146, &(0x7f0000000240)=0xffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000280)) 08:36:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) [ 1418.427253] audit: type=1400 audit(1579509382.553:5451): avc: denied { create } for pid=25978 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1418.450965] nla_parse: 2 callbacks suppressed [ 1418.450992] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1418.508532] audit: type=1400 audit(1579509382.553:5452): avc: denied { write } for pid=25978 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1418.590353] audit: type=1400 audit(1579509382.563:5453): avc: denied { create } for pid=25975 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1418.624820] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:36:22 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eaf000006000300"/57, 0x39}], 0x1) 08:36:22 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000e9f000006000300"/57, 0x39}], 0x1) [ 1418.799678] audit: type=1400 audit(1579509382.563:5454): avc: denied { write } for pid=25975 comm="syz-executor.3" path="socket:[105147]" dev="sockfs" ino=105147 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1418.823278] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1418.951971] audit: type=1400 audit(1579509382.593:5455): avc: denied { create } for pid=25977 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:36:23 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) r2 = socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x14b100, 0x0) ioctl$SIOCAX25DELFWD(r3, 0x89eb, &(0x7f0000000140)={@default, @bcast}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'vlan1\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r5}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a041a0c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816107d08f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x206) 08:36:23 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eb0000006000300"/57, 0x39}], 0x1) 08:36:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(0x0, &(0x7f00000002c0), 0x0) eventfd2(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0) r0 = accept4$x25(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r5, @ANYBLOB="60be035678bf", @ANYRES32=0x0, @ANYBLOB="00000000008433df6d6f6b577d4eaad1000007"], 0x5}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=@newlink={0x84, 0x10, 0x705, 0xeffffffe, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x5c, 0x12, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4c, 0x2, [@IFLA_IPTUN_PMTUDISC={0x5}, @IFLA_IPTUN_LOCAL={0x8, 0x2, @multicast1}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x30}}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @rand_addr=0x8}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_ENCAP_DPORT={0x6}], @IFLA_IPTUN_PMTUDISC={0x5, 0xa, 0x1}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @loopback}]}}}, @IFLA_LINK={0x8}]}, 0x84}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00'}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000180)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(0xffffffffffffffff, 0x4010641a, &(0x7f0000000240)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r8, 0x80dc5521, &(0x7f0000000300)=""/130) bind$inet6(r7, &(0x7f0000000280)={0xa, 0x4e22, 0x1, @mcast1, 0x2}, 0x1c) listen(r7, 0x0) socket$netlink(0x10, 0x3, 0x8000000004) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac710d1070000ffffffffffffffffffe7ee000000000000000002000000", 0x57}], 0x1) [ 1419.146747] audit: type=1400 audit(1579509382.603:5456): avc: denied { map } for pid=25984 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1419.165360] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1419.227207] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:36:23 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea0000006000300"/57, 0x39}], 0x1) 08:36:23 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eb1000006000300"/57, 0x39}], 0x1) [ 1419.442774] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1419.498212] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1419.510706] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:36:23 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea1000006000300"/57, 0x39}], 0x1) [ 1419.538517] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:36:23 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eb2000006000300"/57, 0x39}], 0x1) 08:36:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000340)="0a4653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) [ 1419.708306] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:36:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:36:24 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea2000006000300"/57, 0x39}], 0x1) 08:36:24 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eb3000006000300"/57, 0x39}], 0x1) 08:36:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196f"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) [ 1419.978458] XFS (loop4): Invalid superblock magic number 08:36:24 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req={0x1000, 0x4, 0x0, 0x4}, 0x10) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(0xffffffffffffffff, 0x0, 0x22f, 0x0, &(0x7f00000000c0)={0x11, 0x0, r2}, 0x14) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000003f00)) socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0xd, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendto$packet(r3, 0x0, 0x22f, 0x0, &(0x7f00000000c0), 0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008640)={0x0, @rand_addr, @local}, &(0x7f0000008680)=0xc) getsockname$packet(r0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x24e) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req={0x1000, 0x4, 0x1000}, 0x10) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) sendto$packet(0xffffffffffffffff, 0x0, 0x22f, 0x0, &(0x7f00000000c0), 0x14) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x0, 0x1000, 0x4}, 0x10) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000008900)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="51f9fda18ea04dadb4e24b9198ea3c7d04999d5b2cc7cafba5c68d463b26f04991c6ffdafb9c7a2d00d6ec9d2248455bd5dcedfc7f660ca078c0f3c3c83930de92fa588c493e1234454e15f8cfffc5965b3f28214f620b8f48edde16979e263183d8a1e7"}], 0x1}}, {{&(0x7f0000002640)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000002c40)}}, {{&(0x7f0000004100)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}}, {{0x0, 0xffffffffffffffdc, &(0x7f0000006640)=[{0x0}, {0x0}, {0x0}], 0x3}}], 0x4, 0x8831) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800406, 0x0, 0x0, 0x0, 0x2) 08:36:24 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eb4000006000300"/57, 0x39}], 0x1) 08:36:24 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea3000006000300"/57, 0x39}], 0x1) 08:36:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(0x0, &(0x7f00000002c0), 0x0) eventfd2(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0) r0 = accept4$x25(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r5, @ANYBLOB="60be035678bf", @ANYRES32=0x0, @ANYBLOB="00000000008433df6d6f6b577d4eaad1000007"], 0x5}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=@newlink={0x84, 0x10, 0x705, 0xeffffffe, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x5c, 0x12, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4c, 0x2, [@IFLA_IPTUN_PMTUDISC={0x5}, @IFLA_IPTUN_LOCAL={0x8, 0x2, @multicast1}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x30}}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @rand_addr=0x8}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_ENCAP_DPORT={0x6}], @IFLA_IPTUN_PMTUDISC={0x5, 0xa, 0x1}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @loopback}]}}}, @IFLA_LINK={0x8}]}, 0x84}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00'}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000180)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(0xffffffffffffffff, 0x4010641a, &(0x7f0000000240)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r8, 0x80dc5521, &(0x7f0000000300)=""/130) bind$inet6(r7, &(0x7f0000000280)={0xa, 0x4e22, 0x1, @mcast1, 0x2}, 0x1c) listen(r7, 0x0) socket$netlink(0x10, 0x3, 0x8000000004) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac710d1070000ffffffffffffffffffe7ee000000000000000002000000", 0x57}], 0x1) 08:36:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000340)="254653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:36:25 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea4000006000300"/57, 0x39}], 0x1) 08:36:25 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eb5000006000300"/57, 0x39}], 0x1) [ 1421.179103] XFS (loop4): Invalid superblock magic number 08:36:25 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eb6000006000300"/57, 0x39}], 0x1) 08:36:25 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea5000006000300"/57, 0x39}], 0x1) 08:36:25 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea3000006000300"/57, 0x39}], 0x1) 08:36:25 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eb7000006000300"/57, 0x39}], 0x1) [ 1421.735829] kauditd_printk_skb: 120 callbacks suppressed [ 1421.735844] audit: type=1400 audit(1579509385.853:5577): avc: denied { create } for pid=26132 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1421.933420] audit: type=1400 audit(1579509385.863:5578): avc: denied { write } for pid=26132 comm="syz-executor.3" path="socket:[105315]" dev="sockfs" ino=105315 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1422.012639] audit: type=1400 audit(1579509385.893:5579): avc: denied { create } for pid=26132 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1422.038233] audit: type=1400 audit(1579509385.893:5580): avc: denied { create } for pid=26083 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1422.062948] audit: type=1400 audit(1579509385.893:5581): avc: denied { write } for pid=26083 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1422.087973] audit: type=1400 audit(1579509385.923:5582): avc: denied { map } for pid=26136 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1422.110861] audit: type=1400 audit(1579509385.953:5583): avc: denied { map } for pid=26136 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1422.137031] audit: type=1400 audit(1579509386.063:5584): avc: denied { map } for pid=26140 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1422.159630] audit: type=1400 audit(1579509386.063:5585): avc: denied { map } for pid=26140 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1422.182177] audit: type=1400 audit(1579509386.123:5586): avc: denied { map } for pid=26139 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1423.191123] IPVS: ftp: loaded support on port[0] = 21 [ 1423.229782] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1423.236677] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1423.246435] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1423.253463] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1423.262338] device bridge_slave_1 left promiscuous mode [ 1423.267820] bridge0: port 2(bridge_slave_1) entered disabled state [ 1423.313018] device veth1_macvtap left promiscuous mode [ 1423.318407] device veth0_macvtap left promiscuous mode [ 1423.323942] device veth1_vlan left promiscuous mode [ 1423.329022] device veth0_vlan left promiscuous mode [ 1428.744583] device hsr_slave_1 left promiscuous mode [ 1428.795891] device hsr_slave_0 left promiscuous mode [ 1428.842168] team0 (unregistering): Port device team_slave_1 removed [ 1428.853202] team0 (unregistering): Port device team_slave_0 removed [ 1428.864448] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1428.913982] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1428.998658] bond0 (unregistering): Released all slaves [ 1429.073820] chnl_net:caif_netlink_parms(): no params data found [ 1429.116970] bridge0: port 1(bridge_slave_0) entered blocking state [ 1429.124482] bridge0: port 1(bridge_slave_0) entered disabled state [ 1429.132161] device bridge_slave_0 entered promiscuous mode [ 1429.140045] bridge0: port 2(bridge_slave_1) entered blocking state [ 1429.146601] bridge0: port 2(bridge_slave_1) entered disabled state [ 1429.154238] device bridge_slave_1 entered promiscuous mode [ 1429.173511] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1429.222382] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1429.243972] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1429.253363] team0: Port device team_slave_0 added [ 1429.259472] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1429.267289] team0: Port device team_slave_1 added [ 1429.287143] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1429.293536] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1429.319217] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1429.332250] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1429.338537] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1429.364683] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1429.376459] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1429.385828] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1429.453286] device hsr_slave_0 entered promiscuous mode [ 1429.490702] device hsr_slave_1 entered promiscuous mode [ 1429.531298] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1429.538657] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1429.565856] kauditd_printk_skb: 2 callbacks suppressed [ 1429.565871] audit: type=1400 audit(1579509393.693:5589): avc: denied { map } for pid=26144 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1429.709652] bridge0: port 2(bridge_slave_1) entered blocking state [ 1429.716729] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1429.723461] bridge0: port 1(bridge_slave_0) entered blocking state [ 1429.730136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1429.816486] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1429.835385] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1429.855252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1429.868275] bridge0: port 1(bridge_slave_0) entered disabled state [ 1429.878055] bridge0: port 2(bridge_slave_1) entered disabled state [ 1429.907276] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1429.913973] 8021q: adding VLAN 0 to HW filter on device team0 [ 1429.926284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1429.935768] bridge0: port 1(bridge_slave_0) entered blocking state [ 1429.942427] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1429.962461] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1429.971785] bridge0: port 2(bridge_slave_1) entered blocking state [ 1429.978172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1430.018521] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1430.028982] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1430.041334] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1430.050860] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1430.059930] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1430.069180] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1430.083213] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1430.099161] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1430.106841] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1430.115747] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1430.125368] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1430.132743] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1430.142257] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1430.156410] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1430.176049] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1430.186156] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1430.193890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1430.202303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1430.215381] audit: type=1400 audit(1579509394.343:5590): avc: denied { map } for pid=26145 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1430.281296] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1430.289590] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1430.298056] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1430.311168] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1430.318658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1430.328225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1430.345537] device veth0_vlan entered promiscuous mode [ 1430.352549] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1430.359700] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1430.374402] device veth1_vlan entered promiscuous mode [ 1430.383139] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1430.394877] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1430.411333] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1430.422523] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1430.433779] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1430.443463] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1430.451275] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1430.460884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1430.471342] device veth0_macvtap entered promiscuous mode [ 1430.479055] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1430.498525] device veth1_macvtap entered promiscuous mode [ 1430.505521] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1430.517378] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1430.530847] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1430.542656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1430.552915] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1430.562675] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1430.573667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1430.583705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1430.594116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1430.603386] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1430.613154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1430.622555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1430.632624] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1430.643158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1430.652965] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1430.663392] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1430.670750] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1430.678168] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1430.687218] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1430.694899] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1430.703021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1430.713704] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1430.724078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1430.733877] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1430.744210] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1430.754332] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1430.764292] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1430.773522] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1430.783459] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1430.792668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1430.802488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1430.811998] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1430.821843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1430.832405] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1430.839431] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1430.848425] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1430.856988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1430.904734] audit: type=1400 audit(1579509395.033:5591): avc: denied { map } for pid=26151 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1430.939778] audit: type=1400 audit(1579509395.063:5592): avc: denied { map } for pid=26151 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1430.994445] audit: type=1400 audit(1579509395.123:5593): avc: denied { map_create } for pid=26152 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1431.036360] device bridge_slave_0 left promiscuous mode [ 1431.047460] bridge0: port 1(bridge_slave_0) entered disabled state 08:36:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196f"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:36:35 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eb8000006000300"/57, 0x39}], 0x1) 08:36:35 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea6000006000300"/57, 0x39}], 0x1) 08:36:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)={0x1c, r1, 0xb, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}]}, 0x1c}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1010005}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYRES16=r3, @ANYRESDEC, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x20008000}, 0x8000) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r3, 0x1, 0x70bd26, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0xe076}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x5}, 0x80) r4 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_S_INPUT(r4, 0xc0045627, &(0x7f0000000240)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xe, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000061107400000000009500070000000000ed8efb32694538c35bb57a177fd091379ee1d6f59fc8a2af2850ac82fe725d8b902e608d0450cdc55deb230868e70f86f6ab1027552769072c84d961bcbcac9dc43a01b08651d2bc549028d93dea6155f301756c1ed1af0e107c5a68e60d6807b684b27d0fd37f98a7f7b12b8659b13e947bd9334bc1510e81b6cda6d9220d97e1c006004eff83f67739bfc141ea191e9a609ed150073d2f2510f09592545eee01f7f8e3432f62a82286af8bbb4696d20d3d3f79d3ef43c7be04ccee76388e75b3475265e5fd63e6ea5d2fbccda4aa5cdb15b94aa8449666d4b481a86deb"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffec9}, 0x3b) 08:36:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(0x0, &(0x7f00000002c0), 0x0) eventfd2(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0) r0 = accept4$x25(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r5, @ANYBLOB="60be035678bf", @ANYRES32=0x0, @ANYBLOB="00000000008433df6d6f6b577d4eaad1000007"], 0x5}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=@newlink={0x84, 0x10, 0x705, 0xeffffffe, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x5c, 0x12, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4c, 0x2, [@IFLA_IPTUN_PMTUDISC={0x5}, @IFLA_IPTUN_LOCAL={0x8, 0x2, @multicast1}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x30}}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @rand_addr=0x8}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_ENCAP_DPORT={0x6}], @IFLA_IPTUN_PMTUDISC={0x5, 0xa, 0x1}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @loopback}]}}}, @IFLA_LINK={0x8}]}, 0x84}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00'}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000180)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(0xffffffffffffffff, 0x4010641a, &(0x7f0000000240)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r8, 0x80dc5521, &(0x7f0000000300)=""/130) bind$inet6(r7, &(0x7f0000000280)={0xa, 0x4e22, 0x1, @mcast1, 0x2}, 0x1c) listen(r7, 0x0) socket$netlink(0x10, 0x3, 0x8000000004) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac710d1070000ffffffffffffffffffe7ee000000000000000002000000", 0x57}], 0x1) 08:36:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000340)="580a53420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) [ 1431.153473] audit: type=1400 audit(1579509395.283:5594): avc: denied { create } for pid=26155 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1431.185404] nla_parse: 15 callbacks suppressed [ 1431.185416] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1431.212046] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1431.222415] Started in network mode [ 1431.226625] Own node identity e076, cluster identity 4711 [ 1431.234795] audit: type=1400 audit(1579509395.313:5596): avc: denied { create } for pid=26159 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1431.259848] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1431.269721] 32-bit node address hash set to e076 [ 1431.293804] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:36:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196f"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) [ 1431.342225] audit: type=1400 audit(1579509395.313:5597): avc: denied { write } for pid=26159 comm="syz-executor.3" path="socket:[106747]" dev="sockfs" ino=106747 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:36:35 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea7000006000300"/57, 0x39}], 0x1) [ 1431.412429] XFS (loop4): Invalid superblock magic number 08:36:35 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eb9000006000300"/57, 0x39}], 0x1) [ 1431.463011] audit: type=1400 audit(1579509395.313:5595): avc: denied { write } for pid=26155 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1431.620623] audit: type=1400 audit(1579509395.333:5598): avc: denied { create } for pid=26157 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1431.638087] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1431.660543] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1431.706279] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1431.711884] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:36:35 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea8000006000300"/57, 0x39}], 0x1) 08:36:35 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eba000006000300"/57, 0x39}], 0x1) 08:36:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196f"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) [ 1431.959253] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1431.993824] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:36:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000340)="582553420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:36:36 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ion\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000000)='syz0\x00') openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) bind$isdn(r1, &(0x7f00000003c0)={0x22, 0xfffffffffffffff9, 0x1, 0x10001, 0x8}, 0x6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_1\x00'}) sendmmsg(r0, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0xffffff7a}}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x800, 0x400) r2 = syz_open_procfs(0x0, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)={0xaa, 0x3}) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) getpid() r5 = socket$unix(0x1, 0x5, 0x0) bind$unix(r5, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r5, 0xfffffffc) r6 = socket$unix(0x1, 0x5, 0x0) connect(r6, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r7 = gettid() r8 = gettid() sendmmsg$unix(r6, &(0x7f0000003f40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r6]}}, @cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {r8}}}], 0x70}], 0x1, 0x0) r9 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r9) ioctl$sock_FIOGETOWN(r9, 0x8903, &(0x7f0000000200)=0x0) r11 = syz_open_procfs(r10, &(0x7f00000002c0)='net/ipx\x00') ioctl$int_out(r11, 0x5460, &(0x7f0000001900)) ioctl$DRM_IOCTL_GET_STATS(r11, 0x80f86406, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x1400) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r12 = accept(r3, 0x0, &(0x7f0000000080)=0x10058) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x8}, &(0x7f00000001c0)=0x8) r13 = socket$kcm(0x2b, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x4, 0x2, 0x4, {0xa, 0x4e23, 0x3, @loopback, 0x2}}}, 0x80, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000840)="0f2cd78559fae92f93589037ac1c4dcfd1518f629dcaf4d5e1b6ca91a07a2c1d1878b4dbd4fb3801dda1e671ff8244ff9d3df4c8e2e9cbe253b406ff7c9e40b3176625df976ac2b52546954d9167357a2ea71dbb91c1435d189170e04ff510a9c52feeb2356983f58a1fed974d3062342d98d3ce0fd6b38fe12315632dee4b9de64e529c42b98f6b8127d9966cbcecf426", 0x91}, {&(0x7f0000000280)="4e8290accf6bef9a0bfbfe1563799deddb4ad2b6c3946be8ea555e0c9831b59b4adf4c12eff86bef0d0b81d78ef529271b48963b54dbb2490fd2f29c9fc5", 0x3e}, {0x0}], 0x4}}], 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r12, 0x1, 0x19, &(0x7f0000000400)='erspan0\x00', 0x700e) sendmmsg(r4, &(0x7f000000a080)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f0000001900)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 08:36:36 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ebb000006000300"/57, 0x39}], 0x1) 08:36:36 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ebc000006000300"/57, 0x39}], 0x1) 08:36:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:36:36 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ea9000006000300"/57, 0x39}], 0x1) 08:36:36 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r5, 0x1, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x8001, @loopback, 0x2}, @ib={0x1b, 0x800, 0xaf92, {"d6e0e02dca31d1792ccaf00eeff5e63f"}, 0x1, 0x8, 0x1}}}, 0x118) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x40) connect$inet(r6, &(0x7f0000000140)={0x2, 0x0, @initdev}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0x4000000000013, &(0x7f0000000100), 0x1042b) setsockopt$sock_linger(r6, 0x1, 0xd, &(0x7f00000000c0)={0x1, 0xffffffffffff63d8}, 0x156) close(r6) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {r7, r8+30000000}}, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x3c) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0xfffffffffffffffc, &(0x7f0000000380)="faecd68876f697c31396f6000600000000000000aacb0dd01ec07ec98200200000000000ff0f7bf7854181d80801d610bc0d52ec506055188b086d15b59d3e795d523b7896e43819136cadf8a5fb41") ptrace$cont(0x20, r9, 0x0, 0x0) r10 = gettid() ptrace$setopts(0x4206, r10, 0x0, 0x0) tkill(r10, 0x3c) ptrace$cont(0x18, r10, 0x0, 0x0) ptrace$setregs(0xd, r10, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r10, 0x0, 0x0) r11 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = perf_event_open(&(0x7f000001d000)={0x1, 0x21a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r12, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r11, 0x2405, r12) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r11, 0x2405, r12) kcmp(r9, r10, 0x4, r2, r12) tkill(r0, 0x5000000000016) 08:36:36 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ebd000006000300"/57, 0x39}], 0x1) [ 1432.553677] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(154758129105884) <= P.seqno(0) <= S.SWH(154758129105958)) and (P.ackno exists or LAWL(219092125865862) <= P.ackno(219092125865863) <= S.AWH(219092125865863), sending SYNC... [ 1432.607201] XFS (loop4): Invalid superblock magic number [ 1432.673982] dccp_close: ABORT with 207 bytes unread 08:36:36 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eaa000006000300"/57, 0x39}], 0x1) 08:36:36 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ebe000006000300"/57, 0x39}], 0x1) 08:36:37 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ion\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000000)='syz0\x00') openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) bind$isdn(r1, &(0x7f00000003c0)={0x22, 0xfffffffffffffff9, 0x1, 0x10001, 0x8}, 0x6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_1\x00'}) sendmmsg(r0, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0xffffff7a}}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x800, 0x400) r2 = syz_open_procfs(0x0, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)={0xaa, 0x3}) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) getpid() r5 = socket$unix(0x1, 0x5, 0x0) bind$unix(r5, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r5, 0xfffffffc) r6 = socket$unix(0x1, 0x5, 0x0) connect(r6, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r7 = gettid() r8 = gettid() sendmmsg$unix(r6, &(0x7f0000003f40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r6]}}, @cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {r8}}}], 0x70}], 0x1, 0x0) r9 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r9) ioctl$sock_FIOGETOWN(r9, 0x8903, &(0x7f0000000200)=0x0) r11 = syz_open_procfs(r10, &(0x7f00000002c0)='net/ipx\x00') ioctl$int_out(r11, 0x5460, &(0x7f0000001900)) ioctl$DRM_IOCTL_GET_STATS(r11, 0x80f86406, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x1400) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r12 = accept(r3, 0x0, &(0x7f0000000080)=0x10058) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x8}, &(0x7f00000001c0)=0x8) r13 = socket$kcm(0x2b, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x4, 0x2, 0x4, {0xa, 0x4e23, 0x3, @loopback, 0x2}}}, 0x80, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000840)="0f2cd78559fae92f93589037ac1c4dcfd1518f629dcaf4d5e1b6ca91a07a2c1d1878b4dbd4fb3801dda1e671ff8244ff9d3df4c8e2e9cbe253b406ff7c9e40b3176625df976ac2b52546954d9167357a2ea71dbb91c1435d189170e04ff510a9c52feeb2356983f58a1fed974d3062342d98d3ce0fd6b38fe12315632dee4b9de64e529c42b98f6b8127d9966cbcecf426", 0x91}, {&(0x7f0000000280)="4e8290accf6bef9a0bfbfe1563799deddb4ad2b6c3946be8ea555e0c9831b59b4adf4c12eff86bef0d0b81d78ef529271b48963b54dbb2490fd2f29c9fc5", 0x3e}, {0x0}], 0x4}}], 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r12, 0x1, 0x19, &(0x7f0000000400)='erspan0\x00', 0x700e) sendmmsg(r4, &(0x7f000000a080)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f0000001900)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 08:36:37 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ebf000006000300"/57, 0x39}], 0x1) 08:36:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000340)="58460a420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) 08:36:37 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ec0000006000300"/57, 0x39}], 0x1) 08:36:37 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eab000006000300"/57, 0x39}], 0x1) 08:36:37 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ec1000006000300"/57, 0x39}], 0x1) [ 1433.948914] XFS (loop4): Invalid superblock magic number [ 1434.171189] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(131071752528109) <= P.seqno(0) <= S.SWH(131071752528183)) and (P.ackno exists or LAWL(178979464272684) <= P.ackno(178979464272685) <= S.AWH(178979464272685), sending SYNC... [ 1434.233524] dccp_close: ABORT with 207 bytes unread [ 1435.399771] kauditd_printk_skb: 115 callbacks suppressed [ 1435.399786] audit: type=1400 audit(1579509399.523:5714): avc: denied { map } for pid=26295 comm="syz-executor.2" path="/root/syz-executor.2" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1435.460365] audit: type=1400 audit(1579509399.523:5715): avc: denied { map } for pid=26295 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=456 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1435.591092] IPVS: ftp: loaded support on port[0] = 21 [ 1435.891706] chnl_net:caif_netlink_parms(): no params data found [ 1435.920072] bridge0: port 1(bridge_slave_0) entered blocking state [ 1435.926620] bridge0: port 1(bridge_slave_0) entered disabled state [ 1435.934484] device bridge_slave_0 entered promiscuous mode [ 1435.944771] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1435.951582] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1435.959379] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1435.966393] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1435.975793] device bridge_slave_1 left promiscuous mode [ 1435.981792] bridge0: port 2(bridge_slave_1) entered disabled state [ 1436.023098] device veth1_macvtap left promiscuous mode [ 1436.028656] device veth0_macvtap left promiscuous mode [ 1436.034375] device veth1_vlan left promiscuous mode [ 1436.039594] device veth0_vlan left promiscuous mode [ 1441.752563] device hsr_slave_1 left promiscuous mode [ 1441.794424] device hsr_slave_0 left promiscuous mode [ 1441.839563] team0 (unregistering): Port device team_slave_1 removed [ 1441.852114] team0 (unregistering): Port device team_slave_0 removed [ 1441.864030] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1441.926668] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1441.991307] bond0 (unregistering): Released all slaves [ 1442.044602] bridge0: port 2(bridge_slave_1) entered blocking state [ 1442.053091] bridge0: port 2(bridge_slave_1) entered disabled state [ 1442.060093] device bridge_slave_1 entered promiscuous mode [ 1442.079327] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1442.089206] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1442.108836] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1442.116589] team0: Port device team_slave_0 added [ 1442.123877] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1442.131706] team0: Port device team_slave_1 added [ 1442.147054] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1442.154139] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1442.179786] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1442.191938] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1442.199549] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1442.225822] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1442.241669] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1442.249846] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1442.303315] device hsr_slave_0 entered promiscuous mode [ 1442.340792] device hsr_slave_1 entered promiscuous mode [ 1442.401527] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1442.443945] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1442.469118] audit: type=1400 audit(1579509406.593:5716): avc: denied { map } for pid=26298 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1442.568014] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1442.656946] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1442.667917] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1442.686919] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1442.703419] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1442.711561] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1442.721975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1442.729916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1442.747915] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1442.756701] 8021q: adding VLAN 0 to HW filter on device team0 [ 1442.768217] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1442.777158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1442.786079] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1442.795052] bridge0: port 1(bridge_slave_0) entered blocking state [ 1442.801938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1442.813688] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1442.821660] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1442.832716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1442.851029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1442.859160] bridge0: port 2(bridge_slave_1) entered blocking state [ 1442.865802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1442.888769] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1442.897420] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1442.916896] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1442.933619] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1442.950004] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1442.968925] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1442.979779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1442.995012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1443.017674] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1443.028276] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1443.044307] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1443.057148] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1443.073806] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1443.170375] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1443.182462] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1443.189727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1443.199066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1443.289843] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1443.297650] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1443.305450] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1443.316785] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1443.324117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1443.332856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1443.341604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1443.348816] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1443.373884] device veth0_vlan entered promiscuous mode [ 1443.388526] device veth1_vlan entered promiscuous mode [ 1443.394921] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1443.405858] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1443.424855] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1443.436070] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1443.443859] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1443.452831] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1443.460838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1443.468602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1443.479448] device veth0_macvtap entered promiscuous mode [ 1443.486844] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1443.497179] device veth1_macvtap entered promiscuous mode [ 1443.504210] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1443.515457] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1443.528004] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1443.538497] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1443.548929] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.558505] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1443.568491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.577704] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1443.587517] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.596812] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1443.608082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.617596] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1443.627372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.636616] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1443.646932] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.657446] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1443.664731] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1443.672889] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1443.681145] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1443.688314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1443.696671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1443.707104] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1443.717130] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.726875] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1443.736924] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.746573] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1443.756376] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.765599] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1443.775433] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.784920] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1443.794743] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.803929] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1443.813804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.824204] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1443.834416] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1443.842777] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1443.860890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1443.938576] audit: type=1400 audit(1579509408.063:5717): avc: denied { map } for pid=26311 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1443.976762] audit: type=1400 audit(1579509408.063:5718): avc: denied { map } for pid=26311 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1444.009299] audit: type=1400 audit(1579509408.133:5719): avc: denied { map_create } for pid=26312 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1444.044145] device bridge_slave_0 left promiscuous mode [ 1444.049946] bridge0: port 1(bridge_slave_0) entered disabled state 08:36:48 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:36:48 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ec2000006000300"/57, 0x39}], 0x1) 08:36:48 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eac000006000300"/57, 0x39}], 0x1) 08:36:48 executing program 5: pipe(&(0x7f0000000680)) getpid() dup(0xffffffffffffffff) getpgrp(0x0) capget(&(0x7f0000000000), 0x0) r0 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5) dup2(0xffffffffffffffff, r0) ppoll(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', 0x0, 0x0, 0x1) r1 = socket(0x0, 0x3, 0x0) syz_open_dev$amidi(0x0, 0x9c4, 0x70000) r2 = gettid() sched_setscheduler(0x0, 0x5, 0x0) waitid(0x83b895581628fca4, 0x0, 0x0, 0x80000000, &(0x7f0000000480)) sendmsg$key(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX, @ANYRESDEC=r2]], 0xfffffffffffffe56}}, 0x20004850) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) r3 = gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) openat$fb0(0xffffffffffffff9c, 0x0, 0x409040, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000940)={r4, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000900)='syz1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000080)='/dev/autofs\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = dup3(0xffffffffffffffff, r7, 0x0) write$FUSE_IOCTL(r8, &(0x7f0000000180)={0x20, 0x0, 0x0, {0x0, 0x4, 0x0, 0xfff}}, 0x20) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000280)=""/11) r9 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x100, 0x0) pwritev(r9, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r9) sendfile(r5, r6, 0x0, 0x102000004) 08:36:48 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000040)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x28) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="d26c"], 0x2) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 1444.187460] audit: type=1400 audit(1579509408.313:5720): avc: denied { create } for pid=26316 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1444.197550] nla_parse: 17 callbacks suppressed [ 1444.197594] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1444.215091] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 08:36:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000340)="584625420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) [ 1444.232383] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:36:48 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ec3000006000300"/57, 0x39}], 0x1) [ 1444.342497] audit: type=1400 audit(1579509408.323:5721): avc: denied { write } for pid=26316 comm="syz-executor.3" path="socket:[107735]" dev="sockfs" ino=107735 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1444.422324] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1444.461547] XFS (loop4): Invalid superblock magic number 08:36:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000340)="584655420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) [ 1444.554240] audit: type=1400 audit(1579509408.393:5722): avc: denied { create } for pid=26323 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1444.585338] print_req_error: 130 callbacks suppressed [ 1444.585352] print_req_error: I/O error, dev loop2, sector 0 08:36:48 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ead000006000300"/57, 0x39}], 0x1) 08:36:48 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ec4000006000300"/57, 0x39}], 0x1) [ 1444.769182] audit: type=1400 audit(1579509408.393:5723): avc: denied { write } for pid=26323 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1444.827181] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1444.864237] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1444.903000] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:36:49 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000b94000)=""/246) r1 = socket$rxrpc(0x21, 0x2, 0xa) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='veth0_to_batadv\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) [ 1444.939314] audit: type=1400 audit(1579509408.423:5724): avc: denied { map } for pid=26325 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 08:36:49 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ec5000006000300"/57, 0x39}], 0x1) [ 1445.084274] audit: type=1400 audit(1579509408.463:5725): avc: denied { read } for pid=26323 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1445.099045] XFS (loop4): Invalid superblock magic number [ 1445.227786] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1445.297363] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 08:36:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0), 0x0}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000440)={{0x3, @bcast}, [@remote, @rose, @bcast, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f0000000240)=0x48, 0x800) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000000000019f48075a5d9247cf000", @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981b66d374923a2b1597449331902ca8bdf6a7bca8b3b512539a9128fe8476d4d6652037756d0ac81399ac0582b151d151fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34"], 0x3}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 08:36:49 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setuid(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x480, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000000c0), 0x100400) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000eae000006000300"/57, 0x39}], 0x1) 08:36:49 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000306096768fe07072b0300370e000a0014000200450201070300001419001a00120002000ec6000006000300"/57, 0x39}], 0x1) 08:36:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_mgmt(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000340)="5846530a0000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000df13a8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020cf7ea619aa3b3be1c24cb4ce3066e07bb22eb0c4306ed0bdc8f4623f40ed25dfd365f7833df74c339368054b205309209a81caef5a645f2c4125e763aca823325c1d9c9f5ca292e922438944d4968275429c64eeaab9c1427508781b4b1ccaac2d9f9", 0xe1}], 0x0, 0x0) [ 1445.613589] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1445.857537] XFS (loop4): Invalid superblock magic number [ 1447.473662] IPVS: ftp: loaded support on port[0] = 21 [ 1447.545151] chnl_net:caif_netlink_parms(): no params data found [ 1447.824411] bridge0: port 1(bridge_slave_0) entered blocking state [ 1447.831192] bridge0: port 1(bridge_slave_0) entered disabled state [ 1447.838279] device bridge_slave_0 entered promiscuous mode [ 1447.846211] bridge0: port 2(bridge_slave_1) entered blocking state [ 1447.852808] bridge0: port 2(bridge_slave_1) entered disabled state [ 1447.859836] device bridge_slave_1 entered promiscuous mode [ 1448.116114] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1448.127152] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1448.378091] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1448.386820] team0: Port device team_slave_0 added [ 1448.392960] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1448.400250] team0: Port device team_slave_1 added [ 1448.648678] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1448.656127] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1448.681900] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1448.927590] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1448.933935] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1448.959242] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1448.971043] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1448.979426] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1449.043168] device hsr_slave_0 entered promiscuous mode [ 1449.090786] device hsr_slave_1 entered promiscuous mode [ 1449.141212] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1449.149896] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1449.157576] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1449.165584] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1449.172373] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1449.182895] device bridge_slave_1 left promiscuous mode [ 1449.188781] bridge0: port 2(bridge_slave_1) entered disabled state [ 1449.245486] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1449.252653] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1449.260449] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1449.267286] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1449.275320] device bridge_slave_1 left promiscuous mode [ 1449.281182] bridge0: port 2(bridge_slave_1) entered disabled state [ 1449.330985] device bridge_slave_0 left promiscuous mode [ 1449.337160] bridge0: port 1(bridge_slave_0) entered disabled state [ 1449.396944] device veth1_macvtap left promiscuous mode [ 1449.402376] device veth0_macvtap left promiscuous mode [ 1449.407738] device veth1_vlan left promiscuous mode [ 1449.412994] device veth0_vlan left promiscuous mode [ 1449.418614] device veth1_macvtap left promiscuous mode [ 1449.424836] device veth0_macvtap left promiscuous mode [ 1449.430569] device veth1_vlan left promiscuous mode [ 1449.435638] device veth0_vlan left promiscuous mode [ 1460.355504] device hsr_slave_1 left promiscuous mode [ 1460.404832] device hsr_slave_0 left promiscuous mode [ 1460.462075] team0 (unregistering): Port device team_slave_1 removed [ 1460.473419] team0 (unregistering): Port device team_slave_0 removed [ 1460.484632] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1460.527168] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1460.594906] bond0 (unregistering): Released all slaves [ 1460.704262] device hsr_slave_1 left promiscuous mode [ 1460.754164] device hsr_slave_0 left promiscuous mode [ 1460.812800] team0 (unregistering): Port device team_slave_1 removed [ 1460.825398] team0 (unregistering): Port device team_slave_0 removed [ 1460.835086] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1460.864335] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1460.944959] bond0 (unregistering): Released all slaves [ 1460.984461] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1461.001185] kauditd_printk_skb: 54 callbacks suppressed [ 1461.001198] audit: type=1400 audit(1579509425.133:5780): avc: denied { map } for pid=26418 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1461.063237] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1461.101064] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1461.109602] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1461.119202] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1461.125835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1461.135161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1461.145052] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1461.151488] 8021q: adding VLAN 0 to HW filter on device team0 [ 1461.160737] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1461.167814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1461.176748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1461.184651] bridge0: port 1(bridge_slave_0) entered blocking state [ 1461.191215] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1461.198716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1461.213811] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1461.223476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1461.233876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1461.242272] bridge0: port 2(bridge_slave_1) entered blocking state [ 1461.248722] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1461.256567] ------------[ cut here ]------------ [ 1461.258187] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1461.263263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1461.269764] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x90 [ 1461.280158] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1461.287409] WARNING: CPU: 1 PID: 20364 at lib/debugobjects.c:325 debug_print_object+0x168/0x250 [ 1461.294220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1461.302715] Kernel panic - not syncing: panic_on_warn set ... [ 1461.302715] [ 1461.302730] CPU: 1 PID: 20364 Comm: kworker/u4:5 Not tainted 4.19.97-syzkaller #0 [ 1461.302735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1461.302753] Workqueue: netns cleanup_net [ 1461.312854] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1461.317327] Call Trace: [ 1461.325524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1461.334776] dump_stack+0x197/0x210 [ 1461.334789] panic+0x26a/0x50e [ 1461.334808] ? __warn_printk+0xf3/0xf3 [ 1461.339933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1461.346361] ? debug_print_object+0x168/0x250 [ 1461.346375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1461.346393] ? __warn.cold+0x5/0x53 [ 1461.351480] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1461.356186] ? __warn+0xe8/0x1d0 [ 1461.360303] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1461.363884] ? debug_print_object+0x168/0x250 [ 1461.368357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1461.375078] __warn.cold+0x20/0x53 [ 1461.375092] ? debug_print_object+0x168/0x250 [ 1461.375105] report_bug+0x263/0x2b0 [ 1461.375125] do_error_trap+0x204/0x360 [ 1461.380381] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1461.385232] ? math_error+0x340/0x340 [ 1461.385246] ? vprintk_emit+0x1ce/0x6d0 [ 1461.385264] ? error_entry+0x7c/0xe0 [ 1461.391579] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1461.395652] ? trace_hardirqs_off_caller+0x65/0x220 [ 1461.400302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1461.405494] ? vprintk_default+0x28/0x30 [ 1461.410887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1461.417210] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1461.422100] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1461.425242] do_invalid_op+0x1b/0x20 [ 1461.430305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1461.433472] invalid_op+0x14/0x20 [ 1461.441561] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1461.444996] RIP: 0010:debug_print_object+0x168/0x250 [ 1461.450119] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1461.452704] Code: dd 60 38 eb 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 60 38 eb 87 48 c7 c7 a0 2d eb 87 e8 a6 7e d4 fd <0f> 0b 83 05 2b 0f 64 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 1461.452710] RSP: 0018:ffff8880475bf830 EFLAGS: 00010082 [ 1461.452719] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 1461.452726] RDX: 0000000000000000 RSI: ffffffff81558bc6 RDI: ffffed1008eb7ef8 [ 1461.452733] RBP: ffff8880475bf870 R08: ffff88808c5c6100 R09: fffffbfff11f16d5 [ 1461.452745] R10: fffffbfff11f16d4 R11: ffffffff88f8b6a3 R12: 0000000000000001 [ 1461.459602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1461.464509] R13: ffffffff88fa2ce0 R14: ffffffff815b0180 R15: ffff888099571fa0 [ 1461.464529] ? __internal_add_timer+0x1f0/0x1f0 [ 1461.464544] ? vprintk_func+0x86/0x189 [ 1461.464562] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1461.479278] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1461.483725] debug_check_no_obj_freed+0x29f/0x464 [ 1461.483743] kfree+0xbd/0x220 [ 1461.483763] kvfree+0x61/0x70 [ 1461.490080] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1461.495281] netdev_freemem+0x4c/0x60 [ 1461.495294] netdev_release+0x86/0xb0 [ 1461.495311] ? xps_cpus_store+0x2b0/0x2b0 [ 1461.499343] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1461.506571] device_release+0x7b/0x210 [ 1461.506584] ? device_remove_bin_file+0x40/0x40 [ 1461.506597] kobject_put+0x193/0x290 [ 1461.506619] netdev_run_todo+0x53b/0x7a0 [ 1461.510767] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1461.517206] ? register_netdev+0x50/0x50 [ 1461.525948] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1461.528273] ? unregister_netdevice_queue+0x1d2/0x2c0 [ 1461.555213] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1461.560349] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1461.560364] ? net_set_todo+0xbf/0x150 [ 1461.560388] rtnl_unlock+0xe/0x10 [ 1461.570845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1461.574960] default_device_exit_batch+0x358/0x410 [ 1461.585894] audit: type=1400 audit(1579509425.383:5781): avc: denied { map } for pid=26419 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1461.588738] ? unregister_netdevice_many+0x50/0x50 [ 1461.632845] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1461.633100] ? rtnl_unlock+0xe/0x10 [ 1461.637605] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1461.640731] ? do_wait_intr_irq+0x2b0/0x2b0 [ 1461.640747] ? rtnl_unlock+0xe/0x10 [ 1461.640759] ? unregister_netdevice_many+0x50/0x50 [ 1461.640776] ? dev_change_net_namespace+0xc60/0xc60 [ 1461.645872] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1461.651505] ops_exit_list.isra.0+0xfc/0x150 [ 1461.651520] cleanup_net+0x404/0x960 [ 1461.651537] ? net_drop_ns+0x90/0x90 [ 1461.658848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1461.660115] ? __lock_is_held+0xb6/0x140 [ 1461.664581] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1461.667935] process_one_work+0x989/0x1750 [ 1461.675436] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1461.678604] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1461.686630] device veth0_vlan entered promiscuous mode [ 1461.689844] ? lock_acquire+0x16f/0x3f0 [ 1461.701572] device veth1_vlan entered promiscuous mode [ 1461.702297] ? kasan_check_write+0x14/0x20 [ 1461.706750] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1461.709623] ? do_raw_spin_lock+0xd7/0x250 [ 1461.719621] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1461.721927] worker_thread+0x98/0xe40 [ 1461.721939] ? trace_hardirqs_on+0x67/0x220 [ 1461.721963] kthread+0x354/0x420 [ 1461.751532] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1461.755813] ? process_one_work+0x1750/0x1750 [ 1461.762735] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1461.765484] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1461.770989] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1461.773551] ret_from_fork+0x24/0x30 [ 1461.779267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1461.783514] [ 1461.783520] ====================================================== [ 1461.783525] WARNING: possible circular locking dependency detected [ 1461.783528] 4.19.97-syzkaller #0 Not tainted [ 1461.783533] ------------------------------------------------------ [ 1461.783538] kworker/u4:5/20364 is trying to acquire lock: [ 1461.783541] 00000000cc7557a3 ((console_sem).lock){-.-.}, at: down_trylock+0x13/0x70 [ 1461.783560] [ 1461.783564] but task is already holding lock: [ 1461.783568] 00000000fcc3346c (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 1461.783581] [ 1461.783586] which lock already depends on the new lock. [ 1461.783588] [ 1461.783590] [ 1461.783595] the existing dependency chain (in reverse order) is: [ 1461.783598] [ 1461.783600] -> #5 (&obj_hash[i].lock){-.-.}: [ 1461.783614] _raw_spin_lock_irqsave+0x95/0xcd [ 1461.783618] debug_object_activate+0x131/0x4e0 [ 1461.783622] enqueue_hrtimer+0x2a/0x3f0 [ 1461.783626] hrtimer_start_range_ns+0x5fb/0xc70 [ 1461.783631] schedule_hrtimeout_range_clock+0x1a0/0x380 [ 1461.783635] schedule_hrtimeout+0x25/0x30 [ 1461.783639] wait_task_inactive+0x4a2/0x630 [ 1461.783644] __kthread_bind_mask+0x24/0xb0 [ 1461.783647] kthread_bind_mask+0x23/0x30 [ 1461.783652] init_rescuer.part.0+0xfc/0x190 [ 1461.783655] workqueue_init+0x51a/0x808 [ 1461.783660] kernel_init_freeable+0x2c0/0x5c8 [ 1461.783664] kernel_init+0x12/0x1c5 [ 1461.783667] ret_from_fork+0x24/0x30 [ 1461.783669] [ 1461.783671] -> #4 (hrtimer_bases.lock){-.-.}: [ 1461.783685] _raw_spin_lock_irqsave+0x95/0xcd [ 1461.783689] lock_hrtimer_base.isra.0+0x75/0x130 [ 1461.783694] hrtimer_start_range_ns+0xff/0xc70 [ 1461.783698] enqueue_task_rt+0x998/0xe70 [ 1461.783703] __sched_setscheduler.constprop.0+0xd1a/0x22f0 [ 1461.783708] _sched_setscheduler+0x105/0x1a0 [ 1461.783712] sched_setscheduler+0xe/0x10 [ 1461.783716] watchdog_dev_init+0xe0/0x1b2 [ 1461.783719] watchdog_init+0x17/0x181 [ 1461.783723] do_one_initcall+0x107/0x78c [ 1461.783728] kernel_init_freeable+0x4d4/0x5c8 [ 1461.783731] kernel_init+0x12/0x1c5 [ 1461.783735] ret_from_fork+0x24/0x30 [ 1461.783737] [ 1461.783739] -> #3 (&rt_b->rt_runtime_lock){-.-.}: [ 1461.783752] _raw_spin_lock+0x2f/0x40 [ 1461.783756] rq_online_rt+0xb4/0x390 [ 1461.783760] set_rq_online.part.0+0xe4/0x140 [ 1461.783765] sched_cpu_activate+0x17f/0x270 [ 1461.783769] cpuhp_invoke_callback+0x201/0x1af0 [ 1461.783773] cpuhp_thread_fun+0x453/0x850 [ 1461.783777] smpboot_thread_fn+0x6a3/0xa30 [ 1461.783781] kthread+0x354/0x420 [ 1461.783785] ret_from_fork+0x24/0x30 [ 1461.783787] [ 1461.783789] -> #2 (&rq->lock){-.-.}: [ 1461.783802] _raw_spin_lock+0x2f/0x40 [ 1461.783805] task_fork_fair+0x6a/0x520 [ 1461.783809] sched_fork+0x3af/0x900 [ 1461.783814] copy_process.part.0+0x1859/0x7a30 [ 1461.783817] _do_fork+0x257/0xfd0 [ 1461.783821] kernel_thread+0x34/0x40 [ 1461.783824] rest_init+0x24/0x222 [ 1461.783828] start_kernel+0x88c/0x8c5 [ 1461.783833] x86_64_start_reservations+0x29/0x2b [ 1461.783837] x86_64_start_kernel+0x77/0x7b [ 1461.783841] secondary_startup_64+0xa4/0xb0 [ 1461.783843] [ 1461.783845] -> #1 (&p->pi_lock){-.-.}: [ 1461.783858] _raw_spin_lock_irqsave+0x95/0xcd [ 1461.783862] try_to_wake_up+0x94/0xf50 [ 1461.783866] wake_up_process+0x10/0x20 [ 1461.783870] __up.isra.0+0x136/0x1a0 [ 1461.783873] up+0x9c/0xe0 [ 1461.783877] __up_console_sem+0xb7/0x1c0 [ 1461.783881] console_unlock+0x6c7/0x10d0 [ 1461.783885] con_install+0x348/0x410 [ 1461.783889] tty_init_dev+0xf7/0x460 [ 1461.783893] tty_open+0x4bf/0xb70 [ 1461.783896] chrdev_open+0x245/0x6b0 [ 1461.783905] do_dentry_open+0x4c3/0x1210 [ 1461.783909] vfs_open+0xa0/0xd0 [ 1461.783913] path_openat+0x10d7/0x45e0 [ 1461.783917] do_filp_open+0x1a1/0x280 [ 1461.783920] do_sys_open+0x3fe/0x550 [ 1461.783925] __x64_sys_open+0x7e/0xc0 [ 1461.783928] do_syscall_64+0xfd/0x620 [ 1461.783933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1461.783935] [ 1461.783937] -> #0 ((console_sem).lock){-.-.}: [ 1461.783950] lock_acquire+0x16f/0x3f0 [ 1461.783955] _raw_spin_lock_irqsave+0x95/0xcd [ 1461.783959] down_trylock+0x13/0x70 [ 1461.783963] __down_trylock_console_sem+0xa8/0x210 [ 1461.783967] console_trylock+0x15/0xa0 [ 1461.783971] vprintk_emit+0x267/0x6d0 [ 1461.783975] vprintk_default+0x28/0x30 [ 1461.783978] vprintk_func+0x7e/0x189 [ 1461.783982] printk+0xba/0xed [ 1461.783985] __warn_printk+0x9b/0xf3 [ 1461.783989] debug_print_object+0x168/0x250 [ 1461.783994] debug_check_no_obj_freed+0x29f/0x464 [ 1461.783997] kfree+0xbd/0x220 [ 1461.784001] kvfree+0x61/0x70 [ 1461.784004] netdev_freemem+0x4c/0x60 [ 1461.784008] netdev_release+0x86/0xb0 [ 1461.784012] device_release+0x7b/0x210 [ 1461.784016] kobject_put+0x193/0x290 [ 1461.784020] netdev_run_todo+0x53b/0x7a0 [ 1461.784024] rtnl_unlock+0xe/0x10 [ 1461.784028] default_device_exit_batch+0x358/0x410 [ 1461.784033] ops_exit_list.isra.0+0xfc/0x150 [ 1461.784037] cleanup_net+0x404/0x960 [ 1461.784041] process_one_work+0x989/0x1750 [ 1461.784044] worker_thread+0x98/0xe40 [ 1461.784048] kthread+0x354/0x420 [ 1461.784052] ret_from_fork+0x24/0x30 [ 1461.784054] [ 1461.784058] other info that might help us debug this: [ 1461.784060] [ 1461.784063] Chain exists of: [ 1461.784065] (console_sem).lock --> hrtimer_bases.lock --> &obj_hash[i].lock [ 1461.784083] [ 1461.784087] Possible unsafe locking scenario: [ 1461.784089] [ 1461.784093] CPU0 CPU1 [ 1461.784097] ---- ---- [ 1461.784099] lock(&obj_hash[i].lock); [ 1461.784109] lock(hrtimer_bases.lock); [ 1461.784118] lock(&obj_hash[i].lock); [ 1461.784126] lock((console_sem).lock); [ 1461.784133] [ 1461.784136] *** DEADLOCK *** [ 1461.784138] [ 1461.784142] 4 locks held by kworker/u4:5/20364: [ 1461.784144] #0: 000000005ffee43d ((wq_completion)"%s""netns"){+.+.}, at: process_one_work+0x87e/0x1750 [ 1461.784161] #1: 00000000d10b7e64 (net_cleanup_work){+.+.}, at: process_one_work+0x8b4/0x1750 [ 1461.784178] #2: 00000000e80f01c2 (pernet_ops_rwsem){++++}, at: cleanup_net+0xae/0x960 [ 1461.784194] #3: 00000000fcc3346c (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 1461.784211] [ 1461.784214] stack backtrace: [ 1461.784220] CPU: 1 PID: 20364 Comm: kworker/u4:5 Not tainted 4.19.97-syzkaller #0 [ 1461.784227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1461.784231] Workqueue: netns cleanup_net [ 1461.784237] Call Trace: [ 1461.784240] dump_stack+0x197/0x210 [ 1461.784245] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 1461.784249] __lock_acquire+0x2e19/0x49c0 [ 1461.784253] ? mark_held_locks+0x100/0x100 [ 1461.784257] ? format_decode+0x25f/0xbc0 [ 1461.784262] ? enable_ptr_key_workfn+0x30/0x30 [ 1461.784265] ? kvm_clock_read+0x18/0x30 [ 1461.784269] lock_acquire+0x16f/0x3f0 [ 1461.784273] ? down_trylock+0x13/0x70 [ 1461.784277] _raw_spin_lock_irqsave+0x95/0xcd [ 1461.784281] ? down_trylock+0x13/0x70 [ 1461.784285] ? vprintk_emit+0x267/0x6d0 [ 1461.784289] down_trylock+0x13/0x70 [ 1461.784293] ? vprintk_emit+0x267/0x6d0 [ 1461.784297] __down_trylock_console_sem+0xa8/0x210 [ 1461.784301] console_trylock+0x15/0xa0 [ 1461.784305] vprintk_emit+0x267/0x6d0 [ 1461.784309] ? __internal_add_timer+0x1f0/0x1f0 [ 1461.784313] vprintk_default+0x28/0x30 [ 1461.784316] vprintk_func+0x7e/0x189 [ 1461.784320] printk+0xba/0xed [ 1461.784324] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1461.784328] ? __lock_acquire+0x6ee/0x49c0 [ 1461.784332] ? __warn_printk+0x8f/0xf3 [ 1461.784336] ? work_on_cpu_safe+0x90/0x90 [ 1461.784340] __warn_printk+0x9b/0xf3 [ 1461.784344] ? add_taint.cold+0x16/0x16 [ 1461.784348] ? lock_downgrade+0x880/0x880 [ 1461.784352] ? work_on_cpu_safe+0x90/0x90 [ 1461.784356] debug_print_object+0x168/0x250 [ 1461.784361] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1461.784365] debug_check_no_obj_freed+0x29f/0x464 [ 1461.784368] kfree+0xbd/0x220 [ 1461.784372] kvfree+0x61/0x70 [ 1461.784376] netdev_freemem+0x4c/0x60 [ 1461.784379] netdev_release+0x86/0xb0 [ 1461.784383] ? xps_cpus_store+0x2b0/0x2b0 [ 1461.784387] device_release+0x7b/0x210 [ 1461.784391] ? device_remove_bin_file+0x40/0x40 [ 1461.784395] kobject_put+0x193/0x290 [ 1461.784399] netdev_run_todo+0x53b/0x7a0 [ 1461.784403] ? register_netdev+0x50/0x50 [ 1461.784407] ? unregister_netdevice_queue+0x1d2/0x2c0 [ 1461.784412] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1461.784416] ? net_set_todo+0xbf/0x150 [ 1461.784419] rtnl_unlock+0xe/0x10 [ 1461.784424] default_device_exit_batch+0x358/0x410 [ 1461.784428] ? unregister_netdevice_many+0x50/0x50 [ 1461.784432] ? rtnl_unlock+0xe/0x10 [ 1461.784436] ? do_wait_intr_irq+0x2b0/0x2b0 [ 1461.784440] ? rtnl_unlock+0xe/0x10 [ 1461.784444] ? unregister_netdevice_many+0x50/0x50 [ 1461.784449] ? dev_change_net_namespace+0xc60/0xc60 [ 1461.784453] ops_exit_list.isra.0+0xfc/0x150 [ 1461.784457] cleanup_net+0x404/0x960 [ 1461.784460] ? net_drop_ns+0x90/0x90 [ 1461.784464] ? __lock_is_held+0xb6/0x140 [ 1461.784468] process_one_work+0x989/0x1750 [ 1461.784472] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1461.784476] ? lock_acquire+0x16f/0x3f0 [ 1461.784480] ? kasan_check_write+0x14/0x20 [ 1461.784484] ? do_raw_spin_lock+0xd7/0x250 [ 1461.784488] worker_thread+0x98/0xe40 [ 1461.784492] ? trace_hardirqs_on+0x67/0x220 [ 1461.784495] kthread+0x354/0x420 [ 1461.784500] ? process_one_work+0x1750/0x1750 [ 1461.784505] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1461.784508] ret_from_fork+0x24/0x30 [ 1461.791466] Kernel Offset: disabled [ 1462.889280] Rebooting in 86400 seconds..