[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 11.963643] random: sshd: uninitialized urandom read (32 bytes read) [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 13.531044] random: crng init done Warning: Permanently added '10.128.0.149' (ECDSA) to the list of known hosts. 2019/05/01 09:27:04 fuzzer started 2019/05/01 09:27:08 dialing manager at 10.128.0.26:42169 2019/05/01 09:27:08 syscalls: 1359 2019/05/01 09:27:08 code coverage: enabled 2019/05/01 09:27:08 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/05/01 09:27:08 extra coverage: extra coverage is not supported by the kernel 2019/05/01 09:27:08 setuid sandbox: enabled 2019/05/01 09:27:08 namespace sandbox: enabled 2019/05/01 09:27:08 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/01 09:27:08 fault injection: kernel does not have systematic fault injection support 2019/05/01 09:27:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/01 09:27:08 net packet injection: enabled 2019/05/01 09:27:08 net device setup: enabled 09:28:21 executing program 0: stat(0x0, 0x0) syz_open_procfs(0x0, 0x0) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:28:21 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000600)="260f93cea84a2ae92c431cd20f05bf0c000000c4a37bf0c55c41e2e98fa838ee11c5660fde978fe97c8047d1e3e316b8c4014e4e0b5b5b016d7d14dec422adaf50e3c4e10bf8efc4e2c470c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaff20f5d893b3b419538f6af3e6766f2ab38e366410f565e00ac1111c4c3214cb9a5604b19c2c443115da7010001000df0558171a30b8a82cf6ecf6e542c3d27f2a500a80dd4d48f6978d25debc481f87764008de3c0f526264788fef6a1dd7dbbbfdd88f65cf6c649bedcdca1c9660fd33b110f66474f383ae34ba29fb7e2") 09:28:21 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 09:28:21 executing program 3: pause() syz_execute_func(&(0x7f00000008c0)="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") 09:28:21 executing program 4: socket$inet6(0x10, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) pause() syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(0x0) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e1a5f97300c46269f7a41d000000003a8e16649c675181617b12e564660f2ef4c442019dccd2111db8d36f") syz_execute_func(&(0x7f0000000040)="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") [ 111.600081] audit: type=1400 audit(1556702903.950:5): avc: denied { associate } for pid=2124 comm="syz-executor.2" name="syz2" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 09:28:24 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:24 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) [ 111.696167] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3007 comm=syz-executor.2 09:28:24 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 09:28:24 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x408000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000040)=""/11, 0xb}, 0x120) write$UHID_INPUT2(r0, &(0x7f0000000740)={0xc, 0x3b3}, 0x6) 09:28:24 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) [ 111.770018] audit: type=1400 audit(1556702904.120:6): avc: denied { create } for pid=3008 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 09:28:24 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:24 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r0, r1, 0x0, 0xe6) 09:28:24 executing program 0: [ 111.773744] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3030 comm=syz-executor.2 [ 111.789437] Unable to find swap-space signature [ 111.816815] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3034 comm=syz-executor.2 [ 111.847133] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3048 comm=syz-executor.2 [ 111.857967] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 111.857980] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 111.857992] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 111.858004] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 111.860650] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 111.860664] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 111.860676] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 111.860689] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 111.860701] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 111.860713] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 111.860725] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 111.863083] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 [ 111.872625] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 111.872639] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 111.872651] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 111.872663] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 111.872675] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 111.872687] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 111.872699] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 111.872711] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 111.872723] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 111.872736] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 111.872747] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 111.875335] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 [ 111.898766] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3056 comm=syz-executor.2 [ 112.162404] audit: type=1400 audit(1556702904.510:7): avc: denied { write } for pid=3008 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 112.191180] audit: type=1400 audit(1556702904.540:8): avc: denied { read } for pid=3008 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes 09:28:25 executing program 1: 09:28:25 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r0, r1, 0x0, 0xe6) 09:28:25 executing program 0: 09:28:25 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:25 executing program 4: 09:28:25 executing program 3: 09:28:25 executing program 0: 09:28:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x8000000003, 0x300) dup2(r1, r0) 09:28:25 executing program 4: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1400) 09:28:25 executing program 3: clone(0x80002102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) 09:28:25 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:25 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, 0x0, 0x0) 09:28:25 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000000210007ba, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000240)='big_key\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0xffffffffffffff55, 0xfffffffffffffffb) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@filename='.\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x9008, 0x0) 09:28:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000080)=""/241, &(0x7f0000000180)=0xf1) 09:28:25 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r0, r1, 0x0, 0xe6) [ 112.731915] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3081 comm=syz-executor.2 [ 112.755193] hrtimer: interrupt took 45426 ns 09:28:25 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 09:28:25 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x200000000000001, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(0xffffffffffffffff, 0x0) connect$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 09:28:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f00000001c0)=""/241, 0xf1) [ 112.823354] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3113 comm=syz-executor.2 09:28:25 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e24}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0x51, 0x100000000000000}, 0x40002102) 09:28:25 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 09:28:25 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:25 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 09:28:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x802, 0x0) write(r1, &(0x7f0000000100)="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", 0xfc) [ 112.902734] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3133 comm=syz-executor.2 09:28:25 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e24}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0x51, 0x100000000000000}, 0x40002102) 09:28:25 executing program 0: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) [ 112.950829] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3144 comm=syz-executor.2 09:28:25 executing program 0: r0 = socket$inet(0x2, 0x3, 0xc) sendmmsg(r0, &(0x7f000000f9c0)=[{{&(0x7f0000000000)=@un=@abs, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="10"], 0x1}}], 0x1, 0x0) 09:28:25 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 09:28:25 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") unshare(0x40000000) r1 = socket$inet(0x2, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @broadcast}, {0x0, @random="12d71a4363c2"}, 0x56, {0x2, 0x4e20, @loopback}, 'irlan0\x00'}) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'nat\x00\x00\x00\x00\x00\x00\x01\x00'}, &(0x7f00000001c0)=0x54) [ 112.991259] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.3'. [ 113.019572] raw_sendmsg: syz-executor.0 forgot to set AF_INET. Fix it! [ 113.022259] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3159 comm=syz-executor.2 09:28:26 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b1001020000000000400000000000"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 09:28:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a0001000300"/57, 0x39}], 0x1) 09:28:26 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:26 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, 0xffffffffffffffff, 0x0, 0xe6) 09:28:26 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 09:28:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") unshare(0x40000000) r1 = socket$inet(0x2, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @broadcast}, {0x0, @random="12d71a4363c2"}, 0x56, {0x2, 0x4e20, @loopback}, 'irlan0\x00'}) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'nat\x00\x00\x00\x00\x00\x00\x01\x00'}, &(0x7f00000001c0)=0x54) 09:28:26 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000001c0)) 09:28:26 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, 0xffffffffffffffff, 0x0, 0xe6) 09:28:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a0001000300"/57, 0x39}], 0x1) 09:28:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r1 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000140)=r1) sendto$inet6(r0, 0x0, 0x28e, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) [ 113.068684] PF_BRIDGE: FDB add only supported for Ethernet devices[ 113.724968] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.1'. 09:28:26 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, 0xffffffffffffffff, 0x0, 0xe6) [ 113.791436] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.1'. 09:28:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") io_setup(0x1, &(0x7f0000000040)) 09:28:26 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:26 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) 09:28:26 executing program 2: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(0xffffffffffffffff, r0, 0x0, 0xe6) 09:28:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a0001000300"/57, 0x39}], 0x1) [ 113.880884] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.1'. 09:28:26 executing program 2: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(0xffffffffffffffff, r0, 0x0, 0xe6) 09:28:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) lsetxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r1, 0x0, 0x0) 09:28:26 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a0001000300"/57, 0x39}], 0x1) 09:28:26 executing program 4: r0 = socket$inet(0x2, 0x3, 0xc) sendmmsg(r0, &(0x7f000000f9c0)=[{{&(0x7f0000000000)=@un=@abs, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1000000000000000010000003b23705c"], 0x10}}], 0x1, 0x0) 09:28:26 executing program 2: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(0xffffffffffffffff, r0, 0x0, 0xe6) 09:28:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x8000000003, 0x300) dup2(r1, r0) 09:28:26 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:26 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a0001000300"/57, 0x39}], 0x1) [ 114.011841] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.1'. 09:28:27 executing program 3: pause() syz_execute_func(&(0x7f0000000e00)="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") 09:28:27 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a0001000300"/57, 0x39}], 0x1) 09:28:27 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 09:28:27 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) lsetxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r1, 0x0, 0x0) 09:28:27 executing program 4: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1002, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) 09:28:27 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 09:28:27 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:27 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a0001000300"/57, 0x39}], 0x1) 09:28:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x10000089a0, &(0x7f0000000000)) 09:28:27 executing program 1: socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a0001000300"/57, 0x39}], 0x1) 09:28:27 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 09:28:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)) clock_nanosleep(0x2, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000000)) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) tkill(r1, 0x1000000000016) 09:28:27 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:27 executing program 1: socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a0001000300"/57, 0x39}], 0x1) 09:28:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f000037d000)=[{&(0x7f0000000000)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00\x03\xb1\x00\x00\x00\x00`\x00\xdd\x00\x00\x04\x00'}) [ 115.554416] audit: type=1400 audit(1556702907.910:9): avc: denied { create } for pid=3310 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 115.581771] audit: type=1400 audit(1556702907.930:10): avc: denied { write } for pid=3310 comm="syz-executor.4" path="socket:[8146]" dev="sockfs" ino=8146 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 115.614490] audit: type=1400 audit(1556702907.960:11): avc: denied { ioctl } for pid=3310 comm="syz-executor.4" path="socket:[8146]" dev="sockfs" ino=8146 ioctlcmd=0x8914 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 09:28:28 executing program 0: 09:28:28 executing program 2: inotify_init1(0x0) r0 = socket(0x0, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 09:28:28 executing program 1: socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a0001000300"/57, 0x39}], 0x1) 09:28:28 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00\x11$X\x89Maznj*\xb6p\x9as\x89\xaag\xe9a\xe5Gf\x1a\xcd\x11\x8c\xf1F\xbb\xfd\xff&\x1ed\x0f\xc9c\x11\xd3\xd9?\xcf\xd1\xb9=~\x1e.}\a\xb1\xe1\xe6X!\xdf\x9a\xec\x0e+e\xfa\x9dVh\xc7', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 09:28:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, 0x0, 0x0) 09:28:28 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:28 executing program 2: inotify_init1(0x0) r0 = socket(0x0, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 09:28:28 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000011c0)=""/4096, 0x1000}], 0x1, 0x0) 09:28:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000001980)={0x2, &(0x7f0000000580)=[{0x48000015, 0x0, 0x0, 0xfffffffffffffffd}, {0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 09:28:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, 0x0, 0x0) 09:28:28 executing program 2: inotify_init1(0x0) r0 = socket(0x0, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 09:28:28 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 09:28:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000001c0)="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") write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffff3f}, 0xffffff09) 09:28:28 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 09:28:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, 0x0, 0x0) 09:28:28 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 09:28:28 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 00:01:55 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) [ 116.335976] audit: type=1400 audit(115.133:12): avc: denied { syslog } for pid=3365 comm="syz-executor.4" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 00:01:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000001980)={0x2, &(0x7f0000000580)=[{0x48000015, 0x0, 0x0, 0xfffffffffffffffd}, {0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 00:01:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000), 0x0) 00:01:55 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:55 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 00:01:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000000740)) 00:01:55 executing program 0: 00:01:55 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 00:01:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000), 0x0) 00:01:55 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:55 executing program 3: 00:01:55 executing program 4: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000480), 0x10) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x10) unlink(&(0x7f0000000040)='./bus\x00') 00:01:55 executing program 3: 00:01:55 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 00:01:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000), 0x0) 00:01:55 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:55 executing program 3: 00:01:55 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) [ 116.546924] FAT-fs (loop4): codepage cp437 not found 00:01:55 executing program 0: r0 = socket$inet(0x2, 0x3, 0xc) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000080), 0x4) 00:01:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{0x0}], 0x1) 00:01:55 executing program 4: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000021c0)=""/79, 0x4f) lseek(r0, 0xfffffffffffffff8, 0x1) getdents(r0, 0x0, 0x11a) 00:01:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0xa, 0xd101}}, 0xf0}}, 0x0) 00:01:55 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 00:01:55 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:55 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000000)="296d55a756926395598486ccfe2796fdc3b82f5f54af57377dc4418a09") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 00:01:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{0x0}], 0x1) 00:01:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2709645e1ef40c76bef083e1b478c2c7431b4f00"], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) 00:01:55 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x40}}, 0x0) 00:01:55 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000006c0)={0x40000000000002, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2d, &(0x7f0000000400)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) [ 116.825430] selinux_nlmsg_perm: 4 callbacks suppressed [ 116.825451] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3451 comm=syz-executor.2 00:01:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{0x0}], 0x1) 00:01:55 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:55 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 00:01:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)}], 0x1) 00:01:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) 00:01:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000006c0)={0x40000000000002, {{0x2, 0x0, @multicast2}}}, 0x88) [ 116.971209] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3485 comm=syz-executor.2 00:01:56 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, 0x0) 00:01:56 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)}], 0x1) 00:01:56 executing program 0: r0 = socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x3f, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) open(&(0x7f00000000c0)='./bus\x00', 0x2000000000141042, 0x0) r3 = creat(0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r3, 0x380000000000000}) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000080)) 00:01:56 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 00:01:56 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$unix(r1, &(0x7f00000002c0)=@file={0x0, './bus\x00'}, 0x6e) 00:01:56 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)}], 0x1) 00:01:56 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) 00:01:56 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff07250000004500010700", 0x1d}], 0x1) [ 117.670537] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3510 comm=syz-executor.2 00:01:56 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) [ 117.708976] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3519 comm=syz-executor.2 00:01:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000), &(0x7f00000000c0)=0xffffffffffffff07) 00:01:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff07250000004500010700", 0x1d}], 0x1) 00:01:56 executing program 4: unlink(&(0x7f00000000c0)='./file0\x00') [ 117.779662] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3527 comm=syz-executor.2 00:01:56 executing program 0: syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@broadcast, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=0xffffffffffffffff, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 00:01:56 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, 0x0) sendfile(r0, r1, 0x0, 0xe6) 00:01:56 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x476, 0x101002) write$evdev(r0, &(0x7f0000000100)=[{{0x0, 0x7530}, 0x1, 0x40000000000003a}], 0x17be) 00:01:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff07250000004500010700", 0x1d}], 0x1) 00:01:56 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40000400000002c2, 0x0) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) listen(r1, 0x0) accept(r1, 0x0, 0x0) close(r0) execve(0x0, 0x0, 0x0) fchmod(r0, 0x0) 00:01:56 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a0001", 0x2b}], 0x1) 00:01:56 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) 00:01:56 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:56 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, 0x0) sendfile(r0, r1, 0x0, 0xe6) [ 117.923544] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3551 comm=syz-executor.2 00:01:56 executing program 4: r0 = socket$inet(0x2, 0x3, 0xc) sendmmsg(r0, &(0x7f000000f9c0)=[{{&(0x7f0000000000)=@un=@abs, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1000000000000000010000003d000000"], 0x10}}], 0x1, 0x0) 00:01:56 executing program 5: mkdir(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a0001", 0x2b}], 0x1) 00:01:56 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000140), 0x4000000000001fc, 0x0) 00:01:56 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 00:01:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a0001", 0x2b}], 0x1) 00:01:56 executing program 5: mkdir(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:56 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, 0x0) sendfile(r0, r1, 0x0, 0xe6) [ 118.009809] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3573 comm=syz-executor.2 00:01:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2}}], 0x1, 0x0) 00:01:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x16, 0x0, &(0x7f0000000180)) 00:01:56 executing program 5: mkdir(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:56 executing program 0: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x400) 00:01:56 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setpipe(r0, 0x407, 0x0) r2 = dup2(r0, r0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0x20}, 0x20) vmsplice(r0, &(0x7f0000000440)=[{&(0x7f0000000240)="9e", 0x1}], 0x1, 0x0) read$FUSE(r2, &(0x7f0000000880), 0x1000) 00:01:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a000100030000000000", 0x32}], 0x1) 00:01:56 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)) sendfile(r0, r1, 0x0, 0xe6) [ 118.096104] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3603 comm=syz-executor.2 [ 118.180604] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3620 comm=syz-executor.2 00:01:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a000100030000000000", 0x32}], 0x1) 00:01:57 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:57 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) 00:01:57 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)) sendfile(r0, r1, 0x0, 0xe6) 00:01:57 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000140), 0x4000000000001fc, 0x0) 00:01:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2d, &(0x7f0000000400)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) 00:01:57 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000200)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0)=[{}], 0x0}, &(0x7f0000000280)=0x50) 00:01:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x60, 0x0, &(0x7f0000000180)) 00:01:57 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a000100030000000000", 0x32}], 0x1) 00:01:57 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)) sendfile(r0, r1, 0x0, 0xe6) [ 118.489305] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=3634 comm=syz-executor.2 00:01:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a00010003000000000000000000", 0x36}], 0x1) 00:01:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'gretap0\x00', {0x2, 0x0, @loopback}}) 00:01:57 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:57 executing program 0: clock_nanosleep(0x0, 0x0, 0x0, &(0x7f0000000040)) 00:01:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a00010003000000000000000000", 0x36}], 0x1) 00:01:57 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000140), 0x4000000000001fc, 0x0) 00:01:57 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") sendfile(r0, r1, 0x0, 0xe6) 00:01:57 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:57 executing program 0: mknod(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x9008, 0x0) 00:01:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a00010003000000000000000000", 0x36}], 0x1) 00:01:57 executing program 3: syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@broadcast, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=0x7f000000, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 00:01:57 executing program 3: perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:01:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a0001000300"/56, 0x38}], 0x1) 00:01:57 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") sendfile(r0, r1, 0x0, 0xe6) 00:01:57 executing program 0: add_key(&(0x7f0000000200)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 00:01:57 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:57 executing program 3: keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0), 0x0, &(0x7f0000000180)="f0998b39e9373054a468052b90fe4139804c9d80c430e0d73601c41f6e86dd6f7355e90552b8afe5c33307162a502cbfcfa3292ab683f340f54fe0ce678ebe6494a88a28acdfa6d9c8f2e69ed4e3b67a0ca05950212371b8a44e27bb14d8098558d256ea8d85f05f00b1", 0x0) 00:01:58 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") sendfile(r0, r1, 0x0, 0xe6) 00:01:58 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7}]}, 0x40}}, 0x0) 00:01:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a0001000300"/56, 0x38}], 0x1) 00:01:58 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") r1 = socket(0x2, 0x1, 0x0) listen(r1, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x10000014}) socket$nl_generic(0x10, 0x3, 0x10) epoll_wait(r2, &(0x7f000000cff0)=[{}], 0x1, 0xfffffffffffffff7) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000007ffc), 0x4) 00:01:58 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x5) 00:01:58 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319b") sendfile(r0, r1, 0x0, 0xe6) 00:01:58 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000000ff0725000000450001070000001419001a00120002000a0001000300"/56, 0x38}], 0x1) 00:01:58 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000006c0)={0x40000000000002, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 119.340322] EXT4-fs warning (device sda1): ext4_group_extend:1738: can't shrink FS - resize aborted 00:01:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000480)='\x00', 0x1, 0x0, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000000)=""/64, 0x40, 0x10002, 0x0, 0x0) 00:01:58 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319b") sendfile(r0, r1, 0x0, 0xe6) 00:01:58 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000006c0)={0x40000000000002, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2d, &(0x7f0000000400)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) 00:01:58 executing program 3: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffff8, 0x1) 00:01:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) 00:01:58 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319b") sendfile(r0, r1, 0x0, 0xe6) 00:01:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f000037d000)=[{&(0x7f0000000000)="1f000000020319000000070000000681", 0x10}], 0x1) 00:01:58 executing program 3: prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000340)) 00:01:58 executing program 1: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) 00:01:58 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff91, 0xc2, 0x0, 0x0) 00:01:58 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd0") sendfile(r0, r1, 0x0, 0xe6) 00:01:59 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)='/dev/vhost-vsock\x00') 00:01:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) 00:01:59 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:59 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd0") sendfile(r0, r1, 0x0, 0xe6) 00:01:59 executing program 4: syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@broadcast, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x8906, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 00:01:59 executing program 3: r0 = socket$inet(0x2, 0x3, 0xc) sendmmsg(r0, &(0x7f000000f9c0)=[{{&(0x7f0000000000)=@un=@abs, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="2400000000000000010000003b23705c"], 0x10}}], 0x1, 0x0) 00:01:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) recvfrom$inet(r0, 0x0, 0x0, 0x10002, 0x0, 0x0) 00:01:59 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd0") sendfile(r0, r1, 0x0, 0xe6) 00:01:59 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:59 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) tee(r0, r0, 0x2, 0x0) 00:01:59 executing program 3: socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) creat(&(0x7f0000000200)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x2000000000141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x380000000000000}) 00:01:59 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:59 executing program 2: inotify_init1(0x0) socket(0x10, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(0xffffffffffffffff, r0, 0x0, 0xe6) 00:01:59 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) tee(r0, 0xffffffffffffffff, 0x2, 0x0) 00:01:59 executing program 4: pause() syz_execute_func(&(0x7f0000000040)="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") 00:01:59 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) 00:01:59 executing program 2: inotify_init1(0x0) socket(0x10, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(0xffffffffffffffff, r0, 0x0, 0xe6) 00:01:59 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:59 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) 00:01:59 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') 00:01:59 executing program 2: inotify_init1(0x0) socket(0x10, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(0xffffffffffffffff, r0, 0x0, 0xe6) 00:01:59 executing program 0: 00:01:59 executing program 1: 00:01:59 executing program 0: 00:01:59 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:01:59 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, 0xffffffffffffffff, 0x0, 0xe6) [ 121.115749] warning: process `syz-executor.4' used the deprecated sysctl system call with [ 121.148956] 00:02:00 executing program 4: 00:02:00 executing program 0: syz_execute_func(&(0x7f0000000180)="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") 00:02:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x38}}, 0x0) 00:02:00 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, 0xffffffffffffffff, 0x0, 0xe6) 00:02:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 00:02:00 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:02:00 executing program 4: 00:02:00 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, 0xffffffffffffffff, 0x0, 0xe6) 00:02:00 executing program 3: 00:02:00 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 121.916085] audit: type=1400 audit(120.703:13): avc: denied { wake_alarm } for pid=3877 comm="syz-executor.0" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 00:02:00 executing program 4: 00:02:00 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0x0) 00:02:00 executing program 3: 00:02:01 executing program 0: 00:02:01 executing program 1: 00:02:01 executing program 4: 00:02:01 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0x0) 00:02:01 executing program 3: 00:02:01 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:02:01 executing program 1: 00:02:01 executing program 0: 00:02:01 executing program 4: 00:02:01 executing program 3: 00:02:01 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:02:01 executing program 1: 00:02:01 executing program 2: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0x0) 00:02:01 executing program 4: 00:02:01 executing program 0: 00:02:01 executing program 3: 00:02:01 executing program 4: 00:02:01 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f00000000c0)='./file0\x00') r1 = gettid() mount$fuseblk(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x1f) 00:02:01 executing program 3: 00:02:01 executing program 1: 00:02:01 executing program 2: 00:02:01 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:02:01 executing program 4: 00:02:01 executing program 3: 00:02:01 executing program 1: 00:02:01 executing program 2: 00:02:01 executing program 4: 00:02:01 executing program 2: 00:02:01 executing program 1: 00:02:01 executing program 0: 00:02:01 executing program 3: 00:02:01 executing program 1: 00:02:01 executing program 4: 00:02:01 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 00:02:01 executing program 2: 00:02:01 executing program 4: 00:02:01 executing program 1: 00:02:01 executing program 3: 00:02:01 executing program 2: 00:02:01 executing program 0: 00:02:01 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(0x0) 00:02:01 executing program 1: 00:02:01 executing program 2: 00:02:02 executing program 3: 00:02:02 executing program 4: 00:02:02 executing program 0: 00:02:02 executing program 1: 00:02:02 executing program 2: 00:02:02 executing program 3: 00:02:02 executing program 1: 00:02:02 executing program 0: 00:02:02 executing program 4: 00:02:02 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(0x0) 00:02:02 executing program 2: 00:02:02 executing program 1: 00:02:02 executing program 3: 00:02:02 executing program 4: 00:02:02 executing program 0: 00:02:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) 00:02:02 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000240)={0x2, 0x0, @empty}, 0x10) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 00:02:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'lo\x00'}) r2 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) 00:02:02 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(0x0) 00:02:02 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) waitid(0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)) 00:02:02 executing program 3: 00:02:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x3f, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) open(&(0x7f00000000c0)='./bus\x00', 0x2000000000141042, 0x0) creat(0x0, 0x0) 00:02:02 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000000780), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x1ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000000000000700080000ee8b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf0000"], 0x2c) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 00:02:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000340), 0x1000) 00:02:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0) 00:02:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000080)={'veth1_to_team\x00', {0x2, 0x0, @empty}}) 00:02:02 executing program 4: r0 = socket$inet(0x2, 0x3, 0xc) sendmmsg(r0, &(0x7f000000f9c0)=[{{&(0x7f0000000000)=@un=@abs={0xa}, 0x80, 0x0}}], 0x1, 0x0) 00:02:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x0, @remote}}) 00:02:02 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x80000, 0x0) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x3f, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) open(&(0x7f00000000c0)='./bus\x00', 0x2000000000141042, 0x0) creat(0x0, 0x0) 00:02:02 executing program 0: r0 = socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000000240)='/dev/loop-control\x00') unshare(0x20600) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x3f, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) r4 = creat(0x0, 0x0) ftruncate(r4, 0x208200) open(&(0x7f00000000c0)='./bus\x00', 0x2000000000141042, 0x0) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x380000000000000}) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000080)) 00:02:02 executing program 2: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x88, 0x80, 0x0, 0x3) [ 123.573266] FAT-fs (loop3): codepage cp437 not found 00:02:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x200000000000001, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 00:02:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:02:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='illinois\x00', 0x9) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) [ 124.224829] FAT-fs (loop3): codepage cp437 not found 00:02:03 executing program 5: r0 = socket$inet(0x2, 0x2000000080002, 0x0) fremovexattr(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='user.']) 00:02:03 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) 00:02:03 executing program 4: r0 = socket(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000200)={'filter\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f0000000280)=0x50) 00:02:03 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x80000, 0x0) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x3f, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) open(&(0x7f00000000c0)='./bus\x00', 0x2000000000141042, 0x0) creat(0x0, 0x0) 00:02:03 executing program 0: syz_execute_func(&(0x7f0000000500)="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") 00:02:03 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000000780), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x1ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000000000000700080000ee8b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf0000"], 0x2c) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 00:02:03 executing program 5: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x88, 0x80, 0x0, 0x220) 00:02:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:02:03 executing program 2: clone(0x2122005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) 00:02:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffc17, 0x0, 0x0, 0x0) 00:02:03 executing program 4: mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000001000/0x3000)=nil) [ 124.368450] FAT-fs (loop3): codepage cp437 not found 00:02:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x1ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000000000000700080000ee8b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09"], 0x37) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 00:02:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:02:03 executing program 5: 00:02:03 executing program 1: 00:02:03 executing program 1: [ 124.541555] FAT-fs (loop4): codepage cp437 not found 00:02:04 executing program 0: 00:02:04 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000780), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x1ce, 0x0, 0x1, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000000000000700080000ee8b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad55034da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428ebccb7840c131aef785f25df"], 0x6e) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 00:02:04 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000400)={0x500, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 00:02:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x330) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0ad61f123c123f319bd070") ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x801c581f, &(0x7f0000000080)) 00:02:04 executing program 3: 00:02:04 executing program 3: 00:02:04 executing program 0: [ 125.261924] FAT-fs (loop2): codepage cp437 not found [ 125.331399] FAT-fs (loop4): codepage cp437 not found 00:02:04 executing program 4: 00:02:04 executing program 5: 00:02:04 executing program 3: 00:02:04 executing program 0: 00:02:04 executing program 1: 00:02:04 executing program 3: 00:02:04 executing program 1: 00:02:04 executing program 5: 00:02:04 executing program 0: 00:02:04 executing program 3: 00:02:04 executing program 2: 00:02:04 executing program 4: [ 126.038584] FAT-fs (loop2): codepage cp437 not found 00:02:04 executing program 1: 00:02:04 executing program 5: 00:02:04 executing program 0: 00:02:04 executing program 1: 00:02:04 executing program 2: 00:02:04 executing program 3: 00:02:04 executing program 4: 00:02:04 executing program 0: 00:02:04 executing program 5: 00:02:04 executing program 1: 00:02:04 executing program 2: 00:02:04 executing program 3: 00:02:04 executing program 4: 00:02:05 executing program 3: 00:02:05 executing program 2: 00:02:05 executing program 4: 00:02:05 executing program 0: 00:02:05 executing program 5: 00:02:05 executing program 2: 00:02:05 executing program 1: 00:02:05 executing program 0: 00:02:05 executing program 4: 00:02:05 executing program 5: 00:02:05 executing program 3: 00:02:05 executing program 2: 00:02:05 executing program 0: 00:02:05 executing program 1: 00:02:05 executing program 4: 00:02:05 executing program 3: 00:02:05 executing program 5: 00:02:05 executing program 2: 00:02:05 executing program 4: 00:02:05 executing program 1: 00:02:05 executing program 0: 00:02:05 executing program 3: 00:02:05 executing program 5: 00:02:05 executing program 2: 00:02:05 executing program 4: 00:02:05 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2709645e1ef40c76bef083e1b478c2c7431b4f00"], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) 00:02:05 executing program 5: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000000)="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") socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 00:02:05 executing program 2: 00:02:05 executing program 4: 00:02:05 executing program 0: 00:02:05 executing program 1: 00:02:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_vs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00\x13\xcd\xe8\xe9Z\x02\x12[x\x99e\a\xafs\x95\xbbv\xb2\x8f5\xcd\x05\x89\x7f\xe8w\xc2\xc1\x9daZ\x99\x16\x12\x85O\xdb') sendfile(r1, r0, 0x0, 0x7ffc) 00:02:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') sendfile(r0, r0, &(0x7f00000001c0)=0xa00, 0x7ffc) 00:02:05 executing program 1: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="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", 0xfc) 00:02:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f719bd070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, 0x23, 0x847, 0x0, 0x0, {0x2804}}, 0x14}}, 0x0) [ 126.489649] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 126.532732] CPU: 1 PID: 4290 Comm: syz-executor.5 Not tainted 4.9.171+ #49 00:02:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, 0x23, 0x847, 0x0, 0x0, {0x2804}}, 0x14}}, 0x0) 00:02:05 executing program 0: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000000)="994a2ae92c10964c0f05bf03000000c4a37bf0c50141e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79ce66469ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") [ 126.539792] ffff8801cfdbf968 ffffffff81b4fb61 1ffff10039fb7f2f ffff8801ccfc8000 [ 126.547894] ffffffff82aa9a20 0000000000000001 0000000000400000 ffff8801cfdbfa90 [ 126.556537] ffffffff815026f3 0000000041b58ab3 ffffffff82e37c98 ffffffff8142c490 [ 126.564639] Call Trace: [ 126.567287] [<00000000a979fb36>] dump_stack+0xc1/0x120 [ 126.572678] [<000000004dca2060>] warn_alloc.cold+0x76/0x93 [ 126.578502] [<00000000346419e7>] ? zone_watermark_ok_safe+0x260/0x260 [ 126.585195] [<00000000fbff7cc1>] ? avc_has_perm+0x164/0x3a0 [ 126.590408] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.1'. [ 126.590412] PF_BRIDGE: RTM_NEWNEIGH with unknown ifindex [ 126.605105] [<00000000bd762abf>] __vmalloc_node_range+0x363/0x610 [ 126.611442] [<0000000013d6593b>] ? check_preemption_disabled+0x3c/0x200 [ 126.618484] [<000000000d29c3b6>] ? task_has_security+0x130/0x270 [ 126.624718] [<000000009a6c82a2>] vmalloc+0x5c/0x70 [ 126.629716] [<00000000793d1152>] ? sel_write_load+0x119/0xf60 [ 126.635700] [<00000000793d1152>] sel_write_load+0x119/0xf60 [ 126.641508] [<000000002550fddb>] ? add_lock_to_list.isra.0.constprop.0+0x138/0x280 [ 126.649292] [<0000000058d65f39>] ? __lock_acquire+0x26ec/0x4350 [ 126.655432] [<00000000350a24fb>] ? sel_read_bool+0x240/0x240 [ 126.661319] [<000000006cc65635>] ? trace_hardirqs_on+0x10/0x10 [ 126.667378] [<000000003f13308c>] __vfs_write+0x116/0x560 [ 126.672906] [<00000000350a24fb>] ? sel_read_bool+0x240/0x240 [ 126.678776] [<00000000765fbad8>] ? __vfs_read+0x550/0x550 [ 126.684389] [<0000000013d6593b>] ? check_preemption_disabled+0x3c/0x200 [ 126.691225] [<0000000013d6593b>] ? check_preemption_disabled+0x3c/0x200 [ 126.698069] [<00000000dfbc9155>] ? rcu_read_lock_sched_held+0x10b/0x130 [ 126.704900] [<000000006684165c>] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 126.711479] [<00000000e432774b>] ? __sb_start_write+0x161/0x310 [ 126.717609] [<00000000b6d1e066>] vfs_write+0x185/0x520 [ 126.722960] [<0000000065b08111>] SyS_write+0xdc/0x1c0 [ 126.728221] [<00000000662dcd2b>] ? SyS_read+0x1c0/0x1c0 [ 126.733651] [<0000000034d16fb8>] ? fput+0xd4/0x150 00:02:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x80000000000004, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), 0x0, 0x3}, 0x20) [ 126.738656] [<000000003f82597e>] ? do_syscall_64+0x4a/0x570 [ 126.744435] [<00000000662dcd2b>] ? SyS_read+0x1c0/0x1c0 [ 126.749867] [<00000000072d48e8>] do_syscall_64+0x1ad/0x570 [ 126.755580] [<00000000fa5c5729>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 126.763785] Mem-Info: [ 126.766326] active_anon:69649 inactive_anon:41 isolated_anon:0 [ 126.766326] active_file:4414 inactive_file:11013 isolated_file:0 [ 126.766326] unevictable:0 dirty:171 writeback:0 unstable:0 [ 126.766326] slab_reclaimable:4827 slab_unreclaimable:59797 [ 126.766326] mapped:58741 shmem:49 pagetables:963 bounce:0 [ 126.766326] free:1438306 free_pcp:451 free_cma:0 [ 126.795882] audit: type=1400 audit(125.583:14): avc: denied { map_create } for pid=4322 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 126.796785] audit: type=1400 audit(125.583:15): avc: denied { map_read map_write } for pid=4322 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 126.846932] Node 0 active_anon:278496kB inactive_anon:164kB active_file:17656kB inactive_file:44052kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:234964kB dirty:684kB writeback:0kB shmem:196kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 126.871723] DMA32 free:3019432kB min:4696kB low:7712kB high:10728kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3020108kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:676kB local_pcp:0kB free_cma:0kB [ 126.902661] lowmem_reserve[]: 0 3505 3505 [ 126.907390] Normal free:2733900kB min:5580kB low:9168kB high:12756kB active_anon:278496kB inactive_anon:164kB active_file:17656kB inactive_file:44052kB unevictable:0kB writepending:684kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:19308kB slab_unreclaimable:239416kB kernel_stack:4288kB pagetables:3852kB bounce:0kB free_pcp:1196kB local_pcp:472kB free_cma:0kB [ 126.941119] lowmem_reserve[]: 0 0 0 [ 126.945250] DMA32: 4*4kB (UM) 3*8kB (M) 4*16kB (M) 2*32kB (UM) 4*64kB (UM) 4*128kB (UM) 3*256kB (UM) 2*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 735*4096kB (M) = 3019432kB [ 126.963435] Normal: 1955*4kB (UME) 2188*8kB (UME) 1798*16kB (UME) 155*32kB (UME) 97*64kB (UME) 71*128kB (UM) 27*256kB (UM) 11*512kB (UME) 1*1024kB (U) 2*2048kB (UM) 645*4096kB (M) = 2733932kB 15464 total pagecache pages [ 126.986232] 0 pages in swap cache [ 126.989664] Swap cache stats: add 0, delete 0, find 0/0 [ 126.995066] Free swap = 0kB [ 126.998076] Total swap = 0kB [ 127.001075] 1965979 pages RAM [ 127.004186] 0 pages HighMem/MovableOnly [ 127.008147] 313623 pages reserved [ 127.011914] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 127.022118] CPU: 0 PID: 4296 Comm: syz-executor.5 Not tainted 4.9.171+ #49 [ 127.029126] ffff8801d9bcf968 ffffffff81b4fb61 1ffff1003b379f2f ffff8801a38f8000 [ 127.037198] ffffffff82aa9a20 0000000000000001 0000000000400000 ffff8801d9bcfa90 [ 127.045197] ffffffff815026f3 0000000041b58ab3 ffffffff82e37c98 ffffffff8142c490 [ 127.053249] Call Trace: [ 127.055816] [<00000000a979fb36>] dump_stack+0xc1/0x120 [ 127.061161] [<000000004dca2060>] warn_alloc.cold+0x76/0x93 [ 127.066851] [<00000000346419e7>] ? zone_watermark_ok_safe+0x260/0x260 [ 127.073614] [<00000000fbff7cc1>] ? avc_has_perm+0x164/0x3a0 [ 127.079394] [<00000000bd762abf>] __vmalloc_node_range+0x363/0x610 [ 127.085697] [<0000000013d6593b>] ? check_preemption_disabled+0x3c/0x200 [ 127.092526] [<0000000013d6593b>] ? check_preemption_disabled+0x3c/0x200 [ 127.099364] [<0000000013d6593b>] ? check_preemption_disabled+0x3c/0x200 [ 127.106198] [<000000000d29c3b6>] ? task_has_security+0x130/0x270 [ 127.112412] [<000000009a6c82a2>] vmalloc+0x5c/0x70 [ 127.117431] [<00000000793d1152>] ? sel_write_load+0x119/0xf60 [ 127.123578] [<00000000793d1152>] sel_write_load+0x119/0xf60 [ 127.129361] [<00000000350a24fb>] ? sel_read_bool+0x240/0x240 [ 127.135224] [<000000006cc65635>] ? trace_hardirqs_on+0x10/0x10 [ 127.141269] [<000000003f13308c>] __vfs_write+0x116/0x560 [ 127.146788] [<00000000350a24fb>] ? sel_read_bool+0x240/0x240 [ 127.152650] [<00000000765fbad8>] ? __vfs_read+0x550/0x550 [ 127.158257] [<0000000013d6593b>] ? check_preemption_disabled+0x3c/0x200 [ 127.165083] [<0000000013d6593b>] ? check_preemption_disabled+0x3c/0x200 [ 127.171904] [<00000000dfbc9155>] ? rcu_read_lock_sched_held+0x10b/0x130 [ 127.178720] [<000000006684165c>] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 127.185280] [<00000000e432774b>] ? __sb_start_write+0x161/0x310 [ 127.191403] [<00000000b6d1e066>] vfs_write+0x185/0x520 [ 127.196744] [<0000000065b08111>] SyS_write+0xdc/0x1c0 [ 127.202000] [<00000000662dcd2b>] ? SyS_read+0x1c0/0x1c0 [ 127.207446] [<0000000034d16fb8>] ? fput+0xd4/0x150 [ 127.212449] [<000000003f82597e>] ? do_syscall_64+0x4a/0x570 [ 127.218235] [<00000000662dcd2b>] ? SyS_read+0x1c0/0x1c0 [ 127.223673] [<00000000072d48e8>] do_syscall_64+0x1ad/0x570 [ 127.229365] [<00000000fa5c5729>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 127.236375] Mem-Info: [ 127.238802] active_anon:69593 inactive_anon:42 isolated_anon:0 [ 127.238802] active_file:4414 inactive_file:11014 isolated_file:0 [ 127.238802] unevictable:0 dirty:179 writeback:0 unstable:0 [ 127.238802] slab_reclaimable:4801 slab_unreclaimable:59838 [ 127.238802] mapped:58737 shmem:48 pagetables:942 bounce:0 [ 127.238802] free:1438349 free_pcp:464 free_cma:0 [ 127.272299] Node 0 active_anon:278372kB inactive_anon:168kB active_file:17656kB inactive_file:44056kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:234948kB dirty:716kB writeback:0kB shmem:192kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 127.297105] DMA32 free:3019432kB min:4696kB low:7712kB high:10728kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3020108kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:676kB local_pcp:676kB free_cma:0kB [ 127.327859] lowmem_reserve[]: 0 3505 3505 [ 127.332538] Normal free:2733964kB min:5580kB low:9168kB high:12756kB active_anon:278372kB inactive_anon:168kB active_file:17656kB inactive_file:44056kB unevictable:0kB writepending:720kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:19204kB slab_unreclaimable:239352kB kernel_stack:4256kB pagetables:3768kB bounce:0kB free_pcp:1176kB local_pcp:724kB free_cma:0kB [ 127.366229] lowmem_reserve[]: 0 0 0 [ 127.370346] DMA32: 4*4kB (UM) 3*8kB (M) 4*16kB (M) 2*32kB (UM) 4*64kB (UM) 4*128kB (UM) 3*256kB (UM) 2*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 735*4096kB (M) = 3019432kB [ 127.388433] Normal: 1955*4kB (UME) 2188*8kB (UME) 1798*16kB (UME) 156*32kB (UME) 97*64kB (UME) 71*128kB (UM) 27*256kB (UM) 11*512kB (UME) 1*1024kB (U) 2*2048kB (UM) 645*4096kB (M) = 2733964kB 15481 total pagecache pages [ 127.411248] 0 pages in swap cache [ 127.414711] Swap cache stats: add 0, delete 0, find 0/0 [ 127.420065] Free swap = 0kB [ 127.423059] Total swap = 0kB [ 127.426084] 1965979 pages RAM [ 127.429180] 0 pages HighMem/MovableOnly [ 127.433151] 313623 pages reserved [ 127.436684] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 127.446905] CPU: 0 PID: 4313 Comm: syz-executor.0 Not tainted 4.9.171+ #49 [ 127.453919] ffff8801cda2f968 ffffffff81b4fb61 1ffff10039b45f2f ffff8801cc338000 [ 127.462030] ffffffff82aa9a20 0000000000000001 0000000000400000 ffff8801cda2fa90 [ 127.470135] ffffffff815026f3 0000000041b58ab3 ffffffff82e37c98 ffffffff8142c490 [ 127.478209] Call Trace: [ 127.480797] [<00000000a979fb36>] dump_stack+0xc1/0x120 [ 127.486166] [<000000004dca2060>] warn_alloc.cold+0x76/0x93 [ 127.491885] [<00000000346419e7>] ? zone_watermark_ok_safe+0x260/0x260 [ 127.498560] [<00000000fbff7cc1>] ? avc_has_perm+0x164/0x3a0 [ 127.504366] [<00000000bd762abf>] __vmalloc_node_range+0x363/0x610 [ 127.510687] [<0000000013d6593b>] ? check_preemption_disabled+0x3c/0x200 [ 127.517529] [<0000000013d6593b>] ? check_preemption_disabled+0x3c/0x200 [ 127.524377] [<0000000013d6593b>] ? check_preemption_disabled+0x3c/0x200 [ 127.531226] [<000000000d29c3b6>] ? task_has_security+0x130/0x270 [ 127.537465] [<000000009a6c82a2>] vmalloc+0x5c/0x70 [ 127.542490] [<00000000793d1152>] ? sel_write_load+0x119/0xf60 [ 127.548472] [<00000000793d1152>] sel_write_load+0x119/0xf60 [ 127.554773] [<00000000350a24fb>] ? sel_read_bool+0x240/0x240 [ 127.560663] [<000000006cc65635>] ? trace_hardirqs_on+0x10/0x10 [ 127.566721] [<000000003f13308c>] __vfs_write+0x116/0x560 [ 127.572257] [<00000000350a24fb>] ? sel_read_bool+0x240/0x240 [ 127.578139] [<00000000765fbad8>] ? __vfs_read+0x550/0x550 [ 127.583763] [<0000000013d6593b>] ? check_preemption_disabled+0x3c/0x200 [ 127.590599] [<0000000013d6593b>] ? check_preemption_disabled+0x3c/0x200 [ 127.597454] [<00000000dfbc9155>] ? rcu_read_lock_sched_held+0x10b/0x130 [ 127.604296] [<000000006684165c>] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 127.610873] [<00000000e432774b>] ? __sb_start_write+0x161/0x310 [ 127.617015] [<00000000b6d1e066>] vfs_write+0x185/0x520 [ 127.622376] [<0000000065b08111>] SyS_write+0xdc/0x1c0 [ 127.627646] [<00000000662dcd2b>] ? SyS_read+0x1c0/0x1c0 [ 127.633091] [<0000000034d16fb8>] ? fput+0xd4/0x150 [ 127.638102] [<000000003f82597e>] ? do_syscall_64+0x4a/0x570 00:02:06 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x80000000000004, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), 0x0}, 0x20) 00:02:06 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x11, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) 00:02:06 executing program 1: syz_execute_func(&(0x7f0000001200)="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") sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, 0x0, 0x0) 00:02:06 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000021c0)=""/79, 0x4f) lseek(r1, 0xfffffffffffffff8, 0x1) getdents(r1, 0x0, 0x11a) 00:02:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x80000000000004, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080)="e4", 0x0}, 0x20) 00:02:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) 00:02:06 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000001080)=[{&(0x7f0000000000)="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", 0x200}]) 00:02:06 executing program 4: r0 = add_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', r0) 00:02:06 executing program 4: socket$packet(0x11, 0x3, 0x300) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/packet\x00') inotify_init() socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="b13691cd806969ef69dc00d9d0d0c44139fd5bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f4808eebce00000802000c421fc51c1ea01efc48192558dc3c366450f186746f3400faee47c7c730f5726400f0d18c401fe5ff6e3df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") 00:02:06 executing program 3: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x10, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200007c0], 0x2, 0x0, 0x0}, 0x220) [ 127.643897] [<00000000662dcd2b>] ? SyS_read+0x1c0/0x1c0 [ 127.649343] [<00000000072d48e8>] do_syscall_64+0x1ad/0x570 [ 127.655077] [<00000000fa5c5729>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 127.671229] Mem-Info: [ 127.679691] active_anon:69718 inactive_anon:42 isolated_anon:0 [ 127.679691] active_file:4414 inactive_file:11014 isolated_file:0 [ 127.679691] unevictable:0 dirty:182 writeback:0 unstable:0 [ 127.679691] slab_reclaimable:4801 slab_unreclaimable:60281 [ 127.679691] mapped:58787 shmem:48 pagetables:1016 bounce:0 [ 127.679691] free:1437675 free_pcp:333 free_cma:0 [ 127.735935] Node 0 active_anon:278972kB inactive_anon:168kB active_file:17656kB inactive_file:44056kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235148kB dirty:728kB writeback:0kB shmem:192kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 127.767320] DMA32 free:3019432kB min:4696kB low:7712kB high:10728kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3020108kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:676kB local_pcp:676kB free_cma:0kB [ 127.806167] lowmem_reserve[]: 0 3505 3505 [ 127.810900] Normal free:2731996kB min:5580kB low:9168kB high:12756kB active_anon:278872kB inactive_anon:168kB active_file:17656kB inactive_file:44056kB unevictable:0kB writepending:728kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:19204kB slab_unreclaimable:240236kB kernel_stack:4608kB pagetables:4064kB bounce:0kB free_pcp:904kB local_pcp:648kB free_cma:0kB [ 127.844559] lowmem_reserve[]: 0 0 0 [ 127.848733] DMA32: 4*4kB (UM) 3*8kB (M) 4*16kB (M) 2*32kB (UM) 4*64kB (UM) 4*128kB (UM) 3*256kB (UM) 2*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 735*4096kB (M) = 3019432kB [ 127.876917] Normal: 1262*4kB (UME) 2193*8kB (UME) 1796*16kB (UME) 197*32kB (UE) 102*64kB (UE) 71*128kB (U) 27*256kB (UM) 11*512kB (UME) 1*1024kB (U) 2*2048kB (UM) 645*4096kB (M) = 2732832kB 15482 total pagecache pages [ 127.909872] 0 pages in swap cache [ 127.913339] Swap cache stats: add 0, delete 0, find 0/0 [ 127.918851] Free swap = 0kB [ 127.921867] Total swap = 0kB [ 127.925197] 1965979 pages RAM [ 127.928304] 0 pages HighMem/MovableOnly [ 127.932264] 313623 pages reserved [ 127.936360] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 127.946832] CPU: 0 PID: 4315 Comm: syz-executor.0 Not tainted 4.9.171+ #49 [ 127.953850] ffff8801ccf27968 ffffffff81b4fb61 1ffff100399e4f2f ffff8801a3bc97c0 [ 127.961935] ffffffff82aa9a20 0000000000000001 0000000000400000 ffff8801ccf27a90 [ 127.970012] ffffffff815026f3 0000000041b58ab3 ffffffff82e37c98 ffffffff8142c490 [ 127.978089] Call Trace: [ 127.980676] [<00000000a979fb36>] dump_stack+0xc1/0x120 [ 127.986037] [<000000004dca2060>] warn_alloc.cold+0x76/0x93 [ 127.991743] [<00000000346419e7>] ? zone_watermark_ok_safe+0x260/0x260 [ 127.998405] [<00000000fbff7cc1>] ? avc_has_perm+0x164/0x3a0 [ 128.004203] [<00000000bd762abf>] __vmalloc_node_range+0x363/0x610 [ 128.010520] [<0000000013d6593b>] ? check_preemption_disabled+0x3c/0x200 [ 128.017356] [<0000000013d6593b>] ? check_preemption_disabled+0x3c/0x200 [ 128.024190] [<0000000013d6593b>] ? check_preemption_disabled+0x3c/0x200 [ 128.031026] [<000000000d29c3b6>] ? task_has_security+0x130/0x270 [ 128.037253] [<000000009a6c82a2>] vmalloc+0x5c/0x70 [ 128.042265] [<00000000793d1152>] ? sel_write_load+0x119/0xf60 [ 128.048246] [<00000000793d1152>] sel_write_load+0x119/0xf60 [ 128.054041] [<00000000350a24fb>] ? sel_read_bool+0x240/0x240 [ 128.059924] [<000000006cc65635>] ? trace_hardirqs_on+0x10/0x10 [ 128.065994] [<000000003f13308c>] __vfs_write+0x116/0x560 [ 128.071531] [<00000000350a24fb>] ? sel_read_bool+0x240/0x240 [ 128.077411] [<00000000765fbad8>] ? __vfs_read+0x550/0x550 [ 128.083037] [<0000000013d6593b>] ? check_preemption_disabled+0x3c/0x200 [ 128.089871] [<0000000013d6593b>] ? check_preemption_disabled+0x3c/0x200 [ 128.096707] [<00000000dfbc9155>] ? rcu_read_lock_sched_held+0x10b/0x130 [ 128.103547] [<000000006684165c>] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 128.110123] [<00000000e432774b>] ? __sb_start_write+0x161/0x310 [ 128.116262] [<00000000b6d1e066>] vfs_write+0x185/0x520 [ 128.121633] [<0000000065b08111>] SyS_write+0xdc/0x1c0 [ 128.126905] [<00000000662dcd2b>] ? SyS_read+0x1c0/0x1c0 [ 128.132354] [<0000000034d16fb8>] ? fput+0xd4/0x150 [ 128.137365] [<000000003f82597e>] ? do_syscall_64+0x4a/0x570 [ 128.143158] [<00000000662dcd2b>] ? SyS_read+0x1c0/0x1c0 [ 128.148610] [<00000000072d48e8>] do_syscall_64+0x1ad/0x570 [ 128.154321] [<00000000fa5c5729>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 128.162373] Mem-Info: [ 128.164851] active_anon:69629 inactive_anon:42 isolated_anon:0 [ 128.164851] active_file:4415 inactive_file:11024 isolated_file:0 [ 128.164851] unevictable:0 dirty:187 writeback:0 unstable:0 [ 128.164851] slab_reclaimable:4807 slab_unreclaimable:61019 [ 128.164851] mapped:58752 shmem:48 pagetables:968 bounce:0 [ 128.164851] free:1437108 free_pcp:403 free_cma:0 [ 128.198679] Node 0 active_anon:278516kB inactive_anon:168kB active_file:17660kB inactive_file:44096kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235008kB dirty:748kB writeback:0kB shmem:192kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 128.223755] DMA32 free:3019432kB min:4696kB low:7712kB high:10728kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3020108kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:676kB local_pcp:676kB free_cma:0kB [ 128.255226] lowmem_reserve[]: 0 3505 3505 [ 128.259929] Normal free:2728408kB min:5580kB low:9168kB high:12756kB active_anon:278516kB inactive_anon:168kB active_file:17660kB inactive_file:44096kB unevictable:0kB writepending:748kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:19228kB slab_unreclaimable:244680kB kernel_stack:4384kB pagetables:3872kB bounce:0kB free_pcp:1008kB local_pcp:652kB free_cma:0kB [ 128.294756] lowmem_reserve[]: 0 0 0 [ 128.299073] DMA32: 4*4kB (UM) 3*8kB (M) 4*16kB (M) 2*32kB (UM) 4*64kB (UM) 4*128kB (UM) 3*256kB (UM) 2*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 735*4096kB (M) = 3019432kB [ 128.318477] Normal: 29*4kB (M) 1951*8kB (UME) 1789*16kB (UME) 313*32kB (UE) 112*64kB (UE) 73*128kB (U) 27*256kB (UM) 11*512kB (UME) 1*1024kB (U) 2*2048kB (UM) 645*4096kB (M) = 2730460kB 15487 total pagecache pages 00:02:07 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000200)=0x7) 00:02:07 executing program 2: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200007c0], 0x2, 0x0, 0x0}, 0x220) 00:02:07 executing program 3: request_key(&(0x7f000000aff5)='rxrpc\x00', &(0x7f0000000000)={'\x00\x00\b', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) 00:02:07 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000001080)=[{&(0x7f0000000000)="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", 0x1fe, 0x2}]) 00:02:07 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000100)={0x2}) 00:02:07 executing program 4: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0xa, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200007c0], 0x2, 0x0, 0x0}, 0x220) 00:02:07 executing program 2: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x5, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200007c0], 0x2, 0x0, 0x0}, 0x220) [ 128.342536] 0 pages in swap cache [ 128.346684] Swap cache stats: add 0, delete 0, find 0/0 [ 128.352138] Free swap = 0kB [ 128.355486] Total swap = 0kB [ 128.367016] 1965979 pages RAM [ 128.373655] 0 pages HighMem/MovableOnly [ 128.382117] 313623 pages reserved 00:02:07 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x02@\x94\xb8\x03P\xcaC\x8a\xf9\x16.H\x80\'\xc5\x8d\xab\xf9\x1b@\xd6\xea\xd24\x95\x94\x165\x8f\x18H\xdc\xc9\x98M\xf9\x8d\xcdmp\xf8h\x8fZV\x16\x83\xf1\xa6-c\xcbQ#\'O\xb9\xbb\xe5\xf3P\xf1\x81\xf7\na\v:\xca\xdc\xe9yb\xb9\xc7p\x92\x8b\xe9\xfdEWW\xad\xd50\xd27\x13\xc1\x7fXo\xf3\x92', 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000010000000003800000001000000000000000000200002"], 0x2d) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:02:07 executing program 4: request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffffb) 00:02:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) 00:02:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x200000000000001, 0x0) bind$unix(r0, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) 00:02:07 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000001080)=[{&(0x7f0000000000)="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", 0x200, 0x2}]) [ 286.523796] INFO: task syz-executor.4:2120 blocked for more than 140 seconds. [ 286.531140] Not tainted 4.9.171+ #49 [ 286.535426] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 286.543524] syz-executor.4 D25528 2120 1 0x00000004 [ 286.549321] ffff8801cedf17c0 ffff8801d5deac00 ffff8801db621000 ffff8801cb6417c0 [ 286.557456] ffff8801db621018 ffff8801a8557a28 ffffffff82801dde ffffffff82e2bc18 [ 286.565542] ffffffff812080d0 001c11e99182bab9 ffff8801db6218f0 1ffff100350aaf34 [ 286.573716] Call Trace: [ 286.576296] [<00000000dfc23b9b>] ? __schedule+0x6ce/0x1f10 [ 286.582046] [<000000006cc65635>] ? trace_hardirqs_on+0x10/0x10 [ 286.588178] [<000000008d347c76>] ? io_schedule_timeout+0x390/0x390 [ 286.594599] [<00000000641d106f>] ? mark_held_locks+0xb1/0x100 [ 286.600558] [<000000004705b759>] schedule+0x92/0x1c0 [ 286.605792] [<0000000096be02dc>] schedule_preempt_disabled+0x13/0x20 [ 286.612361] [<00000000cb261142>] mutex_lock_nested+0x38d/0x920 [ 286.618503] [<00000000a965dec3>] ? lo_ioctl+0x85/0x1a10 [ 286.624038] [<00000000d23e3167>] ? mutex_trylock+0x3f0/0x3f0 [ 286.629929] [<00000000d9d0b952>] ? avc_has_extended_perms+0xe5/0xd30 [ 286.636565] [<00000000a965dec3>] lo_ioctl+0x85/0x1a10 [ 286.641836] [<00000000072d48e8>] ? do_syscall_64+0x1ad/0x570 [ 286.647765] [<00000000fa5c5729>] ? entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 286.654907] [<000000001f863417>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 286.661684] [<00000000cbc4eb38>] ? loop_add+0x7b0/0x7b0 [ 286.667312] [<000000003845ed83>] blkdev_ioctl+0xe14/0x19e0 [ 286.673020] [<00000000393a4a5c>] ? blkpg_ioctl+0x920/0x920 [ 286.678783] [<000000006a20a357>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 286.685774] [<000000007ace9da2>] block_ioctl+0xde/0x120 [ 286.691270] [<0000000011905581>] ? blkdev_fallocate+0x430/0x430 [ 286.697560] [<00000000251bd42f>] do_vfs_ioctl+0xb87/0x11d0 [ 286.703281] [<0000000044657163>] ? selinux_file_ioctl+0x103/0x550 [ 286.709643] [<00000000d3719474>] ? ioctl_preallocate+0x210/0x210 [ 286.715893] [<000000000d651555>] ? selinux_parse_skb.constprop.0+0x16b0/0x16b0 [ 286.723329] [<00000000b4f6d510>] ? do_sys_open+0x27c/0x610 [ 286.729102] [<00000000b1b35258>] ? filp_open+0x70/0x70 [ 286.734477] [<00000000152aca1d>] ? SyS_mkdirat+0x164/0x250 [ 286.740179] [<00000000db5b18b1>] ? security_file_ioctl+0x8f/0xc0 [ 286.746448] [<00000000420a205c>] SyS_ioctl+0x8f/0xc0 [ 286.751636] [<00000000e7ceeea2>] ? do_vfs_ioctl+0x11d0/0x11d0 [ 286.757664] [<00000000072d48e8>] do_syscall_64+0x1ad/0x570 [ 286.763373] [<00000000fa5c5729>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 286.770330] [ 286.770330] Showing all locks held in the system: [ 286.776667] 2 locks held by khungtaskd/24: [ 286.780880] #0: (rcu_read_lock){......}, at: [<000000002b044e3f>] watchdog+0x14b/0xaf0 [ 286.789673] #1: (tasklist_lock){.+.+..}, at: [<000000006fd7ba7a>] debug_show_all_locks+0x7f/0x21f [ 286.799459] 1 lock held by rsyslogd/1900: [ 286.803712] #0: (&f->f_pos_lock){+.+.+.}, at: [<00000000fcc2e693>] __fdget_pos+0xa8/0xd0 [ 286.812623] 2 locks held by getty/2027: [ 286.816745] #0: (&tty->ldisc_sem){++++++}, at: [<00000000ad1948e7>] ldsem_down_read+0x33/0x40 [ 286.826302] #1: (&ldata->atomic_read_lock){+.+...}, at: [<000000009fa7812c>] n_tty_read+0x1fe/0x1820 [ 286.836382] 1 lock held by syz-executor.4/2120: [ 286.841045] #0: (loop_ctl_mutex/1){+.+.+.}, at: [<00000000a965dec3>] lo_ioctl+0x85/0x1a10 [ 286.850292] 1 lock held by syz-executor.0/2118: [ 286.855059] #0: (&bdev->bd_mutex){+.+.+.}, at: [<0000000039eb6b91>] __blkdev_get+0x10e/0xeb0 [ 286.864338] 1 lock held by syz-executor.3/2121: [ 286.868986] #0: (loop_ctl_mutex/1){+.+.+.}, at: [<00000000a965dec3>] lo_ioctl+0x85/0x1a10 [ 286.878146] 2 locks held by syz-executor.2/2124: [ 286.882880] #0: (&bdev->bd_mutex){+.+.+.}, at: [<0000000039eb6b91>] __blkdev_get+0x10e/0xeb0 [ 286.892546] #1: (loop_index_mutex){+.+.+.}, at: [<0000000047218e54>] lo_open+0x1d/0xb0 [ 286.901369] 2 locks held by syz-executor.1/2129: [ 286.906685] #0: (&bdev->bd_mutex){+.+.+.}, at: [<0000000039eb6b91>] __blkdev_get+0x10e/0xeb0 [ 286.916046] #1: (loop_index_mutex){+.+.+.}, at: [<0000000047218e54>] lo_open+0x1d/0xb0 [ 286.924858] 2 locks held by syz-executor.5/4367: [ 286.929912] #0: (loop_ctl_mutex/1){+.+.+.}, at: [<00000000a965dec3>] lo_ioctl+0x85/0x1a10 [ 286.939068] #1: (&bdev->bd_mutex){+.+.+.}, at: [<0000000018d8b92b>] blkdev_reread_part+0x1f/0x40 [ 286.948885] 3 locks held by blkid/4363: [ 286.952843] #0: (&bdev->bd_mutex){+.+.+.}, at: [<00000000239655e7>] __blkdev_put+0xbb/0x840 [ 286.962062] #1: (loop_index_mutex){+.+.+.}, at: [<00000000a6edd1f9>] lo_release+0x1e/0x1b0 [ 286.971262] #2: (loop_ctl_mutex#2){+.+.+.}, at: [<0000000002d837e3>] lo_release+0x84/0x1b0 [ 286.980517] 1 lock held by blkid/4375: [ 286.984445] #0: (loop_ctl_mutex/1){+.+.+.}, at: [<00000000a965dec3>] lo_ioctl+0x85/0x1a10 [ 286.993581] 1 lock held by blkid/4379: [ 286.997606] #0: (&bdev->bd_mutex){+.+.+.}, at: [<0000000039eb6b91>] __blkdev_get+0x10e/0xeb0 [ 287.006995] 2 locks held by blkid/4381: [ 287.010949] #0: (&bdev->bd_mutex){+.+.+.}, at: [<0000000039eb6b91>] __blkdev_get+0x10e/0xeb0 [ 287.020339] #1: (loop_index_mutex){+.+.+.}, at: [<0000000047218e54>] lo_open+0x1d/0xb0 [ 287.029258] [ 287.030871] ============================================= [ 287.030871] [ 287.038053] NMI backtrace for cpu 0 [ 287.041763] CPU: 0 PID: 24 Comm: khungtaskd Not tainted 4.9.171+ #49 [ 287.048237] ffff8801d98d7cc8 ffffffff81b4fb61 0000000000000000 0000000000000000 [ 287.056249] 0000000000000000 ffffffff81097501 dffffc0000000000 ffff8801d98d7d00 [ 287.064332] ffffffff81b5adfc 0000000000000000 0000000000000000 0000000000000000 [ 287.072558] Call Trace: [ 287.075136] [<00000000a979fb36>] dump_stack+0xc1/0x120 [ 287.080553] [<0000000051228e85>] ? irq_force_complete_move+0x2f1/0x300 [ 287.087313] [<00000000e57b2f39>] nmi_cpu_backtrace.cold+0x47/0x87 [ 287.093807] [<00000000b7697e07>] ? irq_force_complete_move+0x300/0x300 [ 287.100562] [<00000000ec94a976>] nmi_trigger_cpumask_backtrace+0x124/0x155 [ 287.107772] [<00000000697965e1>] arch_trigger_cpumask_backtrace+0x14/0x20 [ 287.114954] [<00000000d19dcfef>] watchdog+0x670/0xaf0 [ 287.120316] [<000000002b044e3f>] ? watchdog+0x14b/0xaf0 [ 287.125794] [<000000006a20a357>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 287.133331] [<000000004679e501>] ? hungtask_pm_notify+0x60/0x60 [ 287.139580] [<000000007910b651>] kthread+0x278/0x310 [ 287.144853] [<00000000f4dc0ddf>] ? kthread_park+0xa0/0xa0 [ 287.150605] [<000000001f863417>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 287.157360] [<00000000b9165379>] ? _raw_spin_unlock_irq+0x39/0x60 [ 287.163671] [<00000000838471ed>] ? finish_task_switch+0x1e5/0x660 [ 287.170084] [<0000000035f6e8e7>] ? finish_task_switch+0x1b7/0x660 [ 287.176401] [<000000002c9be8b3>] ? __switch_to_asm+0x34/0x70 [ 287.182281] [<0000000081154fe8>] ? __switch_to_asm+0x40/0x70 [ 287.188229] [<000000002c9be8b3>] ? __switch_to_asm+0x34/0x70 [ 287.194216] [<00000000f4dc0ddf>] ? kthread_park+0xa0/0xa0 [ 287.199878] [<00000000f4dc0ddf>] ? kthread_park+0xa0/0xa0 [ 287.205500] [<000000001ab58733>] ret_from_fork+0x5c/0x70 [ 287.211148] Sending NMI from CPU 0 to CPUs 1: [ 287.215758] NMI backtrace for cpu 1 skipped: idling at pc 0xffffffff82810e52 [ 287.222988] Kernel panic - not syncing: hung_task: blocked tasks [ 287.229162] CPU: 0 PID: 24 Comm: khungtaskd Not tainted 4.9.171+ #49 [ 287.235643] ffff8801d98d7c60 ffffffff81b4fb61 ffff8801cedf1700 ffffffff82a79dc0 [ 287.243707] 00000000ffffffff 0000000000000000 dffffc0000000000 ffff8801d98d7d40 [ 287.251810] ffffffff813f96aa 0000000041b58ab3 ffffffff82e2efd2 ffffffff813f94d1 [ 287.260038] Call Trace: [ 287.262665] [<00000000a979fb36>] dump_stack+0xc1/0x120 [ 287.268280] [<0000000029dd7784>] panic+0x1d9/0x3bd [ 287.273299] [<00000000fedb3988>] ? add_taint.cold+0x16/0x16 [ 287.279139] [<00000000b7697e07>] ? irq_force_complete_move+0x300/0x300 [ 287.286039] [<00000000d35cf5a9>] ? ___preempt_schedule+0x16/0x18 [ 287.293071] [<000000009400812e>] ? nmi_trigger_cpumask_backtrace+0x135/0x155 [ 287.300431] [<0000000047375328>] ? nmi_trigger_cpumask_backtrace+0x13f/0x155 [ 287.307710] [<000000000ae92b46>] watchdog+0x681/0xaf0 [ 287.313173] [<000000002b044e3f>] ? watchdog+0x14b/0xaf0 [ 287.318710] [<000000006a20a357>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 287.325650] [<000000004679e501>] ? hungtask_pm_notify+0x60/0x60 [ 287.331838] [<000000007910b651>] kthread+0x278/0x310 [ 287.337037] [<00000000f4dc0ddf>] ? kthread_park+0xa0/0xa0 [ 287.342667] [<000000001f863417>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 287.349424] [<00000000b9165379>] ? _raw_spin_unlock_irq+0x39/0x60 [ 287.355742] [<00000000838471ed>] ? finish_task_switch+0x1e5/0x660 [ 287.362150] [<0000000035f6e8e7>] ? finish_task_switch+0x1b7/0x660 [ 287.368574] [<000000002c9be8b3>] ? __switch_to_asm+0x34/0x70 [ 287.374458] [<0000000081154fe8>] ? __switch_to_asm+0x40/0x70 [ 287.380333] [<000000002c9be8b3>] ? __switch_to_asm+0x34/0x70 [ 287.386229] [<00000000f4dc0ddf>] ? kthread_park+0xa0/0xa0 [ 287.391858] [<00000000f4dc0ddf>] ? kthread_park+0xa0/0xa0 [ 287.397478] [<000000001ab58733>] ret_from_fork+0x5c/0x70 [ 287.403399] Kernel Offset: disabled [ 287.407050] Rebooting in 86400 seconds..