[ 31.991171] kauditd_printk_skb: 9 callbacks suppressed [ 31.991178] audit: type=1800 audit(1560327990.165:33): pid=6861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 32.018585] audit: type=1800 audit(1560327990.165:34): pid=6861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 45.921673] random: sshd: uninitialized urandom read (32 bytes read) [ 46.483765] audit: type=1400 audit(1560328004.655:35): avc: denied { map } for pid=7034 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 46.544816] random: sshd: uninitialized urandom read (32 bytes read) [ 47.183149] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.114' (ECDSA) to the list of known hosts. [ 52.800618] random: sshd: uninitialized urandom read (32 bytes read) 2019/06/12 08:26:51 fuzzer started [ 52.994614] audit: type=1400 audit(1560328011.165:36): avc: denied { map } for pid=7043 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 54.811857] random: cc1: uninitialized urandom read (8 bytes read) 2019/06/12 08:26:54 dialing manager at 10.128.0.105:33131 2019/06/12 08:26:54 syscalls: 2444 2019/06/12 08:26:54 code coverage: enabled 2019/06/12 08:26:54 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/06/12 08:26:54 extra coverage: extra coverage is not supported by the kernel 2019/06/12 08:26:54 setuid sandbox: enabled 2019/06/12 08:26:54 namespace sandbox: enabled 2019/06/12 08:26:54 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/12 08:26:54 fault injection: enabled 2019/06/12 08:26:54 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/12 08:26:54 net packet injection: enabled 2019/06/12 08:26:54 net device setup: enabled [ 57.153194] random: crng init done 08:28:12 executing program 0: 08:28:12 executing program 5: 08:28:12 executing program 1: 08:28:12 executing program 2: 08:28:12 executing program 3: [ 134.616369] audit: type=1400 audit(1560328092.785:37): avc: denied { map } for pid=7043 comm="syz-fuzzer" path="/root/syzkaller-shm259325841" dev="sda1" ino=16493 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 08:28:12 executing program 4: [ 134.654873] audit: type=1400 audit(1560328092.825:38): avc: denied { map } for pid=7061 comm="syz-executor.3" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13813 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 134.950462] IPVS: ftp: loaded support on port[0] = 21 [ 135.241197] chnl_net:caif_netlink_parms(): no params data found [ 135.252804] IPVS: ftp: loaded support on port[0] = 21 [ 135.297950] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.304601] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.311965] device bridge_slave_0 entered promiscuous mode [ 135.323078] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.329472] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.336345] device bridge_slave_1 entered promiscuous mode [ 135.349340] IPVS: ftp: loaded support on port[0] = 21 [ 135.375466] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 135.387800] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 135.420233] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 135.427379] team0: Port device team_slave_0 added [ 135.470240] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 135.477458] team0: Port device team_slave_1 added [ 135.485323] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 135.501859] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 135.511971] chnl_net:caif_netlink_parms(): no params data found [ 135.521861] IPVS: ftp: loaded support on port[0] = 21 [ 135.592314] device hsr_slave_0 entered promiscuous mode [ 135.650190] device hsr_slave_1 entered promiscuous mode [ 135.718273] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 135.726477] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 135.767121] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.773658] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.780896] device bridge_slave_0 entered promiscuous mode [ 135.806265] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.812703] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.819553] device bridge_slave_1 entered promiscuous mode [ 135.890291] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 135.903893] IPVS: ftp: loaded support on port[0] = 21 [ 135.911938] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.918449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.925440] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.931886] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.939858] chnl_net:caif_netlink_parms(): no params data found [ 135.949550] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 135.984628] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 135.992672] team0: Port device team_slave_0 added [ 136.016261] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 136.023457] team0: Port device team_slave_1 added [ 136.049809] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 136.058762] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.065189] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.072052] device bridge_slave_0 entered promiscuous mode [ 136.089081] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 136.104299] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.110929] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.117746] device bridge_slave_1 entered promiscuous mode [ 136.162084] chnl_net:caif_netlink_parms(): no params data found [ 136.223012] device hsr_slave_0 entered promiscuous mode [ 136.280333] device hsr_slave_1 entered promiscuous mode [ 136.320651] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 136.330455] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 136.348458] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 136.360823] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.377987] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.392756] IPVS: ftp: loaded support on port[0] = 21 [ 136.414354] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 136.436726] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 136.443846] team0: Port device team_slave_0 added [ 136.449405] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 136.459403] team0: Port device team_slave_1 added [ 136.464975] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 136.534317] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 136.540969] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 136.559224] 8021q: adding VLAN 0 to HW filter on device bond0 [ 136.565514] chnl_net:caif_netlink_parms(): no params data found [ 136.643728] device hsr_slave_0 entered promiscuous mode [ 136.680309] device hsr_slave_1 entered promiscuous mode [ 136.743413] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 136.751604] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 136.770822] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.777177] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.785040] device bridge_slave_0 entered promiscuous mode [ 136.791999] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.798347] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.805442] device bridge_slave_1 entered promiscuous mode [ 136.821245] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 136.836302] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 136.870294] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 136.912221] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 136.918534] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 136.925836] team0: Port device team_slave_0 added [ 136.934126] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.941058] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.947858] device bridge_slave_0 entered promiscuous mode [ 136.955848] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 136.963228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 136.971142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.978127] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 136.985277] team0: Port device team_slave_1 added [ 136.992433] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 136.998497] 8021q: adding VLAN 0 to HW filter on device team0 [ 137.013034] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.019389] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.026581] device bridge_slave_1 entered promiscuous mode [ 137.038852] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 137.051409] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 137.096043] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 137.104920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 137.112766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.120758] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.127109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.134961] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 137.149184] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 137.172272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 137.179961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.187695] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.194044] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.204624] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 137.214103] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 137.224451] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 137.292011] device hsr_slave_0 entered promiscuous mode [ 137.330201] device hsr_slave_1 entered promiscuous mode [ 137.390627] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 137.397971] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 137.405480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 137.413570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 137.424088] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 137.431284] chnl_net:caif_netlink_parms(): no params data found [ 137.445970] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 137.453320] team0: Port device team_slave_0 added [ 137.462801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 137.472835] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 137.481335] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 137.495570] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 137.503322] team0: Port device team_slave_1 added [ 137.508679] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 137.518724] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 137.527003] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 137.557854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 137.565476] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 137.575475] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 137.585172] 8021q: adding VLAN 0 to HW filter on device bond0 [ 137.617942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 137.625931] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 137.635729] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 137.646267] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.653278] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.660262] device bridge_slave_0 entered promiscuous mode [ 137.733683] device hsr_slave_0 entered promiscuous mode [ 137.780252] device hsr_slave_1 entered promiscuous mode [ 137.830388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 137.837881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.846478] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 137.855663] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 137.861952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 137.871447] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.877796] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.884830] device bridge_slave_1 entered promiscuous mode [ 137.891344] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 137.908515] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 137.916162] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 137.932575] 8021q: adding VLAN 0 to HW filter on device bond0 [ 137.946993] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 137.958448] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 137.967910] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 137.977176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.984284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.995035] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 138.002069] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.011387] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 138.019644] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 138.027261] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 138.037050] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 138.044289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.052499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.059975] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.066358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.075298] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 138.093500] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 138.100567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 138.107577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.115515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.123482] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.129837] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.137915] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 138.155203] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 138.163123] team0: Port device team_slave_0 added [ 138.181270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.191911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.200857] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 138.210667] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 138.220750] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 138.226814] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.234697] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 138.242154] team0: Port device team_slave_1 added [ 138.247535] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 138.255971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 138.263763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 138.276667] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 138.285146] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 138.309722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 138.317591] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 138.327558] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 138.337604] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 138.352478] 8021q: adding VLAN 0 to HW filter on device bond0 08:28:16 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x200, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="6e618531673774000001000000bfba8bb0000004e4dbb77487e901148000420000408000000000000006010000000300001803000000000000ac0300000000eaff0f04d1e090e1fe916dd282d3f34d8dfac0dc1695"], 0x1) ptrace$setopts(0x4206, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r3, 0x14) [ 138.378666] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 138.386858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 138.398280] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 138.407318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.423070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.433318] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.439660] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.447051] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 138.456430] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 138.524657] device hsr_slave_0 entered promiscuous mode [ 138.572987] device hsr_slave_1 entered promiscuous mode [ 138.610784] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 138.618035] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 138.626429] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 138.634276] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 138.641168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.648590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.656044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 138.663692] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.674917] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 138.684565] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 138.695960] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 138.706764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.715461] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.723772] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.730162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.737646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 138.745399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 138.756442] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 138.767120] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 138.775765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 138.784396] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 138.792222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.798963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.806471] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 138.814808] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 138.831317] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 138.837311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 138.848901] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 138.855478] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.863025] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 138.884495] 8021q: adding VLAN 0 to HW filter on device bond0 [ 138.895626] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 138.901964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 138.909488] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 138.919408] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 138.929524] 8021q: adding VLAN 0 to HW filter on device bond0 [ 138.937897] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 138.948321] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 138.955637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.963258] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.970936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.978524] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.986135] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.992495] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.999452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.009267] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 139.017981] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 139.027097] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 139.045742] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 139.058052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 139.066569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.075652] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.082034] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.088909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 139.096960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.107356] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 139.118494] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 139.126834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.133775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.140894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 139.149134] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 139.158127] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 139.164674] 8021q: adding VLAN 0 to HW filter on device team0 [ 139.174393] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 139.180578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 139.187473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.197032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.206077] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 139.213380] 8021q: adding VLAN 0 to HW filter on device team0 [ 139.222532] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 139.237830] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 139.246142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 139.254575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.262803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.275520] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.281915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.290612] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 08:28:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/mixer\x00', 0x40000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, &(0x7f0000000480)) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYRES64=0x0], 0x8) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0), 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x1000, 0x2, [0x6, 0x1, 0x8, 0x9]}, &(0x7f0000000080)=0x10) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={{}, {0x77359400}}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000180)={r4, @in6={{0xa, 0x4e24, 0x7fff, @local, 0x100}}, 0x5472, 0x10000, 0x800, 0x3f, 0x1}, 0x98) ioctl(r1, 0x1, &(0x7f0000000240)="29b24d774e06badf0f91a6cd9a56532273fa56ab2a79637204e7bce3fa7fffc525282953a076db216a0a6b5921efeb3f0975f35b1dae18f6c54ba78a51299de738b264dc0a9820aea1f16d8bdc8e83f7282a842807f547bbcdbc48984b2cf70543051ef3cfa1f8fa1eb56ec9dc05769889ae1283eff6ac7793d695fe191b087a34a4b5cc3040fc74ddf8d20cebf01371fc58483cd588a78abc85decc10ec72414a1b66ca90398a911b96c70e5e5f14a7bdb45490ed") ioctl$CAPI_GET_SERIAL(r3, 0xc0044308, &(0x7f00000000c0)=0x7f800000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000380)={r4, @in={{0x2, 0x4e21, @loopback}}, 0x9, 0x40, 0x8, 0x100000000, 0x4}, &(0x7f0000000000)=0x98) [ 139.305568] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 139.317284] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 139.329748] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 139.343291] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.351753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.362321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.369921] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.376324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.384558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 139.392438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 08:28:17 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x20500, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x7, 0x1, 0x2}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x5, 0x8, 0x3, 0x1, 0x7ff, 0x8, 0xfff, r1}, 0x20) r2 = socket$inet6(0xa, 0x100000000000001, 0x0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 139.400414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 139.408164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.416019] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.422393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.422998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 139.437125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.446900] bridge0: port 2(bridge_slave_1) entered blocking state 08:28:17 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001540)='./file0\x00', 0x0, 0x144) getsockname$llc(r1, &(0x7f0000001580)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000015c0)=0x10) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)=""/4096, 0x1000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000029c0)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000001600)={0xffff, 0x4, 0x0, 0x100000001, 0x4, 0x8001}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001700)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001800)=0xe8) getresgid(&(0x7f0000001840), &(0x7f0000001880)=0x0, &(0x7f00000018c0)) mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x100001, &(0x7f0000001cc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000130000,user_id=', @ANYRESDEC=r3, @ANYBLOB="2c677211265a56f61e4a603a5f7dff5a50366d5f73ba263effff7224d469d27ae62f8bc5b46f7280eadb8eeb176bec99de8cac2c6bff26cb04683b8919000000e4000000000000000000934d6941fb485b84a6affa7989566846f97e119bcc48862b1ec79609e85b188c5f271a9243a0b6", @ANYRESDEC=r4, @ANYBLOB=',max_read=0x0000000000008000,default_permissions,allow_other,max_read=0x0000000000000085,max_read=0x0000000000000008,max_read=0x0000000000000004,blksize=0x0000000000001000,default_permissions,allow_other,default_permissions,smackfstransmute=gfs2\x00,obj_user=gfs2\x00,\x00']) openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$gfs2(&(0x7f0000001680)='gfs2\x00', &(0x7f00000016c0)='./file0\x00', 0x7, 0x1, &(0x7f0000002880)=[{&(0x7f00000027c0)="3a7cc028fe331a150f5179ea0e9ef6eefac544c7bad54268d21586c31eaba621d1636f86faaafe7c429019bf79c5c5d05fc0ac22a753692abc04017317f7fbf4b32a2aa6ba13e55aae319409a2dee3be2deb4cfcd806ba9c3cafa641e05fad85660fdd67ed29da234217b4c03e", 0x6d, 0x5a}], 0x1002000, 0x0) getuid() fstat(r0, &(0x7f00000003c0)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000440)) getgroups(0x1, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000240)=0xe8) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000180), &(0x7f0000000200)=0x4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2080, 0x0) fremovexattr(r0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000001900)=0x6bd, 0x4) [ 139.453306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.462902] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 139.473198] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 139.486975] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 139.504070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.514930] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 139.525173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 139.534000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 139.541909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 139.551415] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 139.560711] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 139.568106] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 139.576355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 139.591019] hrtimer: interrupt took 43431 ns [ 139.599659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.607452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 139.616347] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 139.625907] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 139.634354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 139.643011] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.662470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 139.674021] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 139.685049] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 139.693124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 139.702279] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready 08:28:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f0000000500)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000001d00000001000000080676657468305f746f5f627269646765006e7230000000000000000000000000006772653000000000000000000000000076657468315f746f5f626f6e64000000aaaaaaaaaaaa000000000000aaaaaaaaaaaa00000000000000007000000070000000a80000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa0000feffffff0000000009000000000000000000697064647030000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000067726530000000000000000000000000ffffffffffff0000000000000000000000000000000000000000e000000018010000500100007261746565737400000000000000000000000000000000000000000000000000480000000000000064756d6d79300000000000000000000073797a5f74756e0000000ab9fa2e41749eaf0009000000000000000000000000200000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000feffffff01000000110000000000000000006272696467655f736c6176655f3100000000000000000000000000749638e0006c6f00000000000000000000000000000080616d300000000000000000000000aaaaaaaaaa00000000000000aaaaaaaaaaaa0000000000000000a00000000801000040010000636f6e6e6c6162656c000000000000000000000000000000000000000000000008000000000000000000000000000000434c41535349465900000000000000000000000000000000000000000000000008000000000000000000000000000000736e617400000000000000000000000000000000000000000001000000000000100000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000001400aaaaaaaaaabb00"/968]}, 0x440) [ 139.717389] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 139.725217] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 139.733443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 139.742962] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 139.760720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 139.768908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 139.776935] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 139.794634] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 139.803211] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 139.810417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 139.817805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.829428] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 139.838771] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 139.863026] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 139.870364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 139.877962] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 139.885693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 139.893665] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 139.901847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 139.909349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.917310] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 139.927050] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 139.937371] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 139.945354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 139.954483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.962081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 08:28:18 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000200), &(0x7f0000000140)=0xffffffffffffff5b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000000c0)={0x6, 0x80000001}, 0x2) 08:28:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x1, 0x2, 0x39}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f00000000c0)=""/126) read(r1, &(0x7f0000000180)=""/173, 0x8) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000240)=0x4) [ 139.969525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.988018] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 139.998030] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 140.006542] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 140.037089] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 140.043908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 140.068713] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 08:28:18 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/net\x00') flock(r0, 0x8) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0x3, 0x4e7, 0x303f, 0x7, 0x3, 0x6, 0x1, 0x7}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x3, {0x2, 0xfffffffffffff800, 0x7f, 0x7, 0x4, 0x80000000}, 0x8, 0x4}, 0xe) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000000)='ip6gretap0\x00') [ 140.114166] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 140.141715] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 140.179648] 8021q: adding VLAN 0 to HW filter on device batadv0 08:28:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200, 0x0) r2 = dup2(r0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000), 0x1c) r4 = dup2(r3, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000040), 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) clone(0x20400004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x2}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000180)={r5, 0xd53a}, 0x8) r6 = gettid() setsockopt$inet6_buf(r4, 0x29, 0x19, 0x0, 0x0) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000001c0)=@gcm_256={{0x307}, "16ceabcbe46951b5", "11aa94feb8563e209960d4181688b6333d7552dbc719bfc1682b0ae60b26ff19", "d6e1b4f5", "69576bf80b3d66c5"}, 0x38) tkill(r6, 0x1000000003c) fcntl$setstatus(r3, 0x4, 0x42000) 08:28:19 executing program 3: r0 = open(&(0x7f0000000240)='./file0\x00', 0x400, 0x4) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000280)={&(0x7f0000ffe000/0x1000)=nil, 0x4, 0x1, 0x20, &(0x7f0000ffd000/0x3000)=nil, 0x4}) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000040)={0x8004006, 0x7, 0x100000001, 0x40}) listen(r1, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x28082a0c}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xc4, 0x5, 0x6, 0x21, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0xa}, [@typed={0x14, 0x78, @ipv6=@local}, @generic="1bde99260f1b4157337e8ba031de439588ee790cec9db5", @generic="1e2d6cf0ece110baa9c39bd240220d0aefa569794fea666700f1f70435ce6ec31ff82a11aa8f1722ad56e8c035fb1935debe6b3c0e89a09aeed583efaa4d70c7b17992326dbc0daaede3d2a73eac8c27fa3a1b59ab9c69d7573d4b2a1769cd97cd12999bd6ac9cacac26bd6da1b8cf2bf898d643ce62d9b38bdd4a8b1a20540ec6ea406c"]}, 0xc4}, 0x1, 0x0, 0x0, 0x20004010}, 0x4000) 08:28:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x6002) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'osx.', '/dev/kvm\x00'}) mremap(&(0x7f0000fed000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) [ 141.402671] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 141.408129] QAT: Invalid ioctl 08:28:19 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={@empty, 0x68, r1}) write(r0, &(0x7f0000000600)="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", 0x200) 08:28:19 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x121000) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xedfeebc949ce72a4}) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x1f, 0xfffffffffffffffb, 0x2d90, 0x5, 0x2, 0x3e, 0x5, 0x1d3, 0x40, 0x13b, 0xd00f, 0x1ce, 0x38, 0x1, 0x9, 0x1, 0xc}, [{0x5, 0xd2cf, 0x9, 0x6, 0x56, 0x200000, 0x100000000, 0x8000}, {0x7, 0x80000001, 0x200, 0x2, 0x20, 0x9, 0x3ff, 0xffffffffffff2520}], "872c5029517b33d9c4170e87e841f7b26b9a7901612c2de108fb91c0b7ce98cf3de322d46171c21005d0509828aa151c2e6b5efb8c75de9152ef711536bc13daf84c96d46c5db72588b00b6476aa1d148d00e77cf50a91da1767afb2d60a98b0f99e7f2b85bb5479193e37a966edad4960314da97cb45d9c681ddb6b826e99f256191f612fc4ca5b23f7246b5e8a30899bacb4c4f9e58ec8d6fa5432733a91a3960a1fcf1036f3b4302ea196c27a8db4f96651b7b19b06f343b57d6141", [[], [], [], [], [], [], [], []]}, 0x96d) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') symlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file1\x00') mount(0x0, &(0x7f0000000240)='./file1/file0\x00', 0x0, 0x27, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000e00)={'raw\x00', 0xa7, "56d46fcc1a478598c7645cc08c700b7d4839657ae89fe4155eb7e50db98c5213b754a5d7bfd90485fc6451a6e0d24cbf615d593102dc5c2f5c37a9674079d861972360214a080a9f8aa5ad2b2f24e55eedf328964c68bfa893dca24640eff4c8d441bb4cc584098199abf2e29fa6399753f6a60677624aea2b2941cd791c2c50a1b5a8592c8fc2236783bb793c9916ba26e0de34aa08faa09a15eb066c04f9fb5e1c33f5a622d4"}, &(0x7f0000000100)=0xcb) 08:28:19 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, 0x0, 0x0) [ 141.463712] QAT: Invalid ioctl 08:28:19 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x6, 0x581100) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000140)={0x0, @reserved}) 08:28:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000000)={0x2, [0x0, 0x0]}) 08:28:19 executing program 3: r0 = socket$kcm(0x10, 0x40000002, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000340)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x20}}, 0x0) [ 141.564283] audit: type=1800 audit(1560328099.735:39): pid=7199 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=16518 res=0 08:28:19 executing program 4: r0 = fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe40\xaaH.6Y\x04\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#\x00\x00\x00\x00\x00\x00\x00\x00') sendmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x841}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x20) setpriority(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) link(0x0, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x2000, 0x0) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000180)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f00000003c0)={0xb, 0x77, 0x1, 0x8000}, 0xb) fstat(0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) fcntl$addseals(r2, 0x409, 0x3) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000a40)={0x0, 0x5c, &(0x7f0000002080)=[@in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e22, 0x9, @mcast2, 0x8}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e20, @loopback}]}, &(0x7f0000002100)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000002140)={r5, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x80000000, 0x3, 0x3, 0x5, 0x41}, &(0x7f0000002200)=0x98) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000400)={'nlmon0\x00', 0x101}) timerfd_gettime(r3, &(0x7f00000001c0)) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000140)='memory.current\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000)=0xff, 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) recvmmsg(r3, &(0x7f0000001f40)=[{{&(0x7f00000002c0)=@generic, 0x80, &(0x7f0000000380)=[{&(0x7f0000000500)=""/195, 0xc3}], 0x1, &(0x7f0000000600)=""/32, 0x20}, 0x2bd1}, {{&(0x7f0000000640)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000780)=[{&(0x7f00000006c0)=""/182, 0xb6}], 0x1, &(0x7f00000007c0)=""/248, 0xf8}, 0x2}, {{&(0x7f00000008c0)=@generic, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000940)=""/62, 0x3e}, {&(0x7f0000000980)=""/190, 0xbe}, {&(0x7f0000000a40)}, {&(0x7f0000000a80)=""/213, 0xd5}, {&(0x7f0000000b80)=""/144, 0x90}, {&(0x7f0000000c40)=""/255, 0xff}, {&(0x7f0000000d40)=""/12, 0xc}, {&(0x7f0000000d80)=""/5, 0x5}, {&(0x7f0000000dc0)=""/183, 0xb7}], 0x9, &(0x7f0000000f40)=""/4096, 0x1000}, 0x1}], 0x3, 0x40000100, &(0x7f0000002000)) bind$packet(r1, &(0x7f0000002040)={0x11, 0xf7, r6, 0x1, 0xffffffff80000000, 0x6, @local}, 0x14) 08:28:19 executing program 1: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x100000001) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r2, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x800}, @SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x44) shutdown(r1, 0x10000000000001) [ 141.695584] audit: type=1400 audit(1560328099.815:40): avc: denied { create } for pid=7210 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:28:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_INFO(0x0, 0xe, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x3, [{}, {}, {}]}, 0x58) 08:28:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_2\f\xe4\xcc\x9e`\xa0\xce\xf0+\x19v\xb9I\r\xada\xb7\xbf\xd5a\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9QQ\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\xbf\xa0\f\x9a\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98\xd3C\x10\x01|\xff\xb5\v\x930x0}, &(0x7f00000000c0)=0x3b4) fchown(r2, 0x0, r3) [ 141.815075] audit: type=1400 audit(1560328099.815:41): avc: denied { write } for pid=7210 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:28:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket(0x15, 0x80005, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xc8, 0x91, &(0x7f0000000080)="652dc8f29ad52edf71b446735abff939ecb9deab111d7e95b2c27468f1f441f3433a05f5cfddf8c899d42b5927d20cb7f499a710e3108df58e93270816fa8bbd35d1594c7f5ebe6fe5fccdaa2652663d1255fa41cd93ed0b0ccb7e71e64907123a866340cfd65115b6eff54d959e0561e5723ffc0f92ad9480d8d359dc543dc8977298b737391d69167805dfbbe1a46acf04343de2b415337c0c63899916f664a2bb9a478c39a82aea18da1c411e20d806a21b287471fd09dd8f61bca27c017679132bfa9cbf0c21", &(0x7f0000000180)=""/145, 0x570}, 0x28) getsockopt(r1, 0x114, 0x5, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x3e3) 08:28:20 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0x2, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7f8) symlink(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) [ 141.849404] audit: type=1400 audit(1560328099.825:42): avc: denied { read } for pid=7210 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:28:20 executing program 5: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) mount(&(0x7f0000000000)=@nullb='/dev/nullb0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='squashfs\x00', 0x0, 0x0) 08:28:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_INFO(0x0, 0xe, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x3, [{}, {}, {}]}, 0x58) [ 142.015635] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on nullb0 08:28:20 executing program 1: unshare(0x8000400) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) flistxattr(r0, &(0x7f0000000100)=""/104, 0x68) 08:28:20 executing program 0: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x80, 0x800) getsockopt$inet6_int(r0, 0x29, 0x73, &(0x7f00000000c0), &(0x7f0000000100)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 08:28:20 executing program 2: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$notify(0xffffffffffffffff, 0x402, 0x9) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000004c0)="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", 0x120, 0x4000010, 0x0, 0x0) r1 = add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)="f2f94a8e987522216512f885f13a5169a09aca53c919fd197df64ee427a539348080b1b9ce2ac59818d171cc42c3c35afac4e6c9faca467eccd58f6d703a16ab655e362714b69a78e754c2e7303cc8b16e32e528ea8fd85a6c212c38c6f7bafde28ccf583c310f9b235fe9d4e2f318402b056c4840efc60bff1b1bd67530f63f2cb7493f9dbbcaec04db4cd088afef9065d9f4201ce1a61c7561444dd2612430a1a32996b29164e328a35f8da866fe76abf3654770ff87ee75f809665859b533fe", 0xc1, 0xfffffffffffffffb) r2 = add_key(&(0x7f00000001c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$link(0x8, r1, r2) [ 142.063006] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on nullb0 08:28:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000040), r2, 0x0, 0x1, 0x4}}, 0x20) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) 08:28:20 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB="5c0300f9ff71642c04"]) mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='nsfs\x00', 0x8, &(0x7f0000000140)='msdos\x00') 08:28:20 executing program 0: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180), 0xffffffffffffe14}, 0xfffffffffffffffe) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'netdevsim0\x00', 0x1}, 0x18) setsockopt$inet_dccp_int(r0, 0x21, 0x3, &(0x7f0000000000)=0x4, 0x4) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) ptrace$peekuser(0x3, r1, 0x10001) r2 = dup3(r0, r0, 0x80000) setsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000340)=0x2, 0x4) 08:28:20 executing program 4: r0 = accept4(0xffffffffffffff9c, &(0x7f0000002000)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000002080)=0x80, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, 0x0, 0x40) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) mount$9p_virtio(&(0x7f0000000000)='mime_typeeth0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x20000, &(0x7f0000000540)={'trans=virtio,', {[{@loose='loose'}, {@cache_none='cache=none'}, {@nodevmap='nodevmap'}, {@msize={'msize', 0x3d, 0x2}}, {@aname={'aname'}}, {@cache_fscache='cache=fscache'}, {@posixacl='posixacl'}, {@posixacl='posixacl'}, {@loose='loose'}, {@version_9p2000='version=9p2000'}], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@hash='hash'}, {@obj_role={'obj_role', 0x3d, 'eth1posix_acl_accesswlan1#eth1ppp0'}}]}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x100000001) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge_slave_1\x00', r1}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f0000000380)={@local}) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000500)=0xffffffffffffff75) syz_open_pts(0xffffffffffffffff, 0x400001) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @empty}, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r3, 0x8917, &(0x7f0000000300)={'irlan0\x00', {0x2, 0x0, @broadcast}}) fdatasync(r2) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1000008914, &(0x7f00000003c0)="0adc1f") syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000000100)) 08:28:20 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'nr0\x00'}) socket$l2tp(0x18, 0x1, 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) [ 142.209966] FAT-fs (loop5): Unrecognized mount option "\" or missing value 08:28:20 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x42, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="cc010010", @ANYRES16=r1, @ANYBLOB="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"], 0x1cc}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000004) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="e7b1000000f600000008110000000c00090008000100c2220000"], 0x20}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000680)={&(0x7f0000000100), 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc4, r4, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x865}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'batadv0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0xc4}, 0x1, 0x0, 0x0, 0x1}, 0x801) recvfrom$inet(r0, &(0x7f0000000440)=""/52, 0x34, 0x0, &(0x7f0000000480)={0x2, 0x4e22, @multicast2}, 0x10) 08:28:20 executing program 1: r0 = memfd_create(&(0x7f0000000000)='\x00\xac=?\x00\x00\x00\x00\x00\x00\x00cJ\x8e\x84\xd4N\x12\x9b\x1f\t\x02\x00+\x86T\x16\xa3\xb3\xae8\x9f9?\xefo\xa4k\x012>\xa1\x9c-\xcd\x9d\xdb\b\x02HX\xec\n\xaf\xe8\x8a\xc6\x14\xde\x97_\t~\x01\x00\x00\x00\x00\x00\x00\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000200), 0x7f) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001240)={'veth1_to_bond\x00', 0x0}) getsockname$packet(r1, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000012c0)=0x14) accept4$packet(r1, &(0x7f0000001300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001340)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001800)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001b00)={{{@in6=@ipv4={[], [], @empty}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f0000001ac0)=0x33c) sendmmsg$inet(r1, &(0x7f0000003600)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="00330a5944eea5e0f2c8a3566e937d89d997a401876da63a471390bb4db90c97d94e", 0x22}, {&(0x7f0000000240)="eb5de06b91c04d791d5b5663d8045fc009049dfa7bcac32b92ed96b2cf1c14cad3589afc2ffcab0b60473c7c69f969aee3a8dfdfac8f96397f8c1347797989f1f8be64d59924fad441b9e133a44851281c69d4d7bd0cb3ce6ba8ed99534ae19c8625ad49b3712d117fbd31ee82bce52673468e25cd06e5e84d7fc9bb03915fb6156303ec9320d5af93512579124f4a34d9f59662604cfa1156f4fee64340373ea0b578fcdc69509a1d47e7cdb5adb9673cb9c40d73424bb7451ee67185dab8789c98658b6f2e8e499f072ceed41695df72ffd2bb2199c9dbc44b1e7605449088d98ee784a57a63fd4522722320d2eecf714c2b", 0xf3}, {&(0x7f0000000340)="7dca82cb3b0448a273314469f66f6c2072092b2cd30e7ce53d07a44debe8c01595c2e5847276a548a107a97888a7f2f59055532a01f058223ae6c03a4c8e926a6bc8a90f2c2cdc6bc1cedbab9b79b5db6e07eec6ff6d0773b376aad66a76f218b9ac97b522d228e53b9563225fa3b4b5d44ca39602146c6002d6352e36915a4167bca4a7c648e90d791bf7cd930e848c75cae51b29f00e6acf710b0fa5d080812ce17a12c20cc3196284ba3c356638b261b1014c42938449a11db0dfb1888f8afed072f1a0c322f27651dad471fb4790ac612f4bfda2532a44887cd0d5473f85620b560291c504cb7a", 0xe9}], 0x3, &(0x7f0000000440)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x14e0}}, @ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x1f, 0x0, 0x4, [{[], 0xe19ee78}, {[], 0x5b}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfffffffffffffffb}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@timestamp={0x44, 0x10, 0x1000, 0x0, 0x47, [{[@remote], 0x9}, {[], 0x8}]}, @rr={0x7, 0xf, 0x0, [@dev={0xac, 0x14, 0x14, 0x1b}, @remote, @loopback]}, @timestamp={0x44, 0x18, 0xff, 0x0, 0xdc, [{[], 0x9}, {[@multicast2]}, {[], 0x3}, {[], 0xfff}]}, @rr={0x7, 0x13, 0x1000, [@empty, @empty, @remote, @broadcast]}, @end, @timestamp={0x44, 0xc, 0x9, 0x3, 0x17, [{[], 0xfffffffffffffffe}, {[], 0x1a}]}, @end, @noop]}}}], 0xd8}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000180)="f47b556d9b5c45665415427eee8e14f372ec80cd5aeee595de66e628435e2965f9bd9b7d8ea4e0237f0719e99768fa3f022c79f9e1f9060134b3e059ec7f", 0x3e}, {&(0x7f0000000540)="1434f65c7c7ca3154fff532d316fa7acefdb1aa8f285ab9fcc64bd4ca3f193c4463da189737493c259898621a6abba0a9019501ae085c911d92650040f34c39a064176d21f39608a56de263a4258688cc658e3f08a853cf4d448013d021e6fa7e9bba8f039994c08", 0x68}, {&(0x7f00000005c0)="75b72782feaeb25cca80373166430f36986a855ecf7d7a5354e8941c33856a0becbe720312cb02785b7a63be43799050bd22a80fd0fece34923b2aa1f46c66eb107b5ebcd0facef6d7300d009b032197085e50621a0c21b4bb56676a161e0d059e9be6d857ae27ec23be2e6e4c90aaa5a04e32c9a8473923645c0351f5e03d1c5679ef83a66179402554ecc930f92210b62a777ecb78f65f140ae9146b0324ec6991503eea94f6af081e883fbd78d4ba906297a8590da1dd66ea850af541e9149dfe2b811dc217af922a37968638aa645b92a2f24bb6f249", 0xd8}], 0x3, &(0x7f00000006c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}], 0x30}}, {{&(0x7f0000000700)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000740)="15132a2a484fce4e396e51516475bb7f6de509abac700eb857e01ab0b9dfecd6fd55a6476d9ee05c551ce7c0daa833b1708031716e87922aa77e6b29abe9874e2dcd33cc95aabe7125545b95f18c3c9190a5aaf91428c0f4dedf8e3296", 0x5d}, {&(0x7f00000007c0)="5bd34334353a5ba4aecd7dbde1", 0xd}], 0x2, &(0x7f0000000840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x9463}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_retopts={{0x34, 0x0, 0x7, {[@end, @lsrr={0x83, 0x23, 0xf7a, [@remote, @dev={0xac, 0x14, 0x14, 0x13}, @rand_addr=0x2, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @multicast1, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}, @ip_tos_u8={{0x11}}], 0x80}}, {{&(0x7f00000008c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10, &(0x7f0000000c00)=[{&(0x7f0000000900)="692c73c664253eb940a653724db69e9f2242cd55d1a51ec4b0d342a21ab68bd3b04d23df43bf887df36e14f507fb8c2b59bcaba3284d3c0e6a223e080389e5c7ceb816e887225c50ccb4bcc4621193f8d8720b20768afdff59c68cf5d7c930076bb4c813af7003961d198dd840e6acfa0efb1c009c3d37d91561f90ccf1e7cc66d66ad08f7f51788dbbccf430a790ed6330ba9b4bf8f3f5806c4955ff25b21eec5ca013359dcd84e96881ece78d7343888aaa003e3a9e91b61e1aa3dfbfd7f874293664eccf99f0fbf41af874e22a1380bc6e84b3db07858ea00ad", 0xdb}, {&(0x7f0000000a00)="313e845e4438c68520ba4629a3c0e1c572bacc69f0432727f4e02d25503abdd16e", 0x21}, {&(0x7f0000000a40)="117c6efe52cdfe3f57cf9d7543aef7bfa6634a0b86b7fa65fb403c7db0c1afd96c44d39d1d1524c5de2cb785bab0bf1adf731d2d537e2dfc8d9c34c47360e5e91f424c825bddecd00dc413f8cacfdc6bb7426aa5e573005edef35ae8493d5c3305ae13c140ef49f5df0ececb2092aa8d8e1e87f86d152e967d72156bec3b74427dbe4dcf8eb12698b9e226322fe839635b0a1d0a2042d12b", 0x98}, {&(0x7f0000000b00)="79cb603aa9c62821a498eb0476d24db7d275d1a7a4b6d831af8320bc35697a2494bff51330de517364db5a89e874d4e57968a8322c1bb47c992d6ca569ff20aca37d362a980279dce25a726c13c0a10e29af63d5325952939ac854f08085476faf43309b5d4a88614010791006620940b4c443434c553a1db08800405b", 0x7d}, {&(0x7f0000000b80)="6e95fa", 0x3}, {&(0x7f0000000bc0)="86e1d4ffaf341daf806e596a06a7973dd7586c2f8b627d3c8c80644c85051c69afb9d66d5610384a127a88c46a232e8e754de05c36d9b81b8d2784d434fc4f32", 0x40}], 0x6, &(0x7f0000000c80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7ff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}], 0xa8}}, {{&(0x7f0000000d40)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000d80)="64a0bc6b0cf9fea1504ce22c795becf68defed2f1071a3d346ca3db21fa4f2b1906baa17e8d9e1866fb866493446a039490ea961d18fcdf12f317b8fab3ef0bb82f544f26140d50fdf3512aa9422092875ad0999bb79b141d34cc2091b3b61360173b3fc3018742ed766b22f6ce95fdd0e4ffe1fa3e8cbdb3b602e324a5b725bbb445d07bf3b07d7a99b2234bcc04841efe23ba8a5a7a0c003307d375a2ce9afe24df9a1a098ef65eccf045c792775b4063d1e51f21e18eff66091d7adb79a7c607207e4e8876a0234aafd749fae5b763187b903", 0xd4}], 0x1, &(0x7f0000000ec0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x4}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xa5d}}], 0x30}}, {{&(0x7f0000000f00)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000001040)=[{&(0x7f0000000f40)="7f0a5eecbe418aff328ea35d10dfc048e0037c2e176231286767cac8e128b3b536dbd56a5892b68812ed5b4ad4804ad6794eced6d8f5ddfef30fede7919f3a75387a836f158e3f5fb7497537b6bb24144d0c040f6eee7e4a1d5c648874651b76224a79396aea521dcad6f434b3932a83641bb45a08fc6d67a2063fd7094f2a", 0x7f}, {&(0x7f0000000fc0)="c019", 0x2}], 0x2, &(0x7f0000001080)=[@ip_ttl={{0x14, 0x0, 0x2, 0x23}}], 0x18}}, {{&(0x7f00000010c0)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000001200)=[{&(0x7f0000001100)="29d76f686d34f25e17bc612965b140108fde26dcd138c27c0c6091cc98fc70835c2250046e21be3f639e24ce18f53a4daccd9523ba75397ec1d1e827c8a1de6ab3bba92ccbb6586ec7adfca0efb662b78b2898654db033299451259d95763a940367136162cf82c4c7c9a3fcaa27f22d38b3cb04107b556efb616d889fdca82359490d4b27aabd8db012859e4082e4", 0x8f}, {&(0x7f00000011c0)="8a6ad7259d73fa5fe73706af1c002a435ee5cef85faf490f85e5d1797e8a649414095a51dce66c4fd618cdb7c33a29c6ab920524f514fa07", 0x38}], 0x2, &(0x7f0000001380)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @dev={0xac, 0x14, 0x14, 0x12}, @empty}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @broadcast}}}, @ip_retopts={{0x30, 0x0, 0x7, {[@ssrr={0x89, 0x13, 0xffffffffffffffc1, [@loopback, @empty, @local, @local]}, @timestamp={0x44, 0xc, 0x3ff, 0x0, 0x2, [{[], 0xffffffffffffffc1}, {[], 0xe000000000000000}]}]}}}], 0x90}}, {{&(0x7f0000001440)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000001580)=[{&(0x7f0000001480)="0374517aa3846e45e2df999e5f30cf392650e1b160ee7e0f4d77c33336a30003c64f9f862040f018b1b165117f2ad2e4f407dbe745a8190705ff4fb00842d1774d5b55bb014fc1e01471099d72bc6a565e7ad71a9ae9c040c31b442aa985fe962abb67bb23ba572f9b7231ce0ae39e73f5199366e69ede7a75de9783830aca27c11c86273d626ef4de12f1dde70703458a445c3cd529b9d401a1026e773c89c3dec8f00145a39cf97b496e7d299e8de2c2", 0xb1}, {&(0x7f0000001540)="abaf151d8a7cabc704375227bcf819ac7f3a", 0x12}], 0x2}}, {{&(0x7f00000015c0)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f00000017c0)=[{&(0x7f0000001600)="d382d39e056e89cd0e660c3127a1f3ec282fdaca0ce99aa9f18ffadf17f420d2205b", 0x22}, {&(0x7f0000001640)="b0b9cb4ce9b15db883aafabeb012b552130f13e1da65e5f5d2693704add4f623ef287d850ca072e9cded12f2ba170bbefb205687a76f25848e0225440e080eecfe12df144d8c5a2d869cb82dd0e1a9e369026cb26e9c2da6ca1d68fdf0b197772894c50b21b80792a46b6cbf8756b6feb04891bde66065ac802f84c7b702578ea06981d6e8afee4b878ec853277d561e02f1cc9055f1d27fa93739c200ae76c28241157172db6a27b8579cbc61c0831da12db2d52158bc3d783910ca886e72fad4d3113ea8e8339f852b6181c7e3d54db7d48db0ca574bb20d13b4a9500dfeb1079f94fac4c15a052f4e889b8a4e54c2a731", 0xf2}, {&(0x7f0000001740)="5607556d5080f7bce7aa0dc050ad0745182bb163edec", 0x16}, {&(0x7f0000001780)="1ebbe29affedf974dc8ceda02acbbd117b0667959a2a2752b24ffbdb15166effaf", 0x21}], 0x4, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x39d3}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_retopts={{0x28, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x5, [{0x5, 0x2}]}, @lsrr={0x83, 0x7, 0x9, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @generic={0x8b, 0x8, "6ea1d743d290"}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x80000000}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @loopback, @empty}}}], 0xd8}}, {{&(0x7f0000001940)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000001a40)=[{&(0x7f0000001980)="f4fd80c8d055424253415cfc24dbc8474ab2b06c4b1424f99cf468f924e1a4c8dfb6b0b19d01c7066bca40fb3dc16cd03adf58d78c73d2d94a75239d2e20ef8feea798404f06b7420477416f8cef57311e6d4e86f41ef757b2f31cf13831198b", 0x60}, {&(0x7f0000001a00)="ea08b6e9c30e9d0198fd9ec982e6d25115b66df5386dda060144e74973f1396fbba734ea0b1dae97ea0d051ddf3ba7d9e18e51e6ea5a7c4588afc9", 0x3b}], 0x2, &(0x7f0000003500)=[@ip_ttl={{0x14}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_retopts={{0x30, 0x0, 0x7, {[@lsrr={0x83, 0x1f, 0x100000001, [@rand_addr=0xff, @empty, @rand_addr=0x1ff, @multicast1, @loopback, @local, @empty]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2fd4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x16}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0xc8}}], 0xa, 0x20004080) 08:28:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000000c0)=""/8, &(0x7f0000000080)=0x8) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000100)={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'caif0\x00'}}) [ 142.346838] FAT-fs (loop5): Unrecognized mount option "\" or missing value 08:28:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b4000000000000000000f700009500"/32], &(0x7f0000000040)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xfffffffffffffffc}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x1}, 0x10}, 0x70) 08:28:20 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x400100, 0x0) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000080)=0x7ff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000100)={0x7, &(0x7f00000000c0)=[{}, {}, {0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000240)={r2, &(0x7f0000000140)=""/197}) close(r1) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000280), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) close(r1) 08:28:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB='\b\x00'], 0x0, 0xf}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 142.406149] audit: type=1400 audit(1560328100.575:43): avc: denied { map } for pid=7294 comm="syz-executor.1" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=26545 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 08:28:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008913, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$sock_ifreq(r2, 0x8937, &(0x7f0000000080)={'bridge_slave_0\x00', @ifru_addrs=@nl=@kern={0x10, 0x0, 0x0, 0x400000}}) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'ip6_vti0\x00\x00\x01\xf9\xde\a\x00', @ifru_addrs=@in={0x2, 0x4e20}}) 08:28:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) nanosleep(&(0x7f0000000000)={r0, r1+30000000}, 0x0) clock_gettime(0x7, &(0x7f0000000080)) 08:28:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='group\x00\x00', 0x200002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x3, 0x6}) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x20) [ 142.535540] audit: type=1400 audit(1560328100.645:44): avc: denied { create } for pid=7290 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:28:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000a1cf6c)="1f00000054000d0000000000fc07ff1b070404000400000007000100010039", 0x1f) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$RTC_VL_CLR(r0, 0x7014) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="006d652fb3fcc520"], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IMGETDEVINFO(r0, 0x80044944, &(0x7f0000000040)={0x80}) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) 08:28:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000040)) 08:28:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000780)=0x32, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x8a19, 0x20000) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000180)={0x56, 0x9, 0x7f, {0x5, 0x100000000}, {0x6, 0x5}, @period={0x0, 0x401, 0x100000000, 0x7, 0x1, {0x2, 0x1, 0x0, 0x5}, 0x3, &(0x7f0000000140)=[0x8, 0x2, 0x0]}}) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 142.689924] PF_BRIDGE: br_mdb_parse() with non-bridge 08:28:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") prctl$PR_MCE_KILL_GET(0x22) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x3ff) 08:28:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x1, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00']}, 0x79) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x10000, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x81) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000080)={r0, r2}) 08:28:21 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) ustat(0x20, &(0x7f0000000140)) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x70, 0x8, 0x1ff, 0x6, 0x9, 0x0, 0x7f, 0x40008, 0x4, 0xec, 0xffffffffffffffc0, 0x8, 0x1000, 0x9, 0x8, 0xfffffffffffffff8, 0x800, 0x8, 0x401, 0x4, 0x5, 0x80000001, 0x3, 0xf800000000000000, 0x1000, 0x8, 0x2, 0xfffffffffffeffff, 0x2, 0xfffffffffffffff6, 0xffff, 0x100000000, 0xffffffffffffc591, 0x4, 0x244, 0x7ff, 0x2, 0x0, 0x80, 0x3, @perf_config_ext={0x8, 0xffff}, 0x230a0, 0x6, 0x0, 0x1, 0x1a, 0x404, 0x2}, r0, 0x7, r1, 0x9) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f00000001c0)) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$VIDIOC_STREAMON(r3, 0x40045613, &(0x7f0000000180)) 08:28:21 executing program 0: socket$inet(0x2, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x17fffe, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) clone(0x900, 0x0, 0xfffffffffffffffe, &(0x7f0000000c40), 0xffffffffffffffff) r0 = request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r0, 0x0, 0xf}, &(0x7f0000000240)=ANY=[@ANYBLOB='enc=raw hash=sha512-ssse3\x00'/77], 0x0, &(0x7f0000000180)=""/15) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 08:28:21 executing program 1: creat(&(0x7f0000000080)='./bus\x00', 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) mprotect(&(0x7f0000005000/0x2000)=nil, 0x2000, 0x3) 08:28:21 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x5a041, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) getpeername$ax25(r0, &(0x7f0000000040)={{}, [@rose, @null, @rose, @null, @bcast, @remote, @default, @bcast]}, &(0x7f0000000100)=0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x9, 0x0, &(0x7f0000000180)) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000001c0)={0x3, 0xa4, "2a605fca7c4f6b0b1c007b733a0752c0f61f4f18e263bf3ba5ee8293dc3a4090830fb62586e599031a88e19fa37b76fc1f2f6b5d178e0a7fe56940bef0eeeb52fb91dc6ced02ac71581c7f7d279002305030fbc34858028a79d7b0633d54dad2e8d1cc48c4871063eb2f230fc99805cd2011c34a69bd79dbaa8176b8f6ed1acdd8ee14cae0bfb46dbbd36122fb6bf644aeeae02e0558ac80014e388bfc55e66e2daa1cd5"}) 08:28:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendmsg$key(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x2, 0x4, 0x80000001, 0x0, 0x7, 0x0, 0x70bd28, 0x25dfdbfc, [@sadb_x_filter={0x5, 0x1a, @in=@multicast1, @in=@multicast1, 0x4, 0x10, 0x10}]}, 0x38}}, 0xc000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x14000, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x6, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x2, 0x3d0, 0xffffffff}, &(0x7f00000001c0)=0x67, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r3, 0x4) dup3(r1, r1, 0x80000) sendfile(r1, r1, 0x0, 0x102000002) [ 142.936316] audit: type=1804 audit(1560328101.105:45): pid=7365 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir111869273/syzkaller.bx2UWN/8/bus" dev="sda1" ino=16550 res=1 [ 143.058596] audit: type=1804 audit(1560328101.135:46): pid=7365 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir111869273/syzkaller.bx2UWN/8/bus" dev="sda1" ino=16550 res=1 [ 143.085504] audit: type=1804 audit(1560328101.135:47): pid=7365 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir111869273/syzkaller.bx2UWN/8/bus" dev="sda1" ino=16550 res=1 [ 143.131303] print_req_error: I/O error, dev loop0, sector 0 08:28:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000007e00)=[{{&(0x7f0000000340)=@nl, 0x80, 0x0}}], 0x1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0x10094) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9f9, 0x4000) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x6, 0xfec, [0x200003c0, 0x0, 0x0, 0x20000714, 0x200011b0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x7, 0x4, 0x86dd, 'veth0_to_bridge\x00', 'vlan0\x00', 'ip6gre0\x00', 'dummy0\x00', @link_local, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff], 0xe6, 0x11e, 0x156, [@quota={'quota\x00', 0x18, {{0x1, 0x0, 0x1ff, 0x4}}}, @realm={'realm\x00', 0x10, {{0x8, 0x4}}}], [@snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}], @arpreply={'arpreply\x00', 0x10, {{@random="49abc65603b7", 0xffffffffffffffff}}}}, {0x5, 0x8, 0x0, 'syzkaller1\x00', 'lapb0\x00', 'dummy0\x00', 'bond_slave_1\x00', @random="11f2a4f945fd", [0xff, 0x0, 0xff, 0xff, 0xff], @random="ed6dc2c7b71b", [0x0, 0x0, 0xff], 0x196, 0x196, 0x1ce, [@comment={'comment\x00', 0x100}], [], @arpreply={'arpreply\x00', 0x10, {{@dev={[], 0xa}, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{0xf, 0x5, 0x6002, 'nr0\x00', 'irlan0\x00', 'hsr0\x00', 'veth1_to_bond\x00', @empty, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], @remote, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], 0xa6, 0xa6, 0xde, [@cluster={'cluster\x00', 0x10, {{0x7f1, 0x33fa, 0x100000000, 0x7}}}], [], @snat={'snat\x00', 0x10, {{@dev={[], 0x10}, 0xfffffffffffffffd}}}}, {0x11, 0x53, 0x893f, 'vlan0\x00', 'bcsf0\x00', 'nr0\x00', 'team_slave_0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @random="978ed0350274", [0x0, 0x0, 0x0, 0x0, 0xff, 0xff], 0x91e, 0x956, 0x98e, [@among={'among\x00', 0x888, {{@offset, @zero, 0x0, {[0x80000000, 0x8001, 0x400, 0x6, 0x1ff, 0x2, 0x2, 0xffff, 0x0, 0xfffffffeffffffff, 0x1, 0x10000, 0x3, 0x8, 0x7, 0x2, 0x4e2b, 0x311c, 0x6, 0xd, 0x100000000, 0x8, 0x7, 0x1, 0x0, 0x6, 0x1, 0xfffffffffffffff7, 0x40, 0x7, 0x9, 0x0, 0x7f, 0x3, 0xbc, 0x4, 0x1, 0x1, 0x8, 0x7fff, 0x0, 0xff, 0x9, 0x0, 0x9, 0x2, 0x6, 0xfffffffffffffffb, 0x10001, 0x7, 0x6, 0x0, 0x9, 0x20, 0x101, 0x6, 0x200, 0x3, 0x8, 0x5, 0x2, 0xfffffffffffffff9, 0x80, 0x9, 0x80000001, 0x6, 0x4, 0x72, 0x6, 0x20, 0x2, 0x5d, 0xd2, 0x8, 0x7, 0x4897, 0x6, 0x5f, 0x0, 0x5457223, 0x656f, 0xff, 0x4, 0x1, 0x5, 0xfffffffffffffffa, 0x9, 0x8, 0x1, 0x1000, 0x2, 0x7fff, 0x9, 0x4, 0x6, 0x86, 0x8, 0x8, 0x9, 0x8000, 0x3ff, 0x0, 0x4e, 0x9, 0xe349, 0x7, 0x0, 0xffff, 0x8479, 0x80000000, 0x0, 0x0, 0x8000, 0x1, 0x10001, 0x80e, 0xffffffff, 0xfffffffffffffffd, 0x6, 0x1, 0x5, 0x9, 0x100000000, 0x1, 0x81, 0x2, 0xa61, 0x5, 0x3b, 0x8, 0x1e, 0x4, 0xfffffffffffffffe, 0x5, 0x7, 0x4, 0x6, 0x22b1fcd8, 0x6, 0x800000, 0x1, 0x6, 0x1ff, 0x7ff, 0x3ff, 0x3d6, 0x1, 0x9, 0x8, 0x8, 0xa5e, 0x1, 0x0, 0x4, 0x0, 0x80, 0xe3b8, 0x2, 0x4, 0x1, 0x2, 0x1, 0x4, 0xffffffff, 0x8f, 0x816, 0x1, 0xab33, 0x800, 0x4, 0x9a1, 0x5, 0x1f, 0x9, 0x7f, 0x401, 0x5, 0x10000, 0x0, 0x9, 0x100000000, 0x400, 0x9, 0x5, 0xfffffffffffffffb, 0x7, 0x1000, 0xffffffff00000000, 0x2, 0x469c, 0xfffffffffffffff8, 0x27a, 0x2, 0x59, 0x9, 0x4000000000000000, 0x7, 0x0, 0x0, 0x5, 0x5ef8, 0x8001, 0x0, 0x100000001, 0x7, 0x3, 0xa83, 0x6, 0x2, 0x9c14, 0x3e000000000, 0x14, 0x8, 0xffffffffffff8000, 0x0, 0x7fff, 0x5, 0x1, 0x3f, 0x354a, 0x9, 0xbc, 0x8ec7, 0x4, 0x9, 0x200000000, 0x2, 0xff, 0xf17b, 0x80, 0x1a, 0x3, 0x3, 0x1ff, 0x3ff, 0x1, 0xfff, 0x1, 0x4, 0xdb0f, 0xcdb, 0x40, 0x7fffffff, 0x101, 0x7f, 0x9, 0x1ff, 0x100, 0x0, 0xfffffffffffffb7b, 0x9, 0x4000000, 0x4, 0x1, 0x9, 0x3], 0x8, [{[0x0, 0x8], @multicast2}, {[0x9, 0xee], @rand_addr=0x8}, {[0x41, 0x9], @empty}, {[0x1f, 0x80000001], @rand_addr=0x100}, {[0xff, 0x8], @dev={0xac, 0x14, 0x14, 0x27}}, {[0x5, 0x100000001], @initdev={0xac, 0x1e, 0x0, 0x0}}, {[0x1, 0x4], @broadcast}, {[0x2e, 0x7], @broadcast}]}, {[0x3, 0x200, 0x73, 0x80, 0x9, 0x800, 0x3, 0x100000000, 0x1, 0x3, 0x100, 0xbfb0, 0x1447bfe6, 0x1fffffffc0000000, 0x0, 0x3, 0x7, 0x7, 0x8, 0x3, 0x1, 0x993, 0x7, 0x3, 0xff, 0x10001, 0x2, 0x4, 0x20, 0x0, 0x2, 0x3, 0x3, 0x9e65, 0x0, 0x5, 0x3, 0x4d, 0x0, 0x87, 0x8, 0x2, 0x6, 0x7, 0x1, 0xd2b9, 0x7f, 0x1, 0x6, 0x0, 0x6, 0x10001, 0x400080000, 0x1, 0x5, 0x55000000000000, 0x4, 0xc000000000000000, 0x3ff, 0x80, 0x2, 0x9, 0x3, 0x200, 0x800, 0x9, 0xffffffff, 0x3, 0xffffffff80000000, 0x7fffffff, 0x1000, 0x401, 0xfb34, 0x7, 0x7, 0xfffffffffffffe01, 0x3, 0x6, 0x1, 0x3ff, 0x6, 0x2, 0x5, 0x3ff, 0x100000000, 0x1ff, 0x2, 0x8, 0x6, 0x6, 0xdba, 0x10000, 0x7, 0x101, 0xfffffffffffffffc, 0x9, 0x1, 0x0, 0x7fffffff, 0x1, 0x4, 0x6, 0x2c, 0x80, 0x1f, 0x2, 0x9, 0x3, 0x2, 0x8, 0x4, 0x6, 0x81, 0x9, 0x7, 0xffff, 0x9, 0x6, 0x8, 0x6d, 0x2, 0x4, 0xc163, 0x5, 0x3, 0x8001, 0x7401, 0x9, 0x6, 0x5, 0x7dac, 0x800, 0x10000, 0x7fffffff, 0x8001, 0x6, 0x1, 0x81, 0x4, 0x5, 0x0, 0x3, 0xf53, 0x0, 0x6, 0x802, 0x3, 0x1400000000, 0x4, 0xffffffff, 0x2, 0xd10, 0x5, 0x6, 0x6000, 0x100000000, 0x80, 0x4, 0x3, 0x3, 0x81, 0x3e, 0x6, 0x0, 0x4, 0xfffffffffffffffe, 0x1ff, 0xffffffff, 0x7fffffff, 0x200, 0x1, 0xd97, 0xb46, 0x3, 0x0, 0x58, 0x3, 0x80000000, 0x8, 0x5, 0x670, 0x927, 0x4, 0x93f, 0x1, 0x7, 0x5, 0x1, 0x8, 0x1, 0x800, 0x900000, 0x5, 0x9, 0x9, 0xffffffffffff8000, 0x4, 0x3ff, 0x10001, 0x1c000000000000, 0x100, 0x3f, 0x1, 0x1, 0x7ff, 0x20000000000, 0x3ff, 0x80, 0x0, 0xc7, 0xffff, 0x40, 0x5, 0x313, 0x0, 0x6, 0x40, 0x9, 0x1, 0xffff, 0x8000, 0x0, 0xfffffffffffffff7, 0xde9, 0x8, 0x6, 0x5, 0xfffffffffffffff9, 0x5, 0xec8, 0x2, 0xcc, 0xd980000000, 0x1, 0x9, 0x3f, 0x10001, 0x9bd, 0x3, 0x4, 0x2, 0x0, 0x0, 0x6, 0x4, 0x9, 0x6, 0x6, 0x6aefd295, 0x3ff, 0x20, 0x3, 0x200000000000000, 0x1, 0x7fffffff, 0x400, 0x2], 0x1, [{[0xfffffffffffffffc, 0xfffffffffffffffd], @initdev={0xac, 0x1e, 0x0, 0x0}}]}}}}], [@arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xffffffffffffffff}}}], @common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x2, [{0xb, 0x0, 0x17, 'nr0\x00', 'ip6tnl0\x00', 'veth0_to_hsr\x00', 'eql\x00', @random="9e9d605266f4", [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0xff], 0x6e, 0xee, 0x126, [], [@common=@ERROR={'ERROR\x00', 0x20, {"20bfad5be79dba1b2e40bba4bf758a9a5a73b9c67f2892cdc7410a223857"}}, @arpreply={'arpreply\x00', 0x10, {{@empty, 0xfffffffffffffffd}}}], @arpreply={'arpreply\x00', 0x10, {{@empty, 0xfffffffffffffffd}}}}, {0x3, 0x76, 0x0, 'ip6erspan0\x00', 'veth1_to_hsr\x00', 'irlan0\x00', 'nr0\x00', @dev={[], 0x20}, [0x0, 0xff, 0xff, 0xff, 0xff], @random="3f703329b8fe", [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], 0x6e, 0x6e, 0xa6, [], [], @arpreply={'arpreply\x00', 0x10, {{@random="a283b173d7f5", 0xffffffffffffffff}}}}]}]}, 0x1064) 08:28:21 executing program 1: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000da1000)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000061000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, &(0x7f0000000000)=0x4) truncate(&(0x7f0000000080)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x2) 08:28:21 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffff9c, 0x0, 0x7, &(0x7f00000001c0)='cgroup\x00', 0xffffffffffffffff}, 0x30) r1 = syz_open_procfs(r0, &(0x7f00000003c0)='net/icmp\x00') openat$cgroup_ro(r1, &(0x7f0000000000)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x70, &(0x7f0000000040)={r1}, &(0x7f0000000000)=0x8) 08:28:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000780)=0x32, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x8a19, 0x20000) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000180)={0x56, 0x9, 0x7f, {0x5, 0x100000000}, {0x6, 0x5}, @period={0x0, 0x401, 0x100000000, 0x7, 0x1, {0x2, 0x1, 0x0, 0x5}, 0x3, &(0x7f0000000140)=[0x8, 0x2, 0x0]}}) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 08:28:21 executing program 5: r0 = getpgrp(0x0) r1 = gettid() prctl$PR_GET_SECCOMP(0x15) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x3b, &(0x7f0000000000)=0x4, 0x4) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000100)={0x1b, 0x7e, 0x4}) rt_sigtimedwait(&(0x7f0000a72000)={0xac}, &(0x7f0000000080), 0x0, 0x8) 08:28:21 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x1000000002, 0x2902) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000140)={0x1, {0x0, 0x989680}}) 08:28:21 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x174, r2, 0x320, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK={0x40, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x14000000000}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}]}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xf769}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}]}, @TIPC_NLA_MEDIA={0x9c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdb3d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x174}}, 0x0) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x4) 08:28:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000007e00)=[{{&(0x7f0000000340)=@nl, 0x80, 0x0}}], 0x1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0x10094) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9f9, 0x4000) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x6, 0xfec, [0x200003c0, 0x0, 0x0, 0x20000714, 0x200011b0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x7, 0x4, 0x86dd, 'veth0_to_bridge\x00', 'vlan0\x00', 'ip6gre0\x00', 'dummy0\x00', @link_local, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff], 0xe6, 0x11e, 0x156, [@quota={'quota\x00', 0x18, {{0x1, 0x0, 0x1ff, 0x4}}}, @realm={'realm\x00', 0x10, {{0x8, 0x4}}}], [@snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}], @arpreply={'arpreply\x00', 0x10, {{@random="49abc65603b7", 0xffffffffffffffff}}}}, {0x5, 0x8, 0x0, 'syzkaller1\x00', 'lapb0\x00', 'dummy0\x00', 'bond_slave_1\x00', @random="11f2a4f945fd", [0xff, 0x0, 0xff, 0xff, 0xff], @random="ed6dc2c7b71b", [0x0, 0x0, 0xff], 0x196, 0x196, 0x1ce, [@comment={'comment\x00', 0x100}], [], @arpreply={'arpreply\x00', 0x10, {{@dev={[], 0xa}, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{0xf, 0x5, 0x6002, 'nr0\x00', 'irlan0\x00', 'hsr0\x00', 'veth1_to_bond\x00', @empty, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], @remote, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], 0xa6, 0xa6, 0xde, [@cluster={'cluster\x00', 0x10, {{0x7f1, 0x33fa, 0x100000000, 0x7}}}], [], @snat={'snat\x00', 0x10, {{@dev={[], 0x10}, 0xfffffffffffffffd}}}}, {0x11, 0x53, 0x893f, 'vlan0\x00', 'bcsf0\x00', 'nr0\x00', 'team_slave_0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @random="978ed0350274", [0x0, 0x0, 0x0, 0x0, 0xff, 0xff], 0x91e, 0x956, 0x98e, [@among={'among\x00', 0x888, {{@offset, @zero, 0x0, {[0x80000000, 0x8001, 0x400, 0x6, 0x1ff, 0x2, 0x2, 0xffff, 0x0, 0xfffffffeffffffff, 0x1, 0x10000, 0x3, 0x8, 0x7, 0x2, 0x4e2b, 0x311c, 0x6, 0xd, 0x100000000, 0x8, 0x7, 0x1, 0x0, 0x6, 0x1, 0xfffffffffffffff7, 0x40, 0x7, 0x9, 0x0, 0x7f, 0x3, 0xbc, 0x4, 0x1, 0x1, 0x8, 0x7fff, 0x0, 0xff, 0x9, 0x0, 0x9, 0x2, 0x6, 0xfffffffffffffffb, 0x10001, 0x7, 0x6, 0x0, 0x9, 0x20, 0x101, 0x6, 0x200, 0x3, 0x8, 0x5, 0x2, 0xfffffffffffffff9, 0x80, 0x9, 0x80000001, 0x6, 0x4, 0x72, 0x6, 0x20, 0x2, 0x5d, 0xd2, 0x8, 0x7, 0x4897, 0x6, 0x5f, 0x0, 0x5457223, 0x656f, 0xff, 0x4, 0x1, 0x5, 0xfffffffffffffffa, 0x9, 0x8, 0x1, 0x1000, 0x2, 0x7fff, 0x9, 0x4, 0x6, 0x86, 0x8, 0x8, 0x9, 0x8000, 0x3ff, 0x0, 0x4e, 0x9, 0xe349, 0x7, 0x0, 0xffff, 0x8479, 0x80000000, 0x0, 0x0, 0x8000, 0x1, 0x10001, 0x80e, 0xffffffff, 0xfffffffffffffffd, 0x6, 0x1, 0x5, 0x9, 0x100000000, 0x1, 0x81, 0x2, 0xa61, 0x5, 0x3b, 0x8, 0x1e, 0x4, 0xfffffffffffffffe, 0x5, 0x7, 0x4, 0x6, 0x22b1fcd8, 0x6, 0x800000, 0x1, 0x6, 0x1ff, 0x7ff, 0x3ff, 0x3d6, 0x1, 0x9, 0x8, 0x8, 0xa5e, 0x1, 0x0, 0x4, 0x0, 0x80, 0xe3b8, 0x2, 0x4, 0x1, 0x2, 0x1, 0x4, 0xffffffff, 0x8f, 0x816, 0x1, 0xab33, 0x800, 0x4, 0x9a1, 0x5, 0x1f, 0x9, 0x7f, 0x401, 0x5, 0x10000, 0x0, 0x9, 0x100000000, 0x400, 0x9, 0x5, 0xfffffffffffffffb, 0x7, 0x1000, 0xffffffff00000000, 0x2, 0x469c, 0xfffffffffffffff8, 0x27a, 0x2, 0x59, 0x9, 0x4000000000000000, 0x7, 0x0, 0x0, 0x5, 0x5ef8, 0x8001, 0x0, 0x100000001, 0x7, 0x3, 0xa83, 0x6, 0x2, 0x9c14, 0x3e000000000, 0x14, 0x8, 0xffffffffffff8000, 0x0, 0x7fff, 0x5, 0x1, 0x3f, 0x354a, 0x9, 0xbc, 0x8ec7, 0x4, 0x9, 0x200000000, 0x2, 0xff, 0xf17b, 0x80, 0x1a, 0x3, 0x3, 0x1ff, 0x3ff, 0x1, 0xfff, 0x1, 0x4, 0xdb0f, 0xcdb, 0x40, 0x7fffffff, 0x101, 0x7f, 0x9, 0x1ff, 0x100, 0x0, 0xfffffffffffffb7b, 0x9, 0x4000000, 0x4, 0x1, 0x9, 0x3], 0x8, [{[0x0, 0x8], @multicast2}, {[0x9, 0xee], @rand_addr=0x8}, {[0x41, 0x9], @empty}, {[0x1f, 0x80000001], @rand_addr=0x100}, {[0xff, 0x8], @dev={0xac, 0x14, 0x14, 0x27}}, {[0x5, 0x100000001], @initdev={0xac, 0x1e, 0x0, 0x0}}, {[0x1, 0x4], @broadcast}, {[0x2e, 0x7], @broadcast}]}, {[0x3, 0x200, 0x73, 0x80, 0x9, 0x800, 0x3, 0x100000000, 0x1, 0x3, 0x100, 0xbfb0, 0x1447bfe6, 0x1fffffffc0000000, 0x0, 0x3, 0x7, 0x7, 0x8, 0x3, 0x1, 0x993, 0x7, 0x3, 0xff, 0x10001, 0x2, 0x4, 0x20, 0x0, 0x2, 0x3, 0x3, 0x9e65, 0x0, 0x5, 0x3, 0x4d, 0x0, 0x87, 0x8, 0x2, 0x6, 0x7, 0x1, 0xd2b9, 0x7f, 0x1, 0x6, 0x0, 0x6, 0x10001, 0x400080000, 0x1, 0x5, 0x55000000000000, 0x4, 0xc000000000000000, 0x3ff, 0x80, 0x2, 0x9, 0x3, 0x200, 0x800, 0x9, 0xffffffff, 0x3, 0xffffffff80000000, 0x7fffffff, 0x1000, 0x401, 0xfb34, 0x7, 0x7, 0xfffffffffffffe01, 0x3, 0x6, 0x1, 0x3ff, 0x6, 0x2, 0x5, 0x3ff, 0x100000000, 0x1ff, 0x2, 0x8, 0x6, 0x6, 0xdba, 0x10000, 0x7, 0x101, 0xfffffffffffffffc, 0x9, 0x1, 0x0, 0x7fffffff, 0x1, 0x4, 0x6, 0x2c, 0x80, 0x1f, 0x2, 0x9, 0x3, 0x2, 0x8, 0x4, 0x6, 0x81, 0x9, 0x7, 0xffff, 0x9, 0x6, 0x8, 0x6d, 0x2, 0x4, 0xc163, 0x5, 0x3, 0x8001, 0x7401, 0x9, 0x6, 0x5, 0x7dac, 0x800, 0x10000, 0x7fffffff, 0x8001, 0x6, 0x1, 0x81, 0x4, 0x5, 0x0, 0x3, 0xf53, 0x0, 0x6, 0x802, 0x3, 0x1400000000, 0x4, 0xffffffff, 0x2, 0xd10, 0x5, 0x6, 0x6000, 0x100000000, 0x80, 0x4, 0x3, 0x3, 0x81, 0x3e, 0x6, 0x0, 0x4, 0xfffffffffffffffe, 0x1ff, 0xffffffff, 0x7fffffff, 0x200, 0x1, 0xd97, 0xb46, 0x3, 0x0, 0x58, 0x3, 0x80000000, 0x8, 0x5, 0x670, 0x927, 0x4, 0x93f, 0x1, 0x7, 0x5, 0x1, 0x8, 0x1, 0x800, 0x900000, 0x5, 0x9, 0x9, 0xffffffffffff8000, 0x4, 0x3ff, 0x10001, 0x1c000000000000, 0x100, 0x3f, 0x1, 0x1, 0x7ff, 0x20000000000, 0x3ff, 0x80, 0x0, 0xc7, 0xffff, 0x40, 0x5, 0x313, 0x0, 0x6, 0x40, 0x9, 0x1, 0xffff, 0x8000, 0x0, 0xfffffffffffffff7, 0xde9, 0x8, 0x6, 0x5, 0xfffffffffffffff9, 0x5, 0xec8, 0x2, 0xcc, 0xd980000000, 0x1, 0x9, 0x3f, 0x10001, 0x9bd, 0x3, 0x4, 0x2, 0x0, 0x0, 0x6, 0x4, 0x9, 0x6, 0x6, 0x6aefd295, 0x3ff, 0x20, 0x3, 0x200000000000000, 0x1, 0x7fffffff, 0x400, 0x2], 0x1, [{[0xfffffffffffffffc, 0xfffffffffffffffd], @initdev={0xac, 0x1e, 0x0, 0x0}}]}}}}], [@arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xffffffffffffffff}}}], @common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x2, [{0xb, 0x0, 0x17, 'nr0\x00', 'ip6tnl0\x00', 'veth0_to_hsr\x00', 'eql\x00', @random="9e9d605266f4", [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0xff], 0x6e, 0xee, 0x126, [], [@common=@ERROR={'ERROR\x00', 0x20, {"20bfad5be79dba1b2e40bba4bf758a9a5a73b9c67f2892cdc7410a223857"}}, @arpreply={'arpreply\x00', 0x10, {{@empty, 0xfffffffffffffffd}}}], @arpreply={'arpreply\x00', 0x10, {{@empty, 0xfffffffffffffffd}}}}, {0x3, 0x76, 0x0, 'ip6erspan0\x00', 'veth1_to_hsr\x00', 'irlan0\x00', 'nr0\x00', @dev={[], 0x20}, [0x0, 0xff, 0xff, 0xff, 0xff], @random="3f703329b8fe", [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], 0x6e, 0x6e, 0xa6, [], [], @arpreply={'arpreply\x00', 0x10, {{@random="a283b173d7f5", 0xffffffffffffffff}}}}]}]}, 0x1064) 08:28:21 executing program 0: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$capi20(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x7, 0x0, 0x0, 0x2}, 0x10) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\x00\x00\'v\x01\x03\xf2\x00', @ifru_flags}) syz_open_dev$mice(0x0, 0x0, 0x0) sync() 08:28:21 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") sendmmsg$inet6(r0, &(0x7f000000a180)=[{{&(0x7f0000004980)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000004dc0)=ANY=[@ANYBLOB="140000000099486771d1718f1a00"/24], 0x18}}], 0x1, 0x0) 08:28:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x100000001, 0x0) sendfile(r0, r1, &(0x7f0000000100)=0x5c, 0xe0) 08:28:22 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x1, @ipv4={[], [], @loopback}}, 0x1c) listen(r0, 0x5) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x100, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000080)={@empty, r3}, 0x14) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x2}, 0x98) 08:28:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0xa, 0x6, 0x200000001713, &(0x7f0000000080)={0xffffffffffffffff}) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x18, 0x0) write$tun(r2, &(0x7f0000000280)={@val={0x0, 0x60}, @val={0x1, 0x80, 0x5, 0x4, 0xf0, 0x6bc2}, @arp=@ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x1, @remote, @loopback, @empty, @dev={0xfe, 0x80, [], 0xd}}}, 0x42) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0xc4, "e5e61fe2f0c4f7bd8d516a4f5e3bb05aaf30924b94495cc168409777f0512c6e9e5bde75f15807ddf7cdd7e77bdcb549a48ed09fe9190826bd6b689f35f7214479378651b18027b72d0bc3765852860277f63cc18dc113b8fbf64259470564a37df83cec102625e3e19905a62286ddc038de1a0c1d1f02624a7cce094aabb1d8af3ea26bfe47127abac479124480d5ae21974dc8bddc07611be35014e59bfbed4f8ac5424a19a4e0f17f0bb80b37318dad9332d9898485ffb9ec8db0ebd68d49794d5b56"}, &(0x7f0000000200)=0xcc) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0x4, 0x4, 0x4, 0x5, 0x100, 0x7, 0x4, 0x30, r3}, 0x20) r4 = socket$isdn(0x22, 0x3, 0x11) ftruncate(r4, 0x5) accept4(r4, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 08:28:22 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000000)={{0xfffffffffffffff7, 0xe044, 0x2, 0x80000000}, 'syz0\x00', 0x37}) [ 143.890756] audit: type=1400 audit(1560328102.055:48): avc: denied { write } for pid=7431 comm="syz-executor.0" path="socket:[26925]" dev="sockfs" ino=26925 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 144.035694] input: syz1 as /devices/virtual/input/input5 [ 144.178571] input: syz1 as /devices/virtual/input/input7 [ 144.230391] protocol 88fb is buggy, dev hsr_slave_0 [ 144.235671] protocol 88fb is buggy, dev hsr_slave_1 08:28:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x101040, 0xca) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f00000003c0)='em1ppr0ScpusftsysL\xc5\xf9z') 08:28:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000780)=0x32, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x8a19, 0x20000) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000180)={0x56, 0x9, 0x7f, {0x5, 0x100000000}, {0x6, 0x5}, @period={0x0, 0x401, 0x100000000, 0x7, 0x1, {0x2, 0x1, 0x0, 0x5}, 0x3, &(0x7f0000000140)=[0x8, 0x2, 0x0]}}) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 08:28:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) add_key$keyring(0x0, &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) write$P9_RLCREATE(r0, &(0x7f0000000040)={0x18, 0xf, 0x1, {{0x40, 0x2}, 0x3ff}}, 0x18) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) syz_emit_ethernet(0x0, 0x0, 0x0) setresuid(0x0, 0xee01, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000200)={'veth1_to_bridge\x00', {0x2, 0x0, @multicast1}}) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, 0x0) 08:28:22 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0xffff, 0x0, 0x4, 0x6, r2}, &(0x7f0000000140)=0x10) 08:28:22 executing program 0: ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) mkdir(0x0, 0xe0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000100), &(0x7f0000000140)=0x30) open(&(0x7f0000000300)='./file0\x00', 0x800, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x100) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x1) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r0, 0x2, 0x1) readlinkat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/155, 0x9b) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x400082, 0x0) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f00000002c0)) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000000c0)) 08:28:22 executing program 2: add_key$keyring(&(0x7f0000001080)='keyring\x00', 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffff9) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/4096, 0x1000) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000010c0)={'veth0_to_bridge\x00', 0x600}) prctl$PR_GET_CHILD_SUBREAPER(0x25) 08:28:22 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) close(r0) r1 = socket(0x11, 0x2, 0x0) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000240)={@ipv4, 0x0}, &(0x7f0000000280)=0xfffffffffffffc9d) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000b40)={'\x00', r2}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) io_setup(0x1, &(0x7f00000001c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x3000000, 0x0, 0x0, 0x800000000001, 0x0, r0, 0x0}]) 08:28:22 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x462000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000040)={0x80, 0x0, 0x10001, 0x2}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000080)={0x123, r2}) ioctl(r0, 0xf, &(0x7f00000000c0)="11dc86055e0bceec7be070") mlockall(0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 08:28:22 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551a, &(0x7f0000000000)={0x4000000000000002, 0xfffffffffffffdd3}) 08:28:22 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000180)={0x7, 0x0, [{0x0, 0x2, 0x0, 0x0, @msi={0x4, 0x101, 0x8}}, {0x3, 0x1, 0x0, 0x0, @sint={0x5, 0x1}}, {0x8001, 0x4, 0x0, 0x0, @irqchip={0x200, 0x1000}}, {0x7, 0x3, 0x0, 0x0, @msi={0x0, 0x4, 0x6}}, {0x6, 0x6, 0x0, 0x0, @adapter={0x1062, 0x9, 0xfc5, 0xfffffffffffff769, 0x1}}, {0xfff, 0x7, 0x0, 0x0, @adapter={0xe54, 0x2, 0x4, 0xffffffff, 0x7f5}}, {0xffff, 0x2, 0x0, 0x0, @msi={0x65c, 0xfffffffffffffffe, 0x7}}]}) write$P9_RRENAMEAT(r0, &(0x7f0000000000)={0x7, 0x4b, 0x1}, 0x7) sendfile(r0, r1, 0x0, 0x666d) 08:28:22 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000200)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000b40)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @dev}}, {{0xa, 0x0, 0x0, @loopback}}]}, 0x190) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000040)=0x7) 08:28:23 executing program 5: r0 = getpid() getpriority(0x3, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") socket(0xe, 0x8002, 0x10001) r2 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x7, 0x48800) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xb, 0x6, 0x209e21, 0x80, 0x40000020000001, r3, 0x0, [], 0x0, 0xffffffffffffffff, 0x4}, 0x3c) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f00000000c0)={0x0, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e21, @broadcast}, 0x2c0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)='tunl0\x00', 0x7ff, 0x1ff, 0x7}) 08:28:23 executing program 2: mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x2871, 0xffffffffffffffff, 0x0) munmap(&(0x7f000053c000/0x1000)=nil, 0x1000) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) [ 145.063275] syz-executor.1 (7493) used greatest stack depth: 24096 bytes left 08:28:23 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x1) recvfrom$rose(r1, &(0x7f0000000340)=""/126, 0x7e, 0x2, &(0x7f00000002c0)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, 0x2, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x40) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000180)="02cb61903010bc93adfc21d3d84ac1bfb819a00f670754", 0x0}, 0x20) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0xfdef) 08:28:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x8001424, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 08:28:23 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x0, 0x0, 0x0, 0x0, 0x0) close(r0) r2 = getpgrp(0x0) r3 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) write$P9_RLERROR(r1, &(0x7f0000000140)={0x13, 0x7, 0x2, {0xa, ':\xb4(em0ppp0'}}, 0x13) rt_tgsigqueueinfo(r2, r3, 0x200000000000005, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000a71ff8)={0x5f}, 0x8, 0x0) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f00000000c0)) splice(r0, 0x0, r1, 0x0, 0x200, 0x0) 08:28:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clock_getres(0x6, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) 08:28:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x400000) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000180)=ANY=[@ANYBLOB="ed469609d7754eab9bea3915dfea683858f6ea8c763f18e899b883742f044175b6db3568062d44dbe741b63e9e5f00480c4e7f38ac156c9d85d500204f79da5274a29643c5285a70c69551"]) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000040)={0x7b}) 08:28:23 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = epoll_create(0x10000001) r2 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000080)={@multicast1, @local, 0x0}, &(0x7f00000000c0)=0xc) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000140)=@req={0x28, &(0x7f0000000100)={'syzkaller0\x00', @ifru_addrs=@xdp={0x2c, 0x0, r3, 0x21}}}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000001440)) r4 = dup(r0) ioctl$TIOCSBRK(r4, 0x40044591) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 08:28:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendto$rose(r1, &(0x7f0000000080)="c85a34a539395e443363b226a2441bbd1a501498c66dbd99b3ce3a1c1c5d7c82bbd8bbb8d261d7d303b6d64f680e7cdfbcff35527edf1428a55a9763cd3fcccbc41abf339a192023b784bacbc6bb568e6932e24580c332bc23f06bf64efbd2dec5ef26acb6fefc092be743968195f01926d2ff58c933c3f06b7f1cb7bf77ebc7d9b9bb507db6656f170981ae016b6454b4b220b746c3fbe6e4947b6c41a9b3c110df89c7ac58a4d66db935e1b7dc4ac9813c8f709c939796", 0xb8, 0x10, &(0x7f0000000140)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @null}, 0x1c) [ 145.558501] device nr0 entered promiscuous mode 08:28:23 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89ec, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'mangle\x00', 0xf3, "1f26d1b89c3289dccc106333c7b8c19baeb78e725cf8a32658d245978b3df0efe71a4388003be77a782456116fa72004e1c0742a046bbd28460bf42c5e691012faa056b4be21456389ea2e93fe04e6e1ff14b2b1bed0568134c2aeb6623a1d7267045160ae9ec96a03b750a7fb6f430b11eaae0fca5616825a35209041b57a6f5987c2175b17368b9abab6bb545d55e43916632a638650879a3e1812c717104f8c3024271d6bd230df9b4913c9de5e8037b252c5902983fb85c8b1d6adea23f9e08039912a8edb098969c3ec548a52d939d287601158518858afa5da36005f15bad459c156f9fd6dbf6f6949d2d1556da52fb1"}, &(0x7f0000000140)=0x117) 08:28:23 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x0, 0x0, 0x0, 0x0, 0x0) close(r0) r2 = getpgrp(0x0) r3 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) write$P9_RLERROR(r1, &(0x7f0000000140)={0x13, 0x7, 0x2, {0xa, ':\xb4(em0ppp0'}}, 0x13) rt_tgsigqueueinfo(r2, r3, 0x200000000000005, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000a71ff8)={0x5f}, 0x8, 0x0) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f00000000c0)) splice(r0, 0x0, r1, 0x0, 0x200, 0x0) 08:28:23 executing program 1: r0 = socket$inet(0x2, 0x80001, 0x84) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x0) 08:28:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x10000034b) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000040)) [ 145.690790] device nr0 entered promiscuous mode 08:28:23 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0xffffffffffdffffe) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$P9_RREADDIR(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB='\a'], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000380)='./bus\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f0000000580)={'U-', 0x7}, 0x28, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) 08:28:23 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="64b58b05df"], 0x1) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000180)={0x74, 0x0, [0x8, 0x40, 0x0, 0x8]}) mkdir(&(0x7f0000000480)='./bus\x00', 0x0) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x460000) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) 08:28:23 executing program 5: syz_open_dev$sndctrl(0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x0, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) bind$x25(r0, &(0x7f0000000040)={0x9, @remote={[], 0x2}}, 0x12) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000240)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) times(&(0x7f00000002c0)) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, 0x0, 0x0) 08:28:23 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {0x0, r1, r0}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000000c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000580), r1, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r1, 0x2}}, 0x18) [ 145.907966] ================================================================== [ 145.915482] BUG: KASAN: use-after-free in __mutex_lock+0x1285/0x1470 [ 145.921987] Read of size 8 at addr ffff888093072248 by task kworker/u4:5/2845 [ 145.929257] [ 145.930895] CPU: 1 PID: 2845 Comm: kworker/u4:5 Not tainted 4.14.125 #19 [ 145.937741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.947107] Workqueue: ib_addr process_one_req [ 145.951699] Call Trace: [ 145.954308] dump_stack+0x138/0x19c [ 145.957944] ? __mutex_lock+0x1285/0x1470 [ 145.962101] print_address_description.cold+0x7c/0x1dc [ 145.967397] ? __mutex_lock+0x1285/0x1470 [ 145.971557] kasan_report.cold+0xa9/0x2af [ 145.975714] __asan_report_load8_noabort+0x14/0x20 [ 145.980646] __mutex_lock+0x1285/0x1470 [ 145.984648] ? save_trace+0x290/0x290 [ 145.988463] ? ucma_event_handler+0xbd/0xe20 [ 145.993055] ? mutex_trylock+0x1c0/0x1c0 [ 145.997129] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 146.002596] ? kmem_cache_alloc_trace+0x623/0x790 [ 146.007449] ? mark_held_locks+0xb1/0x100 [ 146.011616] mutex_lock_nested+0x16/0x20 [ 146.015692] ? mutex_lock_nested+0x16/0x20 [ 146.019934] ucma_event_handler+0xbd/0xe20 [ 146.024175] addr_handler+0x1db/0x2b0 [ 146.027969] ? cma_work_handler+0x1d0/0x1d0 [ 146.032310] process_one_req+0x239/0x590 [ 146.036364] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 146.041822] process_one_work+0x863/0x1600 [ 146.046054] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 146.050726] worker_thread+0x5d9/0x1050 [ 146.054704] kthread+0x319/0x430 [ 146.058063] ? process_one_work+0x1600/0x1600 [ 146.062552] ? kthread_create_on_node+0xd0/0xd0 [ 146.067237] ret_from_fork+0x24/0x30 [ 146.070947] [ 146.072565] Allocated by task 7570: [ 146.076183] save_stack_trace+0x16/0x20 [ 146.080155] save_stack+0x45/0xd0 [ 146.083609] kasan_kmalloc+0xce/0xf0 [ 146.087315] kmem_cache_alloc_trace+0x152/0x790 [ 146.091987] ucma_open+0x4f/0x290 [ 146.095430] misc_open+0x34f/0x480 [ 146.098960] chrdev_open+0x207/0x590 [ 146.102668] do_dentry_open+0x73b/0xeb0 [ 146.106633] vfs_open+0x105/0x220 [ 146.110076] path_openat+0x8bd/0x3f70 [ 146.113863] do_filp_open+0x18e/0x250 [ 146.117663] do_sys_open+0x2c5/0x430 [ 146.121375] SyS_openat+0x30/0x40 [ 146.124823] do_syscall_64+0x1e8/0x640 [ 146.128712] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 146.133896] [ 146.135524] Freed by task 7565: [ 146.138810] save_stack_trace+0x16/0x20 [ 146.142787] save_stack+0x45/0xd0 [ 146.146246] kasan_slab_free+0x75/0xc0 [ 146.150142] kfree+0xcc/0x270 [ 146.153247] ucma_close+0x280/0x310 [ 146.156873] __fput+0x275/0x7a0 [ 146.160157] ____fput+0x16/0x20 [ 146.163435] task_work_run+0x114/0x190 [ 146.167318] exit_to_usermode_loop+0x1da/0x220 [ 146.171892] do_syscall_64+0x4bc/0x640 [ 146.175774] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 146.180949] [ 146.182567] The buggy address belongs to the object at ffff888093072200 [ 146.182567] which belongs to the cache kmalloc-256 of size 256 [ 146.195232] The buggy address is located 72 bytes inside of [ 146.195232] 256-byte region [ffff888093072200, ffff888093072300) [ 146.207008] The buggy address belongs to the page: [ 146.211937] page:ffffea00024c1c80 count:1 mapcount:0 mapping:ffff8880930720c0 index:0x0 [ 146.220070] flags: 0x1fffc0000000100(slab) [ 146.224293] raw: 01fffc0000000100 ffff8880930720c0 0000000000000000 000000010000000c [ 146.232162] raw: ffffea0002376be0 ffffea0002309060 ffff8880aa8007c0 0000000000000000 [ 146.240033] page dumped because: kasan: bad access detected [ 146.245746] [ 146.247456] Memory state around the buggy address: [ 146.252374] ffff888093072100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 146.259754] ffff888093072180: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 146.267209] >ffff888093072200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 146.274569] ^ [ 146.280280] ffff888093072280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 146.287642] ffff888093072300: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 146.294999] ================================================================== [ 146.302363] Disabling lock debugging due to kernel taint 08:28:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200004000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x78) r1 = dup2(r0, r0) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f00000000c0)={0x6, &(0x7f0000000080)=[0xfffffffeffffffff, 0x3, 0x5fdafa1f, 0x1, 0x8001, 0x6]}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000), 0x10e755) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x10, &(0x7f0000000140)="1135eb98", 0x4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @timestamp, @timestamp], 0x4) 08:28:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x40000) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000040)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 146.308352] Kernel panic - not syncing: panic_on_warn set ... [ 146.308352] [ 146.315818] CPU: 1 PID: 2845 Comm: kworker/u4:5 Tainted: G B 4.14.125 #19 [ 146.323908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.333287] Workqueue: ib_addr process_one_req [ 146.337910] Call Trace: [ 146.340545] dump_stack+0x138/0x19c [ 146.344189] ? __mutex_lock+0x1285/0x1470 [ 146.348344] panic+0x1f2/0x426 [ 146.351549] ? add_taint.cold+0x16/0x16 [ 146.352596] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 146.355533] kasan_end_report+0x47/0x4f [ 146.355542] kasan_report.cold+0x130/0x2af [ 146.355552] __asan_report_load8_noabort+0x14/0x20 [ 146.355560] __mutex_lock+0x1285/0x1470 [ 146.355568] ? save_trace+0x290/0x290 [ 146.355586] ? ucma_event_handler+0xbd/0xe20 [ 146.385929] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 146.387388] ? mutex_trylock+0x1c0/0x1c0 [ 146.387400] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 146.387412] ? kmem_cache_alloc_trace+0x623/0x790 [ 146.387419] ? mark_held_locks+0xb1/0x100 [ 146.387430] mutex_lock_nested+0x16/0x20 [ 146.416471] ? mutex_lock_nested+0x16/0x20 [ 146.419153] chnl_net:chnl_net_open(): err: Unable to register and open device, Err:-19 [ 146.420714] ucma_event_handler+0xbd/0xe20 [ 146.420725] addr_handler+0x1db/0x2b0 [ 146.420733] ? cma_work_handler+0x1d0/0x1d0 [ 146.420747] process_one_req+0x239/0x590 [ 146.420755] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 146.420764] process_one_work+0x863/0x1600 [ 146.420775] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 146.433321] caif:caif_disconnect_client(): nothing to disconnect [ 146.436865] worker_thread+0x5d9/0x1050 [ 146.436881] kthread+0x319/0x430 [ 146.436887] ? process_one_work+0x1600/0x1600 [ 146.436897] ? kthread_create_on_node+0xd0/0xd0 [ 146.482291] ret_from_fork+0x24/0x30 [ 146.486958] Kernel Offset: disabled [ 146.490668] Rebooting in 86400 seconds..