Warning: Permanently added '10.128.1.19' (ECDSA) to the list of known hosts. [ 48.072679] random: sshd: uninitialized urandom read (32 bytes read) 2019/09/20 03:22:29 fuzzer started [ 48.286017] audit: type=1400 audit(1568949749.202:36): avc: denied { map } for pid=6933 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 49.056828] random: cc1: uninitialized urandom read (8 bytes read) 2019/09/20 03:22:30 dialing manager at 10.128.0.105:43807 2019/09/20 03:22:31 syscalls: 2472 2019/09/20 03:22:31 code coverage: enabled 2019/09/20 03:22:31 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/09/20 03:22:31 extra coverage: extra coverage is not supported by the kernel 2019/09/20 03:22:31 setuid sandbox: enabled 2019/09/20 03:22:31 namespace sandbox: enabled 2019/09/20 03:22:31 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/20 03:22:31 fault injection: enabled 2019/09/20 03:22:31 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/20 03:22:31 net packet injection: enabled 2019/09/20 03:22:31 net device setup: enabled [ 51.514762] random: crng init done 03:23:53 executing program 5: 03:23:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ppoll(0x0, 0x0, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) nanosleep(0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 03:23:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8901, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @random="dbaa11bf7475"}) 03:23:53 executing program 1: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) clock_gettime(0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000600)={0x3, 0x0, 0x0, {}, 0x0, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:23:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) socket(0x0, 0x3, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0) sendfile(r0, r1, 0x0, 0x102002700) 03:23:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x105082) write$selinux_user(r0, &(0x7f0000000040)={'system_u:object_r:systemd_systemctl_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x37) r2 = memfd_create(&(0x7f0000000080)='SEG6\x00', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, 0x0, 0x0) r4 = accept(r3, &(0x7f0000000280)=@sco, &(0x7f0000000140)=0x80) lseek(r4, 0x0, 0x1) fallocate(r1, 0x11, 0x0, 0x100000001) [ 132.760820] audit: type=1400 audit(1568949833.682:37): avc: denied { map } for pid=6933 comm="syz-fuzzer" path="/root/syzkaller-shm764891423" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 132.830121] audit: type=1400 audit(1568949833.692:38): avc: denied { map } for pid=6951 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 132.962136] IPVS: ftp: loaded support on port[0] = 21 [ 133.759366] chnl_net:caif_netlink_parms(): no params data found [ 133.771576] IPVS: ftp: loaded support on port[0] = 21 [ 133.798338] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.805327] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.812522] device bridge_slave_0 entered promiscuous mode [ 133.819401] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.826065] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.833412] device bridge_slave_1 entered promiscuous mode [ 133.859306] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 133.868328] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 133.888541] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 133.896210] team0: Port device team_slave_0 added [ 133.903279] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 133.910526] team0: Port device team_slave_1 added [ 133.917512] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 133.924845] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 133.933469] IPVS: ftp: loaded support on port[0] = 21 [ 134.001966] device hsr_slave_0 entered promiscuous mode [ 134.040299] device hsr_slave_1 entered promiscuous mode [ 134.083546] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 134.099054] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 134.156239] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.162721] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.169588] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.175975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.183982] chnl_net:caif_netlink_parms(): no params data found [ 134.202103] IPVS: ftp: loaded support on port[0] = 21 [ 134.283200] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.289617] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.297015] device bridge_slave_0 entered promiscuous mode [ 134.303519] chnl_net:caif_netlink_parms(): no params data found [ 134.321964] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.328370] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.336327] device bridge_slave_1 entered promiscuous mode [ 134.354312] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 134.363367] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 134.403477] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 134.410724] team0: Port device team_slave_0 added [ 134.427536] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.434423] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.441905] device bridge_slave_0 entered promiscuous mode [ 134.448575] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.455087] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.462335] device bridge_slave_1 entered promiscuous mode [ 134.468526] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 134.476264] team0: Port device team_slave_1 added [ 134.484155] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 134.491913] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 134.512547] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 134.513305] IPVS: ftp: loaded support on port[0] = 21 [ 134.537662] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 134.612742] device hsr_slave_0 entered promiscuous mode [ 134.650345] device hsr_slave_1 entered promiscuous mode [ 134.704111] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 134.710697] 8021q: adding VLAN 0 to HW filter on device bond0 [ 134.717517] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 134.724788] team0: Port device team_slave_0 added [ 134.731984] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 134.739089] team0: Port device team_slave_1 added [ 134.744747] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 134.752329] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 134.759440] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 134.768090] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 134.778090] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 134.802052] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 134.808130] 8021q: adding VLAN 0 to HW filter on device team0 [ 134.817979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.826219] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.843435] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.850924] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 134.866184] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 134.889070] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 134.932102] device hsr_slave_0 entered promiscuous mode [ 134.990326] device hsr_slave_1 entered promiscuous mode [ 135.056727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 135.064996] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 135.072750] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.079088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.088932] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 135.099212] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 135.122179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 135.130155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 135.137788] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.144319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.161401] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 135.169062] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 135.177729] IPVS: ftp: loaded support on port[0] = 21 [ 135.184860] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 135.202548] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 135.210447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 135.218604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 135.232614] chnl_net:caif_netlink_parms(): no params data found [ 135.251352] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 135.290991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 135.299031] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 135.307970] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 135.317696] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 135.337686] 8021q: adding VLAN 0 to HW filter on device bond0 [ 135.346707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 135.354815] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 135.365201] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 135.375581] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.382466] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.389574] device bridge_slave_0 entered promiscuous mode [ 135.398069] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 135.416344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 135.424548] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.434295] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 135.444681] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.451131] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.457980] device bridge_slave_1 entered promiscuous mode [ 135.482896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 135.491131] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.507946] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 135.526120] chnl_net:caif_netlink_parms(): no params data found [ 135.536115] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 135.542712] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 135.549530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 135.556570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 135.565854] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 135.573723] 8021q: adding VLAN 0 to HW filter on device team0 [ 135.581444] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 135.602429] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 135.614343] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 135.623409] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 135.646028] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 135.655524] team0: Port device team_slave_0 added [ 135.661230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 135.669039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 135.679107] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.685618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.694929] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 135.716916] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 135.726605] team0: Port device team_slave_1 added [ 135.732082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 135.740947] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 135.751007] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 135.766558] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 135.775883] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 135.786679] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 135.795593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 135.804200] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.810740] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.817889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 135.835387] 8021q: adding VLAN 0 to HW filter on device bond0 [ 135.892074] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 135.904582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 135.913313] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 135.925760] chnl_net:caif_netlink_parms(): no params data found [ 135.935762] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.942851] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.953693] device bridge_slave_0 entered promiscuous mode [ 135.961841] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 136.002481] device hsr_slave_0 entered promiscuous mode [ 136.040698] device hsr_slave_1 entered promiscuous mode [ 136.094477] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 136.102280] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 136.109475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 136.117373] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 136.125288] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.131885] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.138760] device bridge_slave_1 entered promiscuous mode [ 136.145758] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 136.155160] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 136.168563] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 136.175998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 136.183798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.190775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 136.198490] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 136.213875] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 136.219954] 8021q: adding VLAN 0 to HW filter on device team0 [ 136.227504] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 136.244776] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 136.252482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 136.260264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 136.267927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 136.275923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 136.283769] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.290174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.297770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 136.307838] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 136.316733] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 136.326165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 136.334043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 136.343444] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 136.349473] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 136.357461] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 136.373645] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 136.389609] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 136.406385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 136.414529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 136.422605] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.429031] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.446143] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 136.458184] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.465345] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.472658] device bridge_slave_0 entered promiscuous mode [ 136.486866] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 136.494568] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 136.502423] team0: Port device team_slave_0 added [ 136.511380] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.517936] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.525553] device bridge_slave_1 entered promiscuous mode [ 136.532505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 136.541911] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 136.552774] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 136.559977] team0: Port device team_slave_1 added [ 136.565778] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 136.574264] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 136.598653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 136.610091] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 136.621600] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 136.635700] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 136.644688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 136.652925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 136.661747] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 136.677536] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 136.696026] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 136.742264] device hsr_slave_0 entered promiscuous mode [ 136.780447] device hsr_slave_1 entered promiscuous mode 03:23:57 executing program 0: [ 136.820742] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 136.830449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 136.838814] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 136.848430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 03:23:57 executing program 0: 03:23:57 executing program 0: [ 136.865940] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 136.887227] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 136.894952] team0: Port device team_slave_0 added [ 136.910372] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready 03:23:57 executing program 0: 03:23:57 executing program 0: [ 136.918555] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 136.935132] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 136.942452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 136.950379] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 136.964361] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 03:23:57 executing program 0: [ 136.974121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 136.985368] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 136.995906] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 137.008403] team0: Port device team_slave_1 added [ 137.019903] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 137.058177] 8021q: adding VLAN 0 to HW filter on device bond0 [ 137.069670] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 137.086292] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 137.095290] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 137.107041] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 137.133575] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 137.141887] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 137.182175] kvm: emulating exchange as write [ 137.205079] device hsr_slave_0 entered promiscuous mode [ 137.260480] device hsr_slave_1 entered promiscuous mode [ 137.281088] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 137.301058] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 137.315703] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 137.325731] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 137.332377] 8021q: adding VLAN 0 to HW filter on device team0 [ 137.339433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.347363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.359534] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 137.371160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 137.378861] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.387320] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.393767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.401428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 137.411119] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 137.419125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 137.427235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.437920] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.444545] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.455524] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 137.465970] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 137.475066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 137.496721] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 137.506639] 8021q: adding VLAN 0 to HW filter on device bond0 [ 137.513515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 137.526156] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 137.536376] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 137.544002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 137.552165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 137.559993] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 03:23:58 executing program 5: 03:23:58 executing program 0: [ 137.580604] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 137.589096] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 137.597568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.609181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.616962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 137.629186] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 137.655913] 8021q: adding VLAN 0 to HW filter on device bond0 [ 137.674200] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 137.689108] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 137.698054] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 137.704912] 8021q: adding VLAN 0 to HW filter on device team0 [ 137.711909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 137.719702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 137.729386] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 137.738509] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 137.744717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 137.752468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.759995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.767396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.775831] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 137.785778] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 137.792357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 137.799927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 137.807803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.815561] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.821954] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.829402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 137.842059] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 137.852690] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 137.858776] 8021q: adding VLAN 0 to HW filter on device team0 [ 137.869845] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 137.877790] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 137.889150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 137.897186] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.907131] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.913786] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.922578] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 137.930345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 137.938146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.945938] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.952351] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.962406] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 137.972814] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 137.980512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 137.987599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 137.995948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.003765] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.012289] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.018634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.027779] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 138.037254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 138.048789] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 138.058902] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 138.066314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 138.077120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 138.085592] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 138.095904] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 138.105526] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 138.114778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 138.124542] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 138.136885] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 138.145449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 138.153678] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 138.163288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 138.171434] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 138.179346] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 138.189012] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 138.203224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.221751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.231793] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 138.241066] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 138.251076] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 138.278489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 138.286823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 138.294492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.302583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.309953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 138.318401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.326667] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 138.334078] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 138.349558] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 138.359245] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 138.367797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.378910] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 138.385161] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 138.396577] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 138.413822] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 138.424078] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 138.445396] 8021q: adding VLAN 0 to HW filter on device batadv0 03:24:00 executing program 3: 03:24:00 executing program 1: 03:24:00 executing program 5: 03:24:00 executing program 4: 03:24:00 executing program 0: 03:24:00 executing program 2: 03:24:00 executing program 3: 03:24:00 executing program 1: 03:24:00 executing program 5: 03:24:00 executing program 4: 03:24:00 executing program 5: 03:24:00 executing program 1: 03:24:00 executing program 3: 03:24:00 executing program 2: 03:24:00 executing program 0: 03:24:00 executing program 5: 03:24:00 executing program 1: 03:24:01 executing program 3: 03:24:01 executing program 2: 03:24:01 executing program 4: 03:24:01 executing program 3: 03:24:01 executing program 5: 03:24:01 executing program 1: 03:24:01 executing program 2: 03:24:01 executing program 4: 03:24:01 executing program 5: 03:24:01 executing program 0: 03:24:01 executing program 1: 03:24:01 executing program 3: 03:24:01 executing program 4: 03:24:01 executing program 2: 03:24:01 executing program 5: 03:24:01 executing program 4: 03:24:01 executing program 0: 03:24:01 executing program 2: 03:24:01 executing program 1: 03:24:01 executing program 4: 03:24:01 executing program 5: 03:24:01 executing program 3: 03:24:01 executing program 4: 03:24:01 executing program 2: 03:24:01 executing program 1: 03:24:01 executing program 5: 03:24:01 executing program 3: 03:24:01 executing program 0: 03:24:01 executing program 2: 03:24:01 executing program 1: 03:24:01 executing program 5: 03:24:01 executing program 4: 03:24:01 executing program 0: 03:24:01 executing program 2: 03:24:01 executing program 1: 03:24:01 executing program 3: 03:24:01 executing program 5: 03:24:01 executing program 4: 03:24:01 executing program 0: 03:24:01 executing program 1: 03:24:01 executing program 2: 03:24:01 executing program 3: 03:24:01 executing program 0: 03:24:01 executing program 3: 03:24:01 executing program 2: 03:24:01 executing program 1: 03:24:01 executing program 5: 03:24:01 executing program 0: 03:24:01 executing program 4: 03:24:01 executing program 3: 03:24:01 executing program 1: 03:24:01 executing program 4: 03:24:01 executing program 0: 03:24:01 executing program 5: 03:24:01 executing program 2: 03:24:01 executing program 3: 03:24:01 executing program 0: 03:24:02 executing program 4: 03:24:02 executing program 1: 03:24:02 executing program 0: 03:24:02 executing program 2: 03:24:02 executing program 5: 03:24:02 executing program 3: 03:24:02 executing program 0: 03:24:02 executing program 2: 03:24:02 executing program 5: 03:24:02 executing program 1: 03:24:02 executing program 4: 03:24:02 executing program 3: 03:24:02 executing program 2: 03:24:02 executing program 4: 03:24:02 executing program 1: 03:24:02 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, 0x0, 0xffffff68) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 03:24:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000ac0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\b\x00\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 03:24:02 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\b\x00\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 03:24:02 executing program 2: 03:24:02 executing program 1: 03:24:02 executing program 2: 03:24:02 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280)={0x2}, 0x43c5) 03:24:02 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0x0, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 141.406785] device nr0 entered promiscuous mode 03:24:02 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000980)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd8864"], 0xe) 03:24:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000003c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = creat(&(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) dup3(r0, r2, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, 0x0, 0x0) 03:24:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) sendmsg$unix(r1, &(0x7f0000000b80)={&(0x7f0000000100)=@abs, 0x6e, 0x0}, 0x20008000) clone(0x3502001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) sync() [ 141.516155] device nr0 entered promiscuous mode [ 141.532170] hrtimer: interrupt took 35319 ns 03:24:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000ac0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\b\x00\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) [ 141.588196] device nr0 entered promiscuous mode 03:24:02 executing program 5: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x11, r0) [ 141.686573] device nr0 entered promiscuous mode 03:24:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0xfffffffffffffeff, 0x0, 0x0, 0x7fff}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 03:24:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000400)=""/224) [ 141.742238] device nr0 entered promiscuous mode 03:24:02 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000003340)=[{0x0, 0x0, 0x7fffffff}, {&(0x7f0000001000)="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", 0x1ce, 0x9}]) 03:24:02 executing program 4: munlock(&(0x7f00002d6000/0x1000)=nil, 0x1000) 03:24:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) dup(0xffffffffffffffff) 03:24:02 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000600)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t5,\xffx\xf0\xde\xc4\xa8M*\xe4;~y\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_6\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x930xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(0x0, &(0x7f0000000580)={0x1, "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"}, 0xfd1, 0x0) 03:24:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_ERSPAN_VER={0x8, 0x16, 0x2}]]}}}]}, 0x3c}}, 0x0) 03:24:03 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r0, &(0x7f0000001380)=ANY=[@ANYRES64], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:24:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$inet(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000002c0)="abcae49e38a57d440e00c34ce27878ab9884c2f8a871b3dcb78cfb23ffb0bf8cd7d8bae4cb97cd40a5398a7145075d4f92260a9bb1bfa585d44ed1f267564d897ce3d503c6423b1b010fdf89b413be2ca6df5ebc70f0c040fc0a71e32eda1bdb254e8d4852eff5fe41f05835615617b5508cb0a0059c453b55c473679a6fdb17b24058e95c1edac97753560b4fea06058e9c9f2783da96f9625ce06b88d78e0386345d9b29805c4475c1895bd08513a50949e8f4949b2b33c3fe409df50cf9302f4bef0dad77fc44e3", 0xc9}], 0x1}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab0da6f7ae55d88fecf9221a7511bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) recvmmsg(r0, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) [ 142.767755] FAT-fs (loop0): bogus number of reserved sectors [ 142.806477] FAT-fs (loop0): Can't find a valid FAT filesystem 03:24:03 executing program 3: 03:24:03 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r0, 0xab02) 03:24:03 executing program 1: 03:24:03 executing program 3: 03:24:03 executing program 4: [ 142.931548] FAT-fs (loop0): bogus number of reserved sectors [ 142.937537] FAT-fs (loop0): Can't find a valid FAT filesystem 03:24:03 executing program 2: 03:24:04 executing program 2: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x50, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="79974f09893abfbc3acc56b9b9a76c9764205f6bf23bbdcd64633759d29e44f94bf99ba4cfad74512196c6189c731ff8bee966d0e1bd0698d49cacfe20ef33ae7397219d0ee5b8d8159481839f51fe7c4d2e5ce242e39490b8b174478f7600e8", 0x60, 0x3}], 0x800, &(0x7f00000002c0)={[{@numtail='nonumtail=0'}, {@fat=@nfs='nfs'}, {@fat=@errors_remount='errors=remount-ro'}, {@nonumtail='nnonumtail=1'}, {@rodir='rodir'}, {@uni_xlateno='uni_xlate=0'}, {@nonumtail='nnonumtail=1'}], [{@appraise='appraise'}, {@context={'context', 0x3d, 'unconfined_u'}}, {@smackfshat={'smackfshat', 0x3d, 'keyringsystem'}}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_gt={'fowner>'}}]}) creat(&(0x7f00000003c0)='./bus\x00', 0xb4) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") mount$overlay(0x400000, &(0x7f0000000140)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000380)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}]}) 03:24:04 executing program 0: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) getpid() 03:24:04 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r0, 0x125f) 03:24:04 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = dup(r1) setsockopt$inet_int(r3, 0x0, 0x22, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3, 0x800) write$P9_RSTAT(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="530000007d020020004c0006000200000600000000000000000000000000000000080004000004000000020000f5a5dff100000000000a0065ed3070707031656d31010041bfebdc95c89166070054495043763200e4ff53495043763200"], 0x53) ioctl$DRM_IOCTL_SET_VERSION(r4, 0xc0106407, &(0x7f0000000000)={0x6, 0x3, 0x2, 0x4}) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 03:24:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup2(r1, r1) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000300)=0xfffffffeffffffff, 0x189) bind$inet6(r0, &(0x7f0000710fe4)={0xa, 0x4e21}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) bind$inet6(r4, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c) r5 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3, 0x800) write$P9_RSTAT(r5, &(0x7f0000000080)={0x53, 0x7d, 0x2, {0x0, 0x4c, 0x6, 0x2, {0x80, 0x0, 0x2}, 0x8000000, 0x400, 0x4, 0x2, 0xa, 'em0ppp1em1', 0x1, '&', 0x7, 'TIPCv2\x00', 0x7, 'TIPCv2\x00'}}, 0x53) ioctl$DRM_IOCTL_INFO_BUFS(r5, 0xc0106418, &(0x7f0000000000)={0x7, 0x9, 0x3, 0x494, 0x1a, 0x8}) r6 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r2, r6, 0x0, 0x4000000001000009) 03:24:04 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x1fe) 03:24:04 executing program 4: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0xf6, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="f95a0f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3}}], 0x1, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="7e499f5c5fd21dacb7b35ad2998aca50dedea299e5deb90bd622b9f4a177373afcbc3b5bf61816d9160365cccc061c938047d9953b277929434509c7ecfe9659f8afccc983090dfe92f8ec65fcc8e262ebca23c7e811847e2477054fc0136e136f1c21122803ab2e3a7c209f2ad15cbf989a88b6f264c970c954c01b33dd9e31ea8a7dc73435827acf47ed6c54e943473102300841ecb2", @ANYRES64, @ANYRESDEC=0x0, @ANYRESHEX, @ANYBLOB="9f3388c5b87b558d8aedcbb605ebcfca9ba7e5b7f64c5649b189d8f1e87738c76cf8a8e40e1fbf46ab9732e45248041521c0ba892dff7fceca3e423ded5309bfd9e028e229043c5831f9c362baee27fee100548c8cd1d422f9f9"], 0x0, 0x11f}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x30) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:24:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/64, 0x40}], 0x1) 03:24:04 executing program 1: accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x5) recvmmsg(r0, &(0x7f0000000200), 0x2ab, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x4, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x398, 0x0) 03:24:04 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000003c0)=0x6) 03:24:04 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x0) 03:24:04 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x1ff) sendfile(r0, r1, &(0x7f0000000040), 0x7) 03:24:04 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000003c0)=0x6) [ 143.757033] ptrace attach of "/root/syz-executor.4"[7432] was attempted by "/root/syz-executor.4"[7435] 03:24:04 executing program 5: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0xf6, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="f95a0f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3}}], 0x1, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="7e499f5c5fd21dacb7b35ad2998aca50dedea299e5deb90bd622b9f4a177373afcbc3b5bf61816d9160365cccc061c938047d9953b277929434509c7ecfe9659f8afccc983090dfe92f8ec65fcc8e262ebca23c7e811847e2477054fc0136e136f1c21122803ab2e3a7c209f2ad15cbf989a88b6f264c970c954c01b33dd9e31ea8a7dc73435827acf47ed6c54e943473102300841ecb2", @ANYRES64, @ANYRESDEC=0x0, @ANYRESHEX, @ANYBLOB="9f3388c5b87b558d8aedcbb605ebcfca9ba7e5b7f64c5649b189d8f1e87738c76cf8a8e40e1fbf46ab9732e45248"], 0x0, 0xf3}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x30) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:24:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYRESDEC, @ANYRES64, @ANYPTR64, @ANYRESHEX], 0x0, 0x36, 0x0, 0x1}, 0x20) tkill(r1, 0x39) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 143.846474] syz-executor.0 (7446): /proc/7446/oom_adj is deprecated, please use /proc/7446/oom_score_adj instead. [ 143.903754] ptrace attach of "/root/syz-executor.5"[7452] was attempted by "/root/syz-executor.5"[7455] [ 143.917726] ptrace attach of "/root/syz-executor.4"[7453] was attempted by "/root/syz-executor.4"[7456] 03:24:07 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) open(0x0, 0x0, 0x0) write$P9_RCREATE(r0, 0x0, 0x0) 03:24:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) 03:24:07 executing program 5: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000400)="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", 0xfc) 03:24:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={r4}, &(0x7f0000000100)=0x8) 03:24:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r2, 0x11, 0x67, 0x0, &(0x7f00000000c0)) 03:24:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x2002000006, 0x0, 0x0, 0x50000}]}) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)={0x8}, &(0x7f0000000340), 0x400) 03:24:07 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) 03:24:07 executing program 5: 03:24:07 executing program 4: 03:24:07 executing program 2: 03:24:07 executing program 3: 03:24:07 executing program 4: 03:24:07 executing program 2: 03:24:07 executing program 5: 03:24:07 executing program 0: 03:24:07 executing program 1: 03:24:07 executing program 3: 03:24:07 executing program 5: 03:24:07 executing program 4: 03:24:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x0) 03:24:07 executing program 2: 03:24:07 executing program 3: 03:24:07 executing program 1: 03:24:07 executing program 4: 03:24:07 executing program 2: 03:24:07 executing program 5: 03:24:07 executing program 3: 03:24:07 executing program 0: 03:24:07 executing program 4: 03:24:07 executing program 2: 03:24:07 executing program 1: 03:24:07 executing program 5: 03:24:07 executing program 4: 03:24:07 executing program 2: 03:24:07 executing program 3: 03:24:07 executing program 0: 03:24:07 executing program 1: 03:24:07 executing program 4: 03:24:07 executing program 5: 03:24:07 executing program 2: 03:24:07 executing program 1: 03:24:07 executing program 0: 03:24:07 executing program 3: 03:24:07 executing program 4: 03:24:07 executing program 1: 03:24:07 executing program 2: 03:24:07 executing program 5: 03:24:07 executing program 3: 03:24:07 executing program 2: 03:24:07 executing program 1: 03:24:07 executing program 4: 03:24:07 executing program 0: 03:24:07 executing program 5: 03:24:07 executing program 2: 03:24:07 executing program 3: 03:24:07 executing program 0: 03:24:07 executing program 1: 03:24:07 executing program 5: 03:24:07 executing program 4: 03:24:07 executing program 2: 03:24:07 executing program 3: 03:24:08 executing program 1: 03:24:08 executing program 4: 03:24:08 executing program 3: 03:24:08 executing program 0: 03:24:08 executing program 5: 03:24:08 executing program 4: 03:24:08 executing program 2: 03:24:08 executing program 5: 03:24:08 executing program 1: 03:24:08 executing program 4: 03:24:08 executing program 0: 03:24:08 executing program 3: 03:24:08 executing program 3: 03:24:08 executing program 2: 03:24:08 executing program 5: 03:24:08 executing program 1: 03:24:08 executing program 2: 03:24:08 executing program 0: 03:24:08 executing program 4: 03:24:08 executing program 5: 03:24:08 executing program 3: 03:24:08 executing program 1: 03:24:08 executing program 0: 03:24:08 executing program 4: 03:24:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x13}, 0x48) syz_open_procfs(0x0, &(0x7f0000000400)='net/bnep\x00') 03:24:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x87\xa0\x00\x00\x00\x00\x00\x00\a\xbdh\x00', 0x43732e5398416f1a}) 03:24:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_NAME(0x25, &(0x7f0000000000)='vmnet1user\xdc\x00') 03:24:08 executing program 3: 03:24:08 executing program 0: 03:24:08 executing program 1: 03:24:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e0000001e000508edcc0345f675cb931f32e5000500fc3711094b480f00"/46, 0x2e}], 0x1}, 0x0) 03:24:08 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000040)}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x70, 0x1, 0x9, 0x1000, 0x3, 0x0, 0x7, 0x8000, 0xe, 0x8, 0xffffffffffffffff, 0xe2b, 0x2000000, 0x6f874996, 0x5, 0x2, 0x4, 0x9, 0x0, 0x6c00000000000000, 0x7, 0x0, 0x0, 0x0, 0x0, 0xf609, 0x5, 0xffe0000000000000, 0x40, 0x9db2, 0x1, 0x4, 0x1a5, 0x75, 0x3, 0xff, 0x1, 0x0, 0x80, 0x8, @perf_config_ext={0x6c, 0xd2}, 0x5002, 0x7, 0x7, 0x4, 0x59, 0xfffffffffffffe00, 0x8000}, r0, 0xffffffffffffffff, r1, 0xa) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x1003e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r3, 0x0}, 0x20) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'hsr0\x00', 0x800}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8941, &(0x7f0000000240)=0x1) 03:24:08 executing program 1: r0 = userfaultfd(0x0) syz_open_dev$radio(0x0, 0x0, 0x2) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) 03:24:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f0000001500)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\xe8\x03\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) 03:24:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x13}, 0x48) syz_open_procfs(0x0, &(0x7f0000000400)='net/bnep\x00') 03:24:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000300)=ANY=[@ANYBLOB="b70200000c000030bfa30000000000000703000000feffff7a0af0fff8feffff71a4f0ff00000000b7060000000000811e640300000000004504040001000000550400000b000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000006128b67cfba6ce48c9dc02d7ec8b39f815e06f50d9830200d9cf65f296bccef1df5cc1f9df75bd97b2c9ef55d38ac277e376bcb13f5ec44aa9bd2b8dc5f88d609633ab202a7cc4d51e46e034d74d266bfe7e451ab0e66b9152e25f714b25ff985fe650e0de2ac1bb94138f5a0fe6ed0c4bd4edda464aa6f80800000000000000f50ab27d5f3771a978bfc14210c1e2d76a8bbfea6408a2b6ee54fa882464b30cedafff1c78b2358f2b84dff03beb57ea410eaf9476bb7d140138f43dcaff9cf5f6ce7cc92160add1e78d8ad5f61bb8706a3a5604ae64ab8c0d3d8d90df03d49b04d096c234eb42db5672b0daf78ab4ab9d63991ab9af8914814830006dfd2499af7c119a02d9e5462c48a0e8e758819494efbeb7ee3982702abe2c3aac1ff109061974d726097578b1d102ce000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x13}, 0x48) [ 147.639759] audit: type=1400 audit(1568949848.552:39): avc: denied { map } for pid=7642 comm="syz-executor.1" path="/dev/nullb0" dev="devtmpfs" ino=349 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=blk_file permissive=1 [ 147.685424] audit: type=1400 audit(1568949848.592:40): avc: denied { create } for pid=7643 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:24:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) 03:24:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_ERSPAN_VER={0x8}]]}}}]}, 0x3c}}, 0x0) 03:24:08 executing program 5: r0 = epoll_create1(0x0) r1 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x4000201f, 0x3f000002}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) 03:24:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r2, 0x11, 0x1, 0x0, &(0x7f00000000c0)) [ 147.784666] audit: type=1400 audit(1568949848.592:41): avc: denied { write } for pid=7643 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:24:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000000)=0x5, 0x4) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) getsockopt$inet_tcp_int(r1, 0x6, 0x15, &(0x7f00000015c0), &(0x7f00000000c0)=0x4) r2 = socket$inet(0x10, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f00000002c0)={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x0, @link_local}, 0xa, {0x2, 0x4e22, @multicast1}, 'bridge0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x20) shutdown(r3, 0x1) ioctl$EVIOCGLED(r5, 0x80404519, &(0x7f0000000340)=""/113) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="c80000001000050700"/20, @ANYRES32=r6, @ANYBLOB="4300000000000000a800120008000100767469009c00020008000100", @ANYRES32, @ANYBLOB="080006000900000008020100", @ANYRES32=0x0, @ANYBLOB="08000500ac1e000108000400e000000208000500000500ac1414aa080002000600000008000600ff070000080002000100000008000600ffffff7f0800020000000000080002000600000008000300f8ffffff08000100", @ANYRES32, @ANYBLOB="04000000", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000500000000000800050000000000"], 0xc8}}, 0x0) r7 = creat(0x0, 0x0) fallocate(r7, 0x3, 0x0, 0x0) lseek(r7, 0x0, 0x0) getsockopt$inet_opts(r7, 0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0xf, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e23, 0x73d3b15a, @dev={0xfe, 0x80, [], 0x21}, 0x100000000}}, 0x10000, 0x5, 0x7, 0x0, 0x6}, &(0x7f00000003c0)=0x98) 03:24:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_ERSPAN_HWID={0x8, 0x18, 0xfff}, @IFLA_GRE_ERSPAN_VER={0x8, 0x16, 0x2}]]}}}]}, 0x44}}, 0x0) 03:24:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r2, 0x11, 0x0, 0x0, &(0x7f00000000c0)) [ 147.917654] netlink: 136 bytes leftover after parsing attributes in process `syz-executor.0'. 03:24:08 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$tun(r0, &(0x7f0000001380)=ANY=[@ANYRES64], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:24:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000180), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='syz_tun\x00', 0x10) r2 = dup2(r0, r0) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000500)={0x0, 0x148, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYRESOCT=0x0], 0x1}}, 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0xfffffebd) [ 148.034071] netlink: 136 bytes leftover after parsing attributes in process `syz-executor.0'. 03:24:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f0000001500)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\xe8\x03\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) 03:24:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x149) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4efb7ba3c0460000006c006c00000000e7ffffff010708050307000000000209000400c3ed8ba700080000000000000000000000f01d3289be8e80e2"], 0x3c) 03:24:09 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="205500001e00", @ANYBLOB="00000000dc2cb92810904fa9e5f21301ce646ba1a30a78d3abdf1e15"], 0x2}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000040)="2e360f2b99dc00660f71e0ff0f01c80fe0b41e002e0f01cb0f01cfba4000b860bdef0f58bd00000f01b100000f0118", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 03:24:09 executing program 5: socket$alg(0x26, 0x5, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) syz_open_procfs(0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) 03:24:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000000)=0x5, 0x4) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) getsockopt$inet_tcp_int(r1, 0x6, 0x15, &(0x7f00000015c0), &(0x7f00000000c0)=0x4) r2 = socket$inet(0x10, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f00000002c0)={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x0, @link_local}, 0xa, {0x2, 0x4e22, @multicast1}, 'bridge0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x20) shutdown(r3, 0x1) ioctl$EVIOCGLED(r5, 0x80404519, &(0x7f0000000340)=""/113) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="c80000001000050700"/20, @ANYRES32=r6, @ANYBLOB="4300000000000000a800120008000100767469009c00020008000100", @ANYRES32, @ANYBLOB="080006000900000008020100", @ANYRES32=0x0, @ANYBLOB="08000500ac1e000108000400e000000208000500000500ac1414aa080002000600000008000600ff070000080002000100000008000600ffffff7f0800020000000000080002000600000008000300f8ffffff08000100", @ANYRES32, @ANYBLOB="04000000", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000500000000000800050000000000"], 0xc8}}, 0x0) r7 = creat(0x0, 0x0) fallocate(r7, 0x3, 0x0, 0x0) lseek(r7, 0x0, 0x0) getsockopt$inet_opts(r7, 0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0xf, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e23, 0x73d3b15a, @dev={0xfe, 0x80, [], 0x21}, 0x100000000}}, 0x10000, 0x5, 0x7, 0x0, 0x6}, &(0x7f00000003c0)=0x98) [ 148.172453] audit: type=1400 audit(1568949849.092:42): avc: denied { read } for pid=7703 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:24:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x149) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4efb7ba3c0460000006c006c00000000e7ffffff010708050307000000000209000400c3ed8ba700080000000000000000000000f01d3289be8e80e2"], 0x3c) 03:24:09 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@nolargeio='nolargeio'}, {@swidth={'swidth'}}]}) [ 148.240255] netlink: 136 bytes leftover after parsing attributes in process `syz-executor.0'. 03:24:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 03:24:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x149) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4efb7ba3c0460000006c006c00000000e7ffffff010708050307000000000209000400c3ed8ba700080000000000000000000000f01d3289be8e80e2"], 0x3c) 03:24:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f0000001500)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\xe8\x03\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) 03:24:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x149) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4efb7ba3c0460000006c006c00000000e7ffffff010708050307000000000209000400c3ed8ba700080000000000000000000000f01d3289be8e80e2"], 0x3c) [ 148.457955] XFS (loop5): Invalid superblock magic number 03:24:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xf1, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg(r0, &(0x7f0000003480)=[{{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000005c0)="c2", 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)=[{0x10, 0x1}], 0x10}}], 0x2, 0x4008000) 03:24:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x149) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4efb7ba3c0460000002f006c00000000e7ffffff010708050307000000000209000400c3ed8ba700080000000000000000000000f01d3289be8e80e28eca5e68f69c0029"], 0x44) 03:24:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501884700de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 03:24:09 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:24:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 03:24:09 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="205500001e00", @ANYBLOB="00000000dc2cb92810904fa9e5f21301ce646ba1a30a78d3abdf1e15"], 0x2}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000040)="2e360f2b99dc00660f71e0ff0f01c80fe0b41e002e0f01cb0f01cfba4000b860bdef0f58bd00000f01b100000f0118", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 03:24:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x149) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4efb7ba3c0460000002f006c00000000e7ffffff010708050307000000000209000400c3ed8ba700080000000000000000000000f01d3289be8e80e28eca5e68f69c0029"], 0x44) 03:24:09 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x12fb, 0x0) [ 148.880204] kasan: CONFIG_KASAN_INLINE enabled [ 148.899590] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 148.937213] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 148.943485] Modules linked in: [ 148.946689] CPU: 0 PID: 7783 Comm: syz-executor.1 Not tainted 4.14.145 #0 [ 148.953626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.963076] task: ffff8880924cc6c0 task.stack: ffff888068170000 [ 148.969154] RIP: 0010:tcp_sendmsg_locked+0x50e/0x3200 [ 148.974343] RSP: 0018:ffff888068177850 EFLAGS: 00010206 [ 148.979709] RAX: 0000000000000012 RBX: 0000000000000000 RCX: ffffc90009066000 [ 148.987063] RDX: 0000000000000109 RSI: ffffffff85240e44 RDI: 0000000000000090 [ 148.994414] RBP: ffff8880681779e8 R08: 0000000000000001 R09: ffff8880924ccf60 [ 149.001770] R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 [ 149.009035] R13: ffff888094b4ea80 R14: ffff888068177d40 R15: ffff88808612f500 [ 149.016293] FS: 00007f27a241e700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 149.024620] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 149.030486] CR2: 0000000000960004 CR3: 0000000093d88000 CR4: 00000000001406f0 [ 149.038347] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 149.045597] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 149.052849] Call Trace: [ 149.055431] ? lock_sock_nested+0x9e/0x110 [ 149.059651] ? find_held_lock+0x35/0x130 [ 149.063698] ? tcp_sendpage+0x60/0x60 [ 149.067481] ? trace_hardirqs_on_caller+0x400/0x590 [ 149.072491] ? trace_hardirqs_on+0xd/0x10 [ 149.076633] tcp_sendmsg+0x30/0x50 [ 149.080246] inet_sendmsg+0x122/0x500 [ 149.084030] ? inet_recvmsg+0x500/0x500 [ 149.087986] sock_sendmsg+0xce/0x110 [ 149.091684] ___sys_sendmsg+0x349/0x840 [ 149.095639] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 149.100377] ? find_held_lock+0x35/0x130 [ 149.104421] ? __fget+0x210/0x370 [ 149.107869] ? lock_downgrade+0x6e0/0x6e0 [ 149.112006] ? __fget+0x237/0x370 [ 149.115446] ? __fget_light+0x172/0x1f0 [ 149.119401] ? __fdget+0x1b/0x20 [ 149.122772] ? sockfd_lookup_light+0xb4/0x160 [ 149.127248] __sys_sendmmsg+0x152/0x3a0 [ 149.131206] ? SyS_sendmsg+0x50/0x50 [ 149.134922] ? kasan_check_read+0x11/0x20 [ 149.139049] ? _copy_to_user+0x87/0xd0 [ 149.142924] ? put_timespec64+0xb4/0x100 [ 149.146967] ? nsecs_to_jiffies+0x30/0x30 [ 149.151188] ? SyS_clock_gettime+0xf8/0x180 [ 149.155668] SyS_sendmmsg+0x35/0x60 [ 149.159279] ? __sys_sendmmsg+0x3a0/0x3a0 [ 149.163410] do_syscall_64+0x1e8/0x640 [ 149.167282] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 149.172198] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 149.177370] RIP: 0033:0x459a09 [ 149.180547] RSP: 002b:00007f27a241dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 149.188249] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459a09 [ 149.195600] RDX: 0000000000000002 RSI: 0000000020003480 RDI: 0000000000000003 [ 149.203032] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 149.210369] R10: 0000000004008000 R11: 0000000000000246 R12: 00007f27a241e6d4 [ 149.217620] R13: 00000000004c71df R14: 00000000004dc9f8 R15: 00000000ffffffff 03:24:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x149) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4efb7ba3c0460000002f006c00000000e7ffffff010708050307000000000209000400c3ed8ba700080000000000000000000000f01d3289be8e80e28eca5e68f69c0029"], 0x44) [ 149.224965] Code: d4 38 fc 4d 85 ed 0f 84 40 08 00 00 e8 ac d4 38 fc 8b 85 78 ff ff ff 48 8d bb 90 00 00 00 89 85 50 ff ff ff 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 06 0f 8e 4a 25 00 00 f6 83 90 00 00 00 [ 149.244273] RIP: tcp_sendmsg_locked+0x50e/0x3200 RSP: ffff888068177850 [ 149.267021] ---[ end trace 4bf150727c8254a1 ]--- [ 149.275339] kobject: 'loop0' (ffff8880a497d6e0): kobject_uevent_env [ 149.282567] Kernel panic - not syncing: Fatal exception [ 149.284349] kobject: 'loop0' (ffff8880a497d6e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 149.290149] Kernel Offset: disabled [ 149.303815] Rebooting in 86400 seconds..