[ 76.743505][ T26] audit: type=1800 audit(1568487758.330:30): pid=10585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 81.878548][ T26] kauditd_printk_skb: 4 callbacks suppressed [ 81.878561][ T26] audit: type=1400 audit(1568487763.500:35): avc: denied { map } for pid=10763 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.23' (ECDSA) to the list of known hosts. 2019/09/14 19:02:49 fuzzer started [ 88.134050][ T26] audit: type=1400 audit(1568487769.760:36): avc: denied { map } for pid=10772 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/09/14 19:02:51 dialing manager at 10.128.0.26:37929 2019/09/14 19:02:51 syscalls: 2510 2019/09/14 19:02:51 code coverage: enabled 2019/09/14 19:02:51 comparison tracing: enabled 2019/09/14 19:02:51 extra coverage: extra coverage is not supported by the kernel 2019/09/14 19:02:51 setuid sandbox: enabled 2019/09/14 19:02:51 namespace sandbox: enabled 2019/09/14 19:02:51 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/14 19:02:51 fault injection: enabled 2019/09/14 19:02:51 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/14 19:02:51 net packet injection: enabled 2019/09/14 19:02:51 net device setup: enabled 19:05:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffa7) open(&(0x7f0000000040)='./file0\x00', 0x40242, 0x0) [ 222.079023][ T26] audit: type=1400 audit(1568487903.700:37): avc: denied { map } for pid=10787 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16365 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 222.163271][T10788] IPVS: ftp: loaded support on port[0] = 21 19:05:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x4}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in6=@dev}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) [ 222.258759][T10788] chnl_net:caif_netlink_parms(): no params data found [ 222.301835][T10788] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.309418][T10788] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.317870][T10788] device bridge_slave_0 entered promiscuous mode [ 222.326893][T10788] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.334515][T10788] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.342788][T10788] device bridge_slave_1 entered promiscuous mode [ 222.363225][T10788] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 222.374293][T10788] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 222.396266][T10788] team0: Port device team_slave_0 added [ 222.410387][T10788] team0: Port device team_slave_1 added [ 222.422744][T10791] IPVS: ftp: loaded support on port[0] = 21 19:05:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x82) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000047c0)="11dca50d5c0bcfe47bf070") dup3(r0, r1, 0x0) [ 222.501487][T10788] device hsr_slave_0 entered promiscuous mode [ 222.599240][T10788] device hsr_slave_1 entered promiscuous mode 19:05:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) shutdown(r0, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f08000280010000", 0x23) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x0, 0x804, 0x2}, 0x2c) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(0x0, &(0x7f0000000140)={'syz', 0x1}, 0x0, 0xfffffffffffffff9) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) prctl$PR_GET_TIMERSLACK(0x1e) sched_rr_get_interval(0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}, 0x0) [ 222.707444][T10793] IPVS: ftp: loaded support on port[0] = 21 [ 222.750104][T10788] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.757192][T10788] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.764553][T10788] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.771707][T10788] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.871029][T10796] IPVS: ftp: loaded support on port[0] = 21 19:05:04 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[]], 0x8) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 222.933075][T10791] chnl_net:caif_netlink_parms(): no params data found [ 223.092455][T10788] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.149349][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.180250][ T3516] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.199790][ T3516] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.220221][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 19:05:04 executing program 5: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') writev(r0, &(0x7f0000000080), 0x3ac) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 223.259189][T10791] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.266823][T10791] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.275777][T10791] device bridge_slave_0 entered promiscuous mode [ 223.284057][T10791] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.292055][T10791] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.300451][T10791] device bridge_slave_1 entered promiscuous mode [ 223.328691][T10800] IPVS: ftp: loaded support on port[0] = 21 [ 223.361136][T10788] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.377139][T10793] chnl_net:caif_netlink_parms(): no params data found [ 223.398303][T10791] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 223.421884][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.432736][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.441340][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.448653][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.458496][T10791] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 223.473880][T10796] chnl_net:caif_netlink_parms(): no params data found [ 223.527748][T10791] team0: Port device team_slave_0 added [ 223.535733][T10791] team0: Port device team_slave_1 added [ 223.544711][T10805] IPVS: ftp: loaded support on port[0] = 21 [ 223.553680][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.565048][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.573724][T10795] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.581077][T10795] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.588924][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.671241][T10791] device hsr_slave_0 entered promiscuous mode [ 223.729386][T10791] device hsr_slave_1 entered promiscuous mode [ 223.768983][T10791] debugfs: Directory 'hsr0' with parent '/' already present! [ 223.792172][T10796] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.799532][T10796] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.808417][T10796] device bridge_slave_0 entered promiscuous mode [ 223.820776][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.829675][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.838553][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.848104][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.856773][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.865319][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.885835][T10796] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.893515][T10796] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.901273][T10796] device bridge_slave_1 entered promiscuous mode [ 223.908300][T10793] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.916868][T10793] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.924938][T10793] device bridge_slave_0 entered promiscuous mode [ 223.933160][T10793] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.940271][T10793] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.948298][T10793] device bridge_slave_1 entered promiscuous mode [ 223.964444][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 223.973191][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.006285][T10793] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 224.021953][T10796] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 224.034427][T10796] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 224.044781][T10793] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 224.095657][T10788] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 224.108108][T10788] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 224.116609][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 224.125236][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.144781][T10793] team0: Port device team_slave_0 added [ 224.154514][T10796] team0: Port device team_slave_0 added [ 224.162505][T10796] team0: Port device team_slave_1 added [ 224.170336][T10800] chnl_net:caif_netlink_parms(): no params data found [ 224.183400][T10793] team0: Port device team_slave_1 added [ 224.262010][T10796] device hsr_slave_0 entered promiscuous mode [ 224.319343][T10796] device hsr_slave_1 entered promiscuous mode [ 224.378978][T10796] debugfs: Directory 'hsr0' with parent '/' already present! [ 224.450926][T10793] device hsr_slave_0 entered promiscuous mode [ 224.489233][T10793] device hsr_slave_1 entered promiscuous mode [ 224.549088][T10793] debugfs: Directory 'hsr0' with parent '/' already present! [ 224.569566][T10800] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.576838][T10800] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.584620][T10800] device bridge_slave_0 entered promiscuous mode [ 224.594125][T10800] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.601859][T10800] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.609921][T10800] device bridge_slave_1 entered promiscuous mode [ 224.657114][T10788] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 224.672781][T10800] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 224.694268][T10805] chnl_net:caif_netlink_parms(): no params data found [ 224.722081][T10800] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 224.737522][T10791] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.777165][ T26] audit: type=1400 audit(1568487906.400:38): avc: denied { associate } for pid=10788 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 224.808405][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.827200][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.844914][T10791] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.853126][T10800] team0: Port device team_slave_0 added [ 224.859279][T10805] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.866415][T10805] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.874691][T10805] device bridge_slave_0 entered promiscuous mode [ 224.881902][ T26] audit: type=1800 audit(1568487906.500:39): pid=10815 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16519 res=0 [ 224.913246][T10793] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.920154][ T26] audit: type=1804 audit(1568487906.540:40): pid=10815 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir929401076/syzkaller.pC3AZ7/0/file0" dev="sda1" ino=16519 res=1 [ 224.930740][T10800] team0: Port device team_slave_1 added [ 224.954688][T10805] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.961842][T10805] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.970282][T10805] device bridge_slave_1 entered promiscuous mode [ 224.982882][T10793] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.990751][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.997362][ T26] audit: type=1804 audit(1568487906.620:41): pid=10816 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir929401076/syzkaller.pC3AZ7/0/file0" dev="sda1" ino=16519 res=1 [ 225.000659][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.034954][ T3014] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.042126][ T3014] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.051268][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.060121][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.068416][ T3014] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.075635][ T3014] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.083819][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 225.092894][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 225.101502][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.109856][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.117521][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 225.140731][ T26] audit: type=1804 audit(1568487906.770:42): pid=10815 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir929401076/syzkaller.pC3AZ7/0/file0" dev="sda1" ino=16519 res=1 [ 225.181075][T10800] device hsr_slave_0 entered promiscuous mode 19:05:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) listen(r0, 0x0) unshare(0x40000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = dup(r1) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x83}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r3, 0x7f}}, 0x10) r4 = accept(r0, 0x0, 0x0) ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc008561b, &(0x7f0000000240)={0x6, 0x9}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46000000000800000000000000030000000000000000000000000000004000000000000000000000000000000072000000ec0c38000000020000000000040000000000003fff0f000000000000ffffffffffffffff06000000000000000000000080ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f71eb9a8e58c600e77ed0286b930"], 0x278) recvfrom$ax25(r4, &(0x7f0000000000)=""/203, 0xcb, 0xf145a04bedb79584, &(0x7f0000000100)={{0x3, @null, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) [ 225.230088][T10800] device hsr_slave_1 entered promiscuous mode [ 225.269029][T10800] debugfs: Directory 'hsr0' with parent '/' already present! [ 225.294200][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.304681][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.331696][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 225.341079][T10819] IPVS: ftp: loaded support on port[0] = 21 [ 225.342691][T10796] 8021q: adding VLAN 0 to HW filter on device bond0 [ 225.359657][ C0] hrtimer: interrupt took 25036 ns [ 225.362955][T10791] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 225.379166][T10791] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 225.401550][T10805] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 225.411107][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 225.421087][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 225.431103][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 225.439825][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 225.447983][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 225.456998][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 225.465248][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.474176][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.484242][ T3516] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.491322][ T3516] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.499089][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.507600][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.516041][ T3516] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.523109][ T3516] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.541776][T10796] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.554085][T10805] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 225.568301][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 225.577385][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 225.585970][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.593711][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.601843][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 225.611578][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.620475][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.628903][ T3516] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.635977][ T3516] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.644464][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 225.659777][T10791] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 225.690588][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 225.699458][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.708174][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.717983][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.725287][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.733155][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.741725][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.750394][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 225.758983][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 225.767424][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 225.775859][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 225.784481][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 225.792996][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 225.803063][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.811677][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.820187][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 225.828424][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 225.837661][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 225.845509][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 225.943285][T10793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 225.952771][T10805] team0: Port device team_slave_0 added [ 225.967724][T10796] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 225.979739][T10796] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 226.017951][T10793] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 226.026280][T10805] team0: Port device team_slave_1 added [ 226.041886][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.051408][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.061920][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 226.077534][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.089516][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 226.108695][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.134251][T10796] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 226.156793][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 226.212032][T10805] device hsr_slave_0 entered promiscuous mode [ 226.241633][T10805] device hsr_slave_1 entered promiscuous mode [ 226.311455][T10805] debugfs: Directory 'hsr0' with parent '/' already present! [ 226.333754][T10800] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.421774][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.442112][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 19:05:08 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x20011, r1, 0x0) ioctl(r0, 0x40084146, &(0x7f0000000080)) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x25fb, @empty, 0x7}, 0x1c) [ 226.518044][T10800] 8021q: adding VLAN 0 to HW filter on device team0 [ 226.580383][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.619145][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.652889][ T26] audit: type=1400 audit(1568487908.280:43): avc: denied { map_create } for pid=10845 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 226.660519][T10795] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.683782][T10795] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.782689][ T26] audit: type=1400 audit(1568487908.370:44): avc: denied { map } for pid=10842 comm="syz-executor.2" path="/dev/sg0" dev="devtmpfs" ino=18101 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=chr_file permissive=1 19:05:08 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = dup(r1) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = dup(r3) ioctl$PIO_UNISCRNMAP(r4, 0x4b6a, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000040)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x1c, 0x3, @ib={0x1b, 0x1c9, 0x6, {"e3a86d1bfaf21d20c99b90385db01c58"}, 0xffffffffffff0001, 0x800000000002, 0x1}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f00000000c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) bind(r0, &(0x7f0000000100)=@l2={0x1f, 0x0, {0x0, 0x0, 0xfffffffffffffffc}}, 0x80) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6}}, 0xe) [ 226.939349][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 226.961918][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 19:05:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x1ab, &(0x7f0000000100)={&(0x7f0000000040)={0x18, 0x32, 0x1, 0x0, 0x0, {0x1, 0x1000000}, [@typed={0xc7, 0x36, @u32=0x8}]}, 0x18}, 0x1, 0xffffff7f0e000000}, 0x0) [ 227.012936][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.035322][T10795] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.042469][T10795] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.080549][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 227.093263][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 19:05:08 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='?\x00\x00\x00\x00\x00\x00\x00\xcc', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = accept4(0xffffffffffffffff, &(0x7f0000000280)=@rc, &(0x7f0000000040)=0x80, 0x80000) sendmsg$nfc_llcp(r2, &(0x7f0000000640)={&(0x7f0000000300)={0x27, 0x0, 0x0, 0x7, 0x1ff, 0x5, "49b476b24354cb38b510fda1f0f78bdd556ff640a7bfd8a880e887abb2d52259c2165558ed5162ee3e1556cb756e209ce1f031eb1d14f2d1c53bfc7246b8d6", 0x1c}, 0x60, &(0x7f00000005c0)=[{&(0x7f0000000380)="288b681684cc0c8056f99acf28be61e3045c4c304fa5b213798a5fb7d8838bdfcee8f09d8b59", 0x26}, {&(0x7f00000003c0)="22f896f3cfdcd0a7edd1c159f93003094436818dc1b2fba4b63ec461a66342c281d105d81aff1919d8b7a6d0d9b668bfc6c9f53d607383b41f8c8d4188c94cdf9278aed72d09d4b4782129d4ede18b37284119ba0b7ff5a4752efdb581d078a408cd603464fdfc700b812eff771a267c1b3277f6372dedd7f28144ac6ac63c93c9065069e12cc8dedcdc898173ee65e3b2f14caa39df8eefad16470ffcbc6a7d11437bb27c550daf2561cbc072d16baeba4e10ebff05d5d915bbd8ec2a0323a67602d0fb039eabac53cf59e8449ccfd925962afc098356c3ef4c8a4f2341de64be4b3e82dcc067f0a81fd5e173f97decc4efb854f5", 0xf5}, {&(0x7f00000004c0)="1812c365527988b0e10ece82b02b67822c42b574140ba2a6aae15ae9747f31144f64f7bfc89fbce2ccc58ec7ceaf8de93c79b627f7fa5ee46071051adcadb9f9d0353df606278909f2ba5bc2739f2d2aa2429eeb67f637df766260d09871d49fc74b1b48fbd5a0f9ec", 0x69}, {&(0x7f0000000540)="433be5aa713dac7ddfa5aceb9c0f0ef9c6ff4fa6715edee06577aca9e1802c6948ce5917adbb9eff0b4ac69d8dcce93c211792a2b40e062f841c8219ea2c69ed7a3e1f560fb720ad6ea18cc172c52ea188aa091cf8a468647df0", 0x5a}], 0x4, &(0x7f0000000600)={0x20, 0x82, 0x100000001, "3c319f16446141702cbcc7ed9497"}, 0x20, 0x80}, 0x20000040) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0xc) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x109002, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = dup(r5) ioctl$PIO_UNISCRNMAP(r6, 0x4b6a, 0x0) ioctl$SIOCX25GCAUSEDIAG(r6, 0x89e6, &(0x7f00000006c0)={0x80000000, 0x1ff}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0bc5351, &(0x7f0000000180)={0xd0, 0x5, 'client1\x00', 0x4, "a901535db1660092", "faf252972b29d6c81cba5fe00060fa02e2ecb83665dad63229a502a993b30779", 0x6c, 0x9868}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000240)="f3f4460f01d10f08f346fd66b85300400f3566b80b000f00d86666660f3882434766470f6e65db4381d4490000000f20e3", 0x31}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r3, 0xae80, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = dup(r7) ioctl$PIO_UNISCRNMAP(r8, 0x4b6a, 0x0) ioctl$UFFDIO_WAKE(r8, 0x8010aa02, &(0x7f0000000680)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000700)="da62b0a74a9d658aa995875d3cc88032db9ab6d5fac9f179f9bf4c8571fd140d6dfe0120facf88af052bc0331f31b3e77641b6338261f98a879f44ec6a29cf07c4a2f7540d0747f27a93006c0c40aed18c6f4359fcbf3caf167f626f6b17a629ff3d14e44c500c9033aa302a5210e908") ioctl$KVM_RUN(r3, 0xae80, 0x0) prctl$PR_GET_SECCOMP(0x15) 19:05:08 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) dup(r2) sendmmsg(r2, &(0x7f0000000080), 0x0, 0x2000) bind$can_raw(r0, &(0x7f0000000040), 0x10) setsockopt(r0, 0x65, 0x1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = dup(r3) ioctl$PIO_UNISCRNMAP(r4, 0x4b6a, 0x0) ioctl$KVM_SIGNAL_MSI(r4, 0x4020aea5, &(0x7f0000000180)={0x1, 0x2, 0x7, 0x5e, 0x7d4b3970}) r5 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r5, 0x28, &(0x7f00000000c0)}, 0x10) [ 227.108979][ T26] audit: type=1400 audit(1568487908.730:45): avc: denied { create } for pid=10861 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 227.123156][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 227.225251][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.234634][T10865] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 227.264461][ T26] audit: type=1400 audit(1568487908.740:46): avc: denied { write } for pid=10861 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 227.265812][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 19:05:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x4}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in6=@dev}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) [ 227.372053][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.412838][T10805] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.451838][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 227.469895][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 227.529201][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 19:05:09 executing program 2: getitimer(0x6, &(0x7f0000000040)) [ 227.582988][T10800] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 227.628548][T10800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 227.691658][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 227.724513][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 227.774553][T10805] 8021q: adding VLAN 0 to HW filter on device team0 19:05:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a00)='TIPCv2\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = dup(r2) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) dup(r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) dup(r5) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x7f, 0x84103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_RD(r6, 0x80287010, &(0x7f0000000340)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r7, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) dup(r7) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000000580)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESOCT=r0, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="441fc4f9c69c6d5ea36c097afea4464c2187f13831bd62b65509fabf1b", @ANYBLOB="2247bede97e4e6d984c18e014bc0d82ce5c3834d0480d841a29bba69b92033777d6a78fdd2ee78a4cb12c05dbcaa6bc8f73263a984b03403fbc5ebd5b2f51084dea235604170140bbe41916067bface8eac0766380e257a6902238597f2fbcab8e2fd26c5ba470903614d67dd275efb6c10967953b61805c28b6b0cea0aa706e20460339ee369319a450acfd6c5d3d7cd293975f4eab363937ef44296a5a8cab918e30eca034de63f4abe9156d83e9c67dc870822a49e1d58d28a9079d62b78396687f34d64f069b38e0"], @ANYPTR64=&(0x7f0000000780)=ANY=[@ANYPTR64=&(0x7f0000000700)=ANY=[@ANYRES64=r5, @ANYRES32=r6, @ANYRES64=r0, @ANYRES64=r0, @ANYRES16, @ANYPTR=&(0x7f0000000880)=ANY=[@ANYRESHEX=r8, @ANYRESDEC=r0, @ANYPTR], @ANYRESDEC=0x0, @ANYRESOCT, @ANYPTR=&(0x7f0000000840)=ANY=[@ANYRESDEC=r7, @ANYRESDEC]], @ANYPTR64, @ANYRES64=r3, @ANYBLOB="0f3a43f4c3afafc96e3302a5e85a8d8a3aecfd9c198b7d4ee94a51140d807d5c78073f85719f877967ce6ad50d8ad0e0234310dec23229e75f3af8e1d8e193446041e47b660e37d2f7fca1389bb65f86de057272b6dae56f4a1c1cdd9ccc2bff12cefb036d00da663f2e80cf995051bb4a"], @ANYRES32=r4], @ANYRES16=r1, @ANYBLOB="010400000000000000000c00000004000500d41791b6370516a271f399ae7ad108d1de6961fa6f3c688654c482029ab515f650ef89448f2841d9e046b50f151a893ba9e537d41f79019f91a04bc3600bbda7f60c3e8dcbb9990ef39e380c6d6f2227d864ed694ad195877a54df3bc209d47307a4a0234c0bb4420c4bf4b18ce42e0c9b40b73c3a8ee1d9f61875d1aa7c48c2a3c0666d95bdffefdaa0209f489d5e6401fd349c9217ea71f2a73bab6b72c978b4c5fdadb4eb3805"], 0x3}}, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r9, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x7) r11 = dup(r10) ioctl$PIO_UNISCRNMAP(r11, 0x4b6a, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r11, 0x84, 0xc, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r12 = dup(r9) getsockopt$TIPC_IMPORTANCE(r12, 0x10f, 0x7f, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet6_MCAST_MSFILTER(r9, 0x29, 0x30, &(0x7f0000000000)={0x2, {{0xa, 0x4e20, 0x1, @local, 0x4}}, 0x1}, 0x90) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000240)={0x7fffffff, 0x8b, "627bca3be59831f7639b806d5b31efed0be2a281872163cd963a1902741ca8e431398d9fab56f35f84fb933a53299eeccabc98e62e19db204d62f43bddcd4ecdb0dc4b696f8e42be4cbac8453f29673db3d7f84292e65cbcb26589befd344643d76efe10dc579d9c7ffb5c20ffd81096761b956a137e8f79c7861a256262d4f7a8443c6c03defff4ee5796"}) [ 227.855851][T10800] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 227.873551][ T26] audit: type=1400 audit(1568487909.500:47): avc: denied { read } for pid=10880 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 227.909823][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.926048][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.984392][ T26] audit: type=1400 audit(1568487909.580:48): avc: denied { listen } for pid=10880 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 228.023949][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.055011][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.122230][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.129359][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.205902][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.253352][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.281359][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.288459][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state 19:05:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a00)='TIPCv2\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = dup(r2) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) dup(r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) dup(r5) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x7f, 0x84103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_RD(r6, 0x80287010, &(0x7f0000000340)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r7, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) dup(r7) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000000580)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESOCT=r0, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="441fc4f9c69c6d5ea36c097afea4464c2187f13831bd62b65509fabf1b", @ANYBLOB="2247bede97e4e6d984c18e014bc0d82ce5c3834d0480d841a29bba69b92033777d6a78fdd2ee78a4cb12c05dbcaa6bc8f73263a984b03403fbc5ebd5b2f51084dea235604170140bbe41916067bface8eac0766380e257a6902238597f2fbcab8e2fd26c5ba470903614d67dd275efb6c10967953b61805c28b6b0cea0aa706e20460339ee369319a450acfd6c5d3d7cd293975f4eab363937ef44296a5a8cab918e30eca034de63f4abe9156d83e9c67dc870822a49e1d58d28a9079d62b78396687f34d64f069b38e0"], @ANYPTR64=&(0x7f0000000780)=ANY=[@ANYPTR64=&(0x7f0000000700)=ANY=[@ANYRES64=r5, @ANYRES32=r6, @ANYRES64=r0, @ANYRES64=r0, @ANYRES16, @ANYPTR=&(0x7f0000000880)=ANY=[@ANYRESHEX=r8, @ANYRESDEC=r0, @ANYPTR], @ANYRESDEC=0x0, @ANYRESOCT, @ANYPTR=&(0x7f0000000840)=ANY=[@ANYRESDEC=r7, @ANYRESDEC]], @ANYPTR64, @ANYRES64=r3, @ANYBLOB="0f3a43f4c3afafc96e3302a5e85a8d8a3aecfd9c198b7d4ee94a51140d807d5c78073f85719f877967ce6ad50d8ad0e0234310dec23229e75f3af8e1d8e193446041e47b660e37d2f7fca1389bb65f86de057272b6dae56f4a1c1cdd9ccc2bff12cefb036d00da663f2e80cf995051bb4a"], @ANYRES32=r4], @ANYRES16=r1, @ANYBLOB="010400000000000000000c00000004000500d41791b6370516a271f399ae7ad108d1de6961fa6f3c688654c482029ab515f650ef89448f2841d9e046b50f151a893ba9e537d41f79019f91a04bc3600bbda7f60c3e8dcbb9990ef39e380c6d6f2227d864ed694ad195877a54df3bc209d47307a4a0234c0bb4420c4bf4b18ce42e0c9b40b73c3a8ee1d9f61875d1aa7c48c2a3c0666d95bdffefdaa0209f489d5e6401fd349c9217ea71f2a73bab6b72c978b4c5fdadb4eb3805"], 0x3}}, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r9, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x7) r11 = dup(r10) ioctl$PIO_UNISCRNMAP(r11, 0x4b6a, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r11, 0x84, 0xc, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r12 = dup(r9) getsockopt$TIPC_IMPORTANCE(r12, 0x10f, 0x7f, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet6_MCAST_MSFILTER(r9, 0x29, 0x30, &(0x7f0000000000)={0x2, {{0xa, 0x4e20, 0x1, @local, 0x4}}, 0x1}, 0x90) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000240)={0x7fffffff, 0x8b, "627bca3be59831f7639b806d5b31efed0be2a281872163cd963a1902741ca8e431398d9fab56f35f84fb933a53299eeccabc98e62e19db204d62f43bddcd4ecdb0dc4b696f8e42be4cbac8453f29673db3d7f84292e65cbcb26589befd344643d76efe10dc579d9c7ffb5c20ffd81096761b956a137e8f79c7861a256262d4f7a8443c6c03defff4ee5796"}) [ 228.378684][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.397290][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.445988][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.482397][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.518133][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.536236][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.582216][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.591596][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.600270][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.612662][T10805] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 228.624658][T10805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.640239][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.676326][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.693749][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.794761][T10805] 8021q: adding VLAN 0 to HW filter on device batadv0 19:05:10 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f00000001c0)=0x83f3, 0x4) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f00000002c0)={0x2, 0x0, 0x2, 0x10000}) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='\x01\xfc\x00\x00\x19') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = dup(r2) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = dup(r4) ioctl$PIO_UNISCRNMAP(r5, 0x4b6a, 0x0) unlinkat(r5, &(0x7f0000000280)='./file0\x00', 0x200) ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, &(0x7f0000000200)) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='io.max\x00', 0x2, 0x0) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x10000, 0x0) ioctl$SIOCAX25GETINFOOLD(r7, 0x89e9, &(0x7f0000000140)) write$cgroup_int(r6, &(0x7f0000000180)=ANY=[@ANYBLOB="373a32097fe5c53d"], 0x8) 19:05:10 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0xc0101282, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000440)={0xff, 0x9db}) socket$inet_udplite(0x2, 0x2, 0x88) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2000000000000000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x80000000001, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @remote}, r2}}, 0x171) 19:05:11 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xe25e, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) futex(0x0, 0x8c, 0x0, 0x0, 0x0, 0x0) 19:05:11 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xa01, 0x0) r2 = socket$kcm(0x2b, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000001c0)={'nr0\x01\x00', 0x4000007132}) r3 = socket$kcm(0x29, 0x2, 0x0) r4 = add_key(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000200)="79f6cde6385a03c873b13b2fcd48b531ca615408b2e962b3b453eae178ff0c93b15e194ec396ed6a60262a9846d2e14f0cf736ffd4b4a22baaae8bb93570b5c76da8a0f8dd6edb322c08", 0x4a, 0xfffffffffffffff9) keyctl$read(0xb, r4, &(0x7f0000000180)=""/62, 0x3e) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000340)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\v9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02_\x95\xc2j\xac\xb4\xa4)\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff078aa174cd2ed7e08b93dd86dd2a95c4e1010a2fb6fd8447ff070000af800000c9cb807d79206c78fa52390a01db65af899477060e800065586e8c275e"], 0x3e) 19:05:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000040)={0x65a8, {{0x2, 0x4e20, @empty}}}, 0x88) io_setup(0x4, &(0x7f00000004c0)=0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000180)={0x2, 0x40, 0x7fff, 0xd02}, 0x10) io_submit(r1, 0x1, &(0x7f00000017c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x7000000}]) 19:05:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x40000010, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 19:05:11 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x319300, 0x0) read$char_usb(r0, &(0x7f0000000300)=""/176, 0xb0) 19:05:11 executing program 3: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) open(&(0x7f0000000100)='./file0\x00', 0x141242, 0x201) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) dup(r2) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xfffffffffffffffe) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0xb8a2cc885d48919f, r3, 0x200000000) read(r0, &(0x7f0000000000)=""/250, 0xedf1d44) 19:05:11 executing program 5: r0 = socket(0x1, 0x5, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000001780)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f00"}, 0x18) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'ipddp0\x00', &(0x7f0000000180)=ANY=[@ANYRESHEX]}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) dup(r2) accept4(r2, &(0x7f0000000080)=@xdp, &(0x7f0000000100)=0x80, 0x80000) 19:05:11 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x100, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = fcntl$getown(0xffffffffffffffff, 0x9) fcntl$lock(r2, 0x12, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x9, r3}) write$uinput_user_dev(r1, &(0x7f00000001c0)={'syz0\x00', {0x4, 0xf264, 0x6, 0x6}, 0x24, [0xf8df, 0x6e91dde8, 0xcd, 0xb88, 0x1, 0xffffffff, 0xfffffffffffffffd, 0xfffffffffffffffd, 0x5e84, 0x2, 0x0, 0x0, 0x46, 0x3, 0x2, 0x4, 0x3, 0x1, 0x0, 0x2, 0x7, 0x1, 0x7, 0x0, 0x1, 0x7, 0x1000, 0x9, 0x9, 0x3, 0x1, 0x80000000, 0x2, 0x3, 0x80, 0xd49, 0x2, 0x635, 0x5cd, 0x5, 0x2, 0x628, 0x7, 0xffff, 0x1, 0x1, 0x800, 0x9, 0x1, 0xa83, 0xff, 0x6, 0x5, 0x20, 0x80000000, 0x7, 0x6, 0xffffffffffff8000, 0x0, 0x100000000, 0x3f, 0x81, 0x5, 0xffffffff80000000], [0x0, 0xffff, 0x7fffffff, 0x7fffffff, 0x400, 0xffff, 0x7fff, 0x1f3f, 0x9, 0x8001, 0xfffffffffffffe01, 0x8000, 0xfffffffffffffffb, 0xffffffff, 0x3d, 0x8, 0x35d, 0x80000000, 0x800, 0x7fff, 0x5, 0x40, 0xfffffffffffeffff, 0x2, 0x401, 0x8, 0x1, 0x6, 0x3, 0x8, 0x1, 0x0, 0x5, 0x0, 0xc37c, 0x9f, 0x5, 0x4, 0x7fffffff, 0x29d6, 0x1000, 0x0, 0x8000, 0x8, 0x2, 0x8, 0x9, 0x100, 0xff, 0x8, 0xffffffffffffffff, 0x1000, 0x9, 0x9, 0x2, 0x9, 0x5, 0x8, 0x8, 0x3706, 0x3, 0x6, 0x80000000], [0x5, 0x81, 0x7, 0xffffffff, 0x177, 0x6, 0x8d98, 0xffffffffd314f238, 0x4797, 0x3, 0x20, 0x1ff, 0x1ff, 0x6f, 0x6, 0x4, 0x5, 0x77c8, 0x1, 0x2, 0x80000001, 0x3, 0x1f, 0xfffffffffffffffa, 0x8, 0x0, 0x80, 0x3, 0x2, 0x3, 0x100, 0x93, 0x7, 0xd50b, 0x2, 0x5937, 0x79, 0x7fff, 0x10001, 0x5, 0xbe, 0x6, 0x81, 0x0, 0x8001, 0xfffffffffffffffd, 0x200, 0x2, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x3, 0x0, 0x100000000, 0x4, 0x7, 0x9, 0x6, 0x6, 0x100000001], [0x8, 0x3, 0x3ffb, 0x10000, 0x7, 0x400, 0x7, 0x4, 0x0, 0x8, 0x8001, 0x7fffffff, 0x36, 0xf3a, 0x800, 0x8, 0xfffffffffffffffd, 0x0, 0x7, 0x1000, 0x6, 0x7, 0x6, 0x7, 0x3, 0x6, 0x9, 0xffffffffe00bf5eb, 0xffffffffffff7fff, 0x1, 0x7, 0xfffffffffffffffd, 0x3ff, 0x6, 0x0, 0x5, 0xe0, 0x20, 0x20, 0x4, 0x0, 0x1, 0x5, 0x8, 0x8, 0xa5a4, 0xfffffffffffffffc, 0x5, 0x5, 0x0, 0x4, 0x9, 0x6, 0x80, 0x8, 0xfffffffffffffffd, 0x3, 0x2, 0x6, 0x2c4, 0x9, 0xe0, 0xb56, 0x6]}, 0x45c) r4 = dup(r0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x6) write$uinput_user_dev(r4, &(0x7f0000000980)={'syz0\x00'}, 0x45c) 19:05:11 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f00000001c0)=0x3, 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000040)=ANY=[@ANYBLOB="004500001c0000000000119078ac14ffbbac1414bb004e200008907812a8e8b435489434d80ece37bafeda81f94e042b3499fa5d4a8bc3f243f17f668986870f13e9ab5d697d8a42bdfdce322927cd238d008c4bc1dd37f1003435c71c90fd3fac025a70e08ab504f22bed9c35bc20e109f9706cfb3b8c294c4c4fef24d4b70000000000000000000000000000000052ae2f2e513f0bf52bee95ba30b49e21f7c74085ea70d7eb771a1c40b3a163d9af79d033a8fbaf9662a95baa7c53"], 0x0) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000000)=0x1, 0x4) 19:05:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = dup(r0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000040)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x800002}}]}) [ 230.303016][T10949] SELinux: failed to load policy 19:05:11 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x80102, 0x2) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) socket$nl_netfilter(0x10, 0x3, 0xc) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x615, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="00fb6501008187b1265a3c8fa024fe3fa9607fcbe32ef48c684be651f2094786cb860e5e9759dc0f2649e1"], 0x1e, 0x3) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f00000006c0)) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f00000005c0)={0x6, 0x0, 0x0, 0x800, 0x6a, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xc}, 0x10}, 0x70) fsetxattr$security_selinux(r0, &(0x7f0000000600)='security.selinux\x00', 0x0, 0x0, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_TXQLEN={0x8}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 230.327888][T10932] device nr0 entered promiscuous mode 19:05:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8931, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = dup(r1) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000040)={@ipv4}, &(0x7f0000000080)=0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) socket$inet6_dccp(0xa, 0x6, 0x0) socket$pptp(0x18, 0x1, 0x2) listen(r3, 0x1000010b) r4 = dup(r3) ioctl$PIO_UNISCRNMAP(r4, 0x4b6a, 0x0) ioctl$PPPIOCATTCHAN(r4, 0x40047438, &(0x7f0000000000)=0x4) [ 230.407640][ T26] audit: type=1400 audit(1568487912.020:49): avc: denied { create } for pid=10959 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 230.472555][ T26] audit: type=1400 audit(1568487912.080:50): avc: denied { prog_load } for pid=10959 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 19:05:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$cgroup_type(r2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000802, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x10010000000035) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = dup(r7) ioctl$PIO_UNISCRNMAP(r8, 0x4b6a, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x9, 0x81, 0x7, 0xefea, 0x0, 0x9652, 0x4040, 0x0, 0x5, 0x81, 0x9, 0x57e, 0x1, 0x9, 0xff, 0x3, 0xb5, 0x1, 0x2, 0x7, 0x7fffffff, 0xffffffffffffffc0, 0xc1, 0x9, 0x8001, 0x401, 0x3, 0x4, 0x1, 0x8, 0x2, 0x1ff, 0x1, 0x3, 0x80000000, 0x9742, 0x0, 0x2a, 0xb, @perf_bp={&(0x7f00000000c0), 0x2}, 0x10c08, 0x3, 0x57, 0x0, 0x6, 0xcc, 0x18}, r6, 0x0, r8, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000001c0)='syz_tun\x00', 0x10) r9 = dup2(r5, r5) write$cgroup_type(r9, &(0x7f0000000140)='threaded\x00', 0xfffffebd) [ 230.499111][ T26] audit: type=1400 audit(1568487912.090:51): avc: denied { ioctl } for pid=10964 comm="syz-executor.4" path="socket:[31845]" dev="sockfs" ino=31845 ioctlcmd=0x8931 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 230.633008][T10960] SELinux: failed to load policy [ 230.754254][T10961] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 230.852662][T10932] device nr0 entered promiscuous mode [ 230.873683][T10968] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 230.884869][T10961] syz-executor.2 (10961) used greatest stack depth: 23032 bytes left 19:05:12 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x80102, 0x2) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) socket$nl_netfilter(0x10, 0x3, 0xc) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x615, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="00fb6501008187b1265a3c8fa024fe3fa9607fcbe32ef48c684be651f2094786cb860e5e9759dc0f2649e1"], 0x1e, 0x3) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f00000006c0)) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f00000005c0)={0x6, 0x0, 0x0, 0x800, 0x6a, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xc}, 0x10}, 0x70) fsetxattr$security_selinux(r0, &(0x7f0000000600)='security.selinux\x00', 0x0, 0x0, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_TXQLEN={0x8}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 19:05:12 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r1 = getpgid(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) dup(r2) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0xd996dcf3a21659cb, 0x0) r4 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host}, 0x10, 0x80800) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000100)={r3, r4, 0x400}) r5 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_CREATE_BUFS(r5, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) r6 = syz_open_dev$swradio(0x0, 0x0, 0x2) ioctl$VIDIOC_CREATE_BUFS(r6, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr}}) 19:05:12 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x8000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000600), 0x100000) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @mcast2}, {0x2, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}}}, 0x48) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = dup(r2) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x7b6f, 0x87d}, &(0x7f0000000340)=0x90) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000380)={r4, 0x17a0, 0x2, [0x7, 0x5]}, &(0x7f00000003c0)=0xc) r5 = dup(r1) ioctl$VHOST_SET_VRING_ADDR(r5, 0x4028af11, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r3, &(0x7f00000005c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x1ac, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3568}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffeff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x614f}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000000}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xeb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6d}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xc0000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7367}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x848}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x39}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5d88}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x255}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}]}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000000)=0x5) flistxattr(r5, &(0x7f0000000140)=""/242, 0xf2) 19:05:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, 0x0, 0x936b07a4da179ec7, 0x0, 0x0, 0x1d7) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x80400, 0x0) ioctl$TCSETAF(r3, 0x5408, &(0x7f0000000000)={0x10f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x75, 0x0, &(0x7f0000000000)) 19:05:12 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x80102, 0x2) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) socket$nl_netfilter(0x10, 0x3, 0xc) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x615, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="00fb6501008187b1265a3c8fa024fe3fa9607fcbe32ef48c684be651f2094786cb860e5e9759dc0f2649e1"], 0x1e, 0x3) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f00000006c0)) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f00000005c0)={0x6, 0x0, 0x0, 0x800, 0x6a, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xc}, 0x10}, 0x70) fsetxattr$security_selinux(r0, &(0x7f0000000600)='security.selinux\x00', 0x0, 0x0, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_TXQLEN={0x8}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 19:05:12 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80400, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000200)={'mongle\x05\x00'}, &(0x7f00000000c0)=0x54) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000000)) r2 = msgget(0x3, 0x400) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@struct={0x5, 0x2, 0x0, 0x4, 0x1ff, 0x7fff, [{0x3, 0x1}, {0xb, 0x1, 0x5}]}]}, {0x0, [0x0, 0x30]}}, &(0x7f0000000540)=""/120, 0x40, 0x78}, 0x20) r7 = dup(0xffffffffffffffff) ioctl$PIO_UNISCRNMAP(r7, 0x4b6a, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = gettid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000300)={{0x8001, 0x0, 0x0, 0x0, r9, 0x80, 0x7}, 0x9, 0x1, 0xe4, 0x800, r10, 0x0, 0x6}) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = gettid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000300)={{0x8001, 0x0, 0x0, 0x0, r11, 0x80, 0x7}, 0x9, 0x1, 0xe4, 0x800, r12, 0x0, 0x6}) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = gettid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000300)={{0x8001, 0x0, 0x0, 0x0, r13, 0x80, 0x7}, 0x9, 0x1, 0xe4, 0x800, r14, 0x0, 0x6}) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = gettid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000300)={{0x8001, 0x0, 0x0, 0x0, r15, 0x80, 0x7}, 0x9, 0x1, 0xe4, 0x800, r16, 0x0, 0x6}) getgroups(0x6, &(0x7f0000000380)=[r9, 0xffffffffffffffff, r11, r13, r15, 0xffffffffffffffff]) r18 = gettid() ptrace$setopts(0x4206, r18, 0x0, 0x0) tkill(r18, 0x10010000000035) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000003c0)=0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000400)={{0x5, r3, r4, r8, r17, 0x103, 0x100000001}, 0x88, 0xfff, 0x9, 0x0, 0x0, 0x80000000, r18, r19}) 19:05:12 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x80102, 0x2) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) socket$nl_netfilter(0x10, 0x3, 0xc) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x615, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="00fb6501008187b1265a3c8fa024fe3fa9607fcbe32ef48c684be651f2094786cb860e5e9759dc0f2649e1"], 0x1e, 0x3) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f00000006c0)) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f00000005c0)={0x6, 0x0, 0x0, 0x800, 0x6a, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xc}, 0x10}, 0x70) fsetxattr$security_selinux(r0, &(0x7f0000000600)='security.selinux\x00', 0x0, 0x0, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_TXQLEN={0x8}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 19:05:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000140)="11ff0020000bcfe47bf070") futex(&(0x7f000000cffc)=0x800000000004, 0x80000000000b, 0x4, 0x0, &(0x7f0000000040), 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000100)) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1, 0x0) mq_open(&(0x7f0000000000)='self$\x00', 0x0, 0x100, &(0x7f0000000080)={0x1, 0xfffffffffffffffb, 0x8, 0x3, 0x2, 0x7, 0x100000001, 0x80000000000}) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) tkill(r2, 0x5000000000016) 19:05:12 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6000}, 0x200000}) 19:05:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$packet(0x11, 0x40800000000003, 0x300) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x28) setsockopt$packet_int(r1, 0x107, 0x13, &(0x7f0000000000), 0x4) 19:05:12 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x80102, 0x2) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) socket$nl_netfilter(0x10, 0x3, 0xc) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x615, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="00fb6501008187b1265a3c8fa024fe3fa9607fcbe32ef48c684be651f2094786cb860e5e9759dc0f2649e1"], 0x1e, 0x3) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f00000006c0)) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f00000005c0)={0x6, 0x0, 0x0, 0x800, 0x6a, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xc}, 0x10}, 0x70) fsetxattr$security_selinux(r0, &(0x7f0000000600)='security.selinux\x00', 0x0, 0x0, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_TXQLEN={0x8}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 231.425334][T10993] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 19:05:13 executing program 0: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = dup(r0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f0000000bc0)={0xb5, 0x800, 0x0, {0x0, 0x1c9c380}, 0x1, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000400)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="73797a30a99916007ef67a31a8bddf3b8a527c4ae452d5ea7461d017429d9ced80e034febfd165004b8ff158ee05f30a7e328c53f81e373ae72adeb533bf3d516c6b462481f8515e6bff9b123b175668d564bb7bd3e5fb3254e7de44194664ef6e7f9dd775d5a65b1ee873ec4a3e91a9a61c38f3470c5fdf61bce340ef5001de7a5f8f7004dd33e4e5df6fdb9ace582b2db9a73f3f30a631796fd2cfabb9b5226dd7492a1c44d71026077d82d01c8a72908236e71f86fc0fe64e697f9466eb6d7f32b60207291da14fe2ee788c05aee3cd750ebfa7274cf3e7d187b3fddf483fe7bfc4f7c5645cae1d10280e6760e237c5c4c58b6aab3e2c5c840e07870956cf4a699d0481e868fa32a75fde0676b88440704d2cd957130e2bfbd7d965b937d29c653805e5f876d7326e6aa0a24e457b25997d6c171eb929317d398ee2b81f406c76209775ac34fec115f031ec8a041a1dea8496d33c6d1f339a6788075ca96d0e89170c1e09cde578469909c320cbf62e86f785145b30cf97fb1a1b77e2c1d65c7e81324c9321272655dfb9495defdb7a4e654f2d3530b3796a6323e4ce5adcb0e208593f257f72c49dd1b777ea454f9c1f547db18aed7e1ad43bb63b0a431112e8dda69498a648042a86bb1a9ee3eb2e73e05b3e8d48c7aab0f06b875bad59799d0985b18459b8b8464420af3cdbb866ff3a0b6c6efe5e67613bcb2ba3baa46fbfdc4355f917055d9623483eb24b6f3fe644fabb84b7f891ea540b02dfc3126b1d820f9cf43a54a71d1efb6ba878bb0397db842c85cc9bdf283bdb4c5c4d591f5599509c1907008ebe8be2ca1c7fdc13330d78c7d4a7eddf653d57af5a044dfd108a2d2fea3ceb15adcc1046e69834c08ad4fc5ff3f34247495ddca75f0d4bd66384b6577a5b7c5f885408206bed4009e8d1795183ce0952050a127986af5c47c072e6477f939cb2147c9e3b3b3630416c5ddc3f3a58d359a2e2ebfddcdab3cf39f6ca5357e50b668ec186f4cdb4e92d4bdb25b2f3780704e76a750b1c7d5e4abde4e53972712ea6198c8b3adf87db132125c77fe1b5d2288a15f0da655f4890af295750437f2465e5e30ce7b6154a26a6a6fcca5209fe53c715b8ae2a1fcaa2f5e94c24d82607e37f63e011b0c2908779dc2a37e9e722252fd01cdab4e85f7ac78fa1e88833eaab0737a33c2e94121ee4e003fcdb4564849cc612eb20ebc946b0378f6130ceda953e4343cd68df45bd4a3d638542f968e7ed8632c97db9359af990baf4d6cb26b0b1ea002becdb32e554cf9cd410a38cf9981736c040ac59b72980472686828f1e4236f79d7da1cd46cb574622b49fc7371a9d83fae5a944ba59797be50d1fd01af3aca50bc9d2083ac6bf0b2583277c0781aa3969b6a41067af7e28b8d41b9f5de4a0b3d3fbf7f8acb00c111a6a25eb98093d715995bc38bd1b7a64edff53796ff9428dda1fb4fc67e42ddae13dc29af9a19c1e172ac72833034c3b95719b0d28da83305791154d3e835127d96da0d0b7d3ebea3cbe093c2d91fe8eaf90a19f696a4f7f59b56d4f5eb5d3fb10e7e79b4be7d36246f6d304d1fa2836fd13e0a3faa8e405c437902bb08aabf31418285fc5e94a4623907a4a62405ad957bf97a08506e8f2db4239bdcc757dbc40c071ab4fec8c365d7846fb887fa56cb5db11314b857ae1523f1cbf8cc4a2471ccd7361f55b99e652a2d59fddd1f986305fa0b574032be36a921969cf8e55d96fd94f671a78d053051915a96bbf7c1685800086055b89caa456f6adf83929d0ac87dd6da467f6193a82573fb91f965390ae06d8ff15a878ac90c5fea41af7ba9e46d3ad1c52e53f69b4d383365eaf8031c7482928bb2790ebcb13f5740e29ff2e0d78a0f4934f8f4cd4f0600a22688a994b9b46ea445f26cac4991d5e52597e6f6462ca2a7e5a2ae4b8fefdfe880c233f8f0b4c812ff4ba185c41f9aa78f6f3890612346b1060922fe402332199d6d0cc3a200bdf28ca5cf6e62102c33f6a91c23fe2bdcf5522c3a6c3a1b3845c17664574aa1db3868fc965f28b64e06882a147fb3f96ce129766023e096270c4540377eaa809a0399e674e31e788ea1b34dae1cf7ec929c887a2fb36f46124c8b363604949af3affff180479fb40e14cfbfe3b5b5127290dfa1f1c92490b51b0aed779804f562e16fbb0db5f9397dc4f9d0a1065b9072f753df29d99a25d55d57f571e95ddc7be17eda1c9f7f1273cbd0e49f569d404594450aad2f4904790db7ba5f236e1d34aacd6849446238a44cd9c10173483f4be36345028b5b8bc87fc5738d9b7477dc3ded2c36c0c344a99b466e22c62ee60012a05ee1d4d0be5e08474fdf6b38b6424133b0fee40b724453240b672c1b03d6c0bd8dfcb"], 0x69d) connect$vsock_dgram(r3, &(0x7f0000000140)={0x28, 0x0, 0x5cea60b30224180e, @my=0x0}, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb82f6e244e4ef98c}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8810}, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000180)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$FIBMAP(r7, 0x1, &(0x7f00000003c0)=0x9) ioctl$KVM_RUN(r6, 0xae80, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='loginuid\x00') sendfile(r8, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) 19:05:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='\x00\t\x00\x00\x00\x00[\x00', 0x200, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = dup(r3) ioctl$PIO_UNISCRNMAP(r4, 0x4b6a, 0x0) getsockopt(r4, 0xabc, 0x3ff, &(0x7f0000000440)=""/254, &(0x7f0000000540)=0xfe) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x10100) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) r6 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x0) connect$caif(r6, &(0x7f0000000400), 0x18) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) syz_mount_image$btrfs(&(0x7f0000000580)='btrfs\x00', &(0x7f00000005c0)='./file0\x00', 0x2a00, 0x2, &(0x7f0000000680)=[{&(0x7f0000000600)="c8150d9dcbc16196814f8e3121c0e4fe67164384dd50f910d733f1a06dc2b1ec0e7b41b9abc52e", 0x27}, {&(0x7f0000000640)="2cf0c132eab4862692eb3a7e866cc5dca22d08b32d33b5169674556e6242aa80305379274d6d1bfea00b659e2cd608a6c99546b10b602c2742", 0x39, 0x3}], 0x82080, &(0x7f00000006c0)={[{@noenospc_debug='noenospc_debug'}, {@fragment_data='fragment=data'}, {@device={'device', 0x3d, './file0'}}, {@inode_cache='inode_cache'}, {@barrier='barrier'}, {@ssd_spread='ssd_spread'}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@fsname={'fsname', 0x3d, '/dev/input/mice\x00'}}, {@subj_role={'subj_role', 0x3d, '\x00\t\x00\x00\x00\x00[\x00'}}, {@obj_type={'obj_type', 0x3d, '/dev/admmidi#\x00'}}, {@subj_role={'subj_role', 0x3d, '/dev/admmidi#\x00'}}]}) r8 = dup(r7) ioctl$PIO_UNISCRNMAP(r8, 0x4b6a, 0x0) ioctl$KDGKBDIACR(r8, 0x4b4a, &(0x7f00000002c0)=""/211) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x4b564d04, 0x0, 0x3a], [0xc1]}) uname(&(0x7f0000000200)=""/158) 19:05:13 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000200)=[@in6={0xa, 0x4e20, 0x80, @loopback, 0x1f}, @in6={0xa, 0x4e24, 0xfffffffffffffff8, @mcast1, 0x11}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e20, @multicast2}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e22, 0x100, @mcast1, 0x9080}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e21, 0x3f, @mcast2, 0x10001}], 0xb0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c56, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x11c, &(0x7f00000000c0)=[{0x0, 0x255}], 0x1, 0x0, 0xfffffffffffffed0}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) socketpair(0x0, 0x0, 0x8, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={r1, 0x0, 0x1, 0x0, &(0x7f00000003c0)}, 0x20) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="263c6e47a801e320336ee7e1944c35347f78eb089df236238a4aaa0b733f35b78b10915630b6578e5123bbe652458e604831d6af4699f48ceb7a8dc9079dde45cffbabb914257305c943cd0ec19abc6c4d4be69413b892b4826e677bda04681fce54"], 0x62) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 19:05:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80000000400005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x2080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x73) close(r0) 19:05:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000100)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80002, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x2}, 0x20) [ 232.413240][T11021] device lo entered promiscuous mode 19:05:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000001b40)="9f44948721919580684010a49e26339d8860c3fc2f04883d8f9d8a232981b007de9019a0f7bf49a9807bda6adf2ffce83a4cf375cb3f9daaaa44226709bf81d8d00923e8", 0x0, 0x7ff}, 0x37) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000280)=""/166) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x800, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = dup(r0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x11840, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = dup(r2) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x105100, 0x0) ioctl$GIO_CMAP(r4, 0x4b70, &(0x7f0000000080)) 19:05:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = dup(r1) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, 0x0) bind$unix(r2, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x17f, 0x10002, 0x0) 19:05:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000100100000100000000000000f41bdd7b449025e406d58937e7e899e0524843c9577f89f71ebddf077798b47ab4a76907477a209522adca7e5454b7dec9cffca56ccbcabfb25cc94628348a24593c5dbdf200796a8fd217367c017f76f131c8693ac43b77471be914707d2c3545b812f7f58f436706f17b26ae3208e5809f51528f2436610c52b724993141a5cb7a0a9c3dca0a16787a4d0c82e2d982921931d30f4d4868c2ce6c49aac96b000000002150a4058a8e4347e13f94be6d87fc7ecdafb88b1a03b8d9e4eac3f0076580f6e76aec101fc935e5c25fac970f73d3fe036c1e5b4046cf69b3a1071a96f3d5fdf7a8e7b907d236e91a85b6e2a13b6b5eb558d081f5b2244a7c5669b224ae000000000000000000000000000000000000000000004341966d8512048776e00d557f38943bd7c2bf8901e677f29d0c1b51dc9f87489ade1c512f5467659be980b876477d33e7fcde01a1be76671a202ffa3428d24d2b70e2a77538fbdf9e8f1f700df8b649d724a19577cf2f2ac2656c6103434bb9ad1f02345055e34e788732cb3dacc9009467955e5768d204257ce9bfde835a8ba3a565c4ce391e7c9b75837b1e278bb1bc8bfd01b0fa51a34446a53a31b0efb4e09db15a0947a55bd1b8121d15ae7e66e658d5a9bbbd6a0000"], 0x18}}], 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = dup(r1) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, 0x0) bind$unix(r2, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x17f, 0x10002, 0x0) [ 233.762570][ T60] device bridge_slave_1 left promiscuous mode [ 233.770771][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.809583][ T60] device bridge_slave_0 left promiscuous mode [ 233.815959][ T60] bridge0: port 1(bridge_slave_0) entered disabled state 19:05:15 executing program 4: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = semget$private(0x0, 0x0, 0x0) semctl$IPC_INFO(r0, 0x3, 0x3, &(0x7f0000001300)=""/187) semctl$IPC_INFO(r0, 0x1, 0x3, &(0x7f0000000080)=""/128) mount$overlay(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x182b020, 0x0) 19:05:15 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x40000, 0x0) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) unshare(0x8000400) 19:05:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) dup(r0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000080)=0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) [ 235.019691][ T60] device hsr_slave_0 left promiscuous mode [ 235.079068][ T60] device hsr_slave_1 left promiscuous mode [ 235.154855][ T60] team0 (unregistering): Port device team_slave_1 removed [ 235.166503][ T60] team0 (unregistering): Port device team_slave_0 removed [ 235.177013][ T60] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 235.212601][ T60] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 235.288629][ T60] bond0 (unregistering): Released all slaves [ 235.396950][T11049] IPVS: ftp: loaded support on port[0] = 21 [ 235.449969][T11049] chnl_net:caif_netlink_parms(): no params data found [ 235.478082][T11049] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.485678][T11049] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.493428][T11049] device bridge_slave_0 entered promiscuous mode [ 235.501003][T11049] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.508218][T11049] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.516043][T11049] device bridge_slave_1 entered promiscuous mode [ 235.531469][T11049] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 235.542393][T11049] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 235.613494][T11049] team0: Port device team_slave_0 added [ 235.623207][T11049] team0: Port device team_slave_1 added [ 235.683995][T11049] device hsr_slave_0 entered promiscuous mode [ 235.729220][T11049] device hsr_slave_1 entered promiscuous mode [ 235.781415][T11049] debugfs: Directory 'hsr0' with parent '/' already present! [ 235.800079][T11049] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.807182][T11049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.814889][T11049] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.821985][T11049] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.851355][T11049] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.863135][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.871460][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.879570][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.892197][T11049] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.904234][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.913119][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.920557][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.939791][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.948163][ T3014] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.955283][ T3014] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.978614][T11049] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 235.989503][T11049] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 236.003384][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.012836][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.021793][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 236.032345][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 236.040819][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 236.048344][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 236.063857][T11060] IPVS: ftp: loaded support on port[0] = 21 [ 236.070497][T11049] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 236.193148][T11060] chnl_net:caif_netlink_parms(): no params data found [ 236.217505][T11060] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.225099][T11060] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.232752][T11060] device bridge_slave_0 entered promiscuous mode [ 236.240933][T11060] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.248120][T11060] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.256076][T11060] device bridge_slave_1 entered promiscuous mode [ 236.275168][T11060] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 236.338809][T11060] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 236.372765][T11068] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 19:05:18 executing program 5: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = dup(r1) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000140)=""/217) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x3, 0x2, 0xffffff06, {0x2, 0x4e23, @local}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)=ANY=[@ANYBLOB="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"/622], 0x18, 0x4800000000000000}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r7, 0x4008ae8a, &(0x7f0000000240)) r8 = dup(r4) ioctl$PIO_UNISCRNMAP(r8, 0x4b6a, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r8, 0x5411, &(0x7f0000000000)) connect$rxrpc(r3, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[], 0x0, 0x4800000000000000}}], 0x1, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) r10 = dup(r9) ioctl$PIO_UNISCRNMAP(r10, 0x4b6a, 0x0) ioctl$DRM_IOCTL_VERSION(r10, 0xc0406400, &(0x7f0000000380)={0x300000, 0x4, 0x800, 0x78, &(0x7f00000002c0)=""/120, 0x1000, &(0x7f00000004c0)=""/4096, 0x18, &(0x7f0000000340)=""/24}) close(r3) close(0xffffffffffffffff) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x501082, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r11, 0x0) r12 = dup(r11) ioctl$PIO_UNISCRNMAP(r12, 0x4b6a, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r12, 0x6, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) close(r0) 19:05:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000100)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80002, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x2}, 0x20) 19:05:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000000)='\\nodev\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = dup(r3) ioctl$PIO_UNISCRNMAP(r4, 0x4b6a, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000080)={0x10000000, 0x401, 0x3}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = dup(r5) ioctl$CAPI_NCCI_GETUNIT(r4, 0x80044327, &(0x7f0000000100)=0x5) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = dup(r7) ioctl$PIO_UNISCRNMAP(r8, 0x4b6a, 0x0) ioctl$RTC_IRQP_SET(r8, 0x4008700c, 0x1a3b) ioctl$PIO_UNISCRNMAP(r6, 0x4b6a, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000040)=0x15) ioctl$KDADDIO(r0, 0x400455c8, 0x9) [ 236.425628][T11060] team0: Port device team_slave_0 added 19:05:18 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000000)) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) [ 236.512170][T11060] team0: Port device team_slave_1 added 19:05:18 executing program 3: fcntl$notify(0xffffffffffffffff, 0x402, 0x25) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xdb8, 0x200800000000042) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000000)={0x300, 0x0, 0x0, 0x0, 0x0, 0x7ff0bdbe}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x400002, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f00000000c0)={0x1, 0x401, 0x4, 0x3cfd, 0x2, 0x8}) 19:05:18 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = dup(r1) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000001780)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f00"}, 0x18) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) dup(r4) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000001780)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r5, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f00"}, 0x18) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r6, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) dup(r6) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x7f, 0x84103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_RD(r7, 0x80287010, &(0x7f0000000340)) r8 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000001780)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r8, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9080000005345204c690cbb165d3e6e75781221000000c46f006376c077db00e5cfacf50b6d737b2bf9851a96c22d14b63d6d64580199a4eefb7c177ab17f1e8cbe75204431d950a5069f30914dcee80af68408b6e1863ae21588689c425113c230f8e2216867abbe871cc28115c650b8d2834037cef90cf339b7c1c5d9ef2e63292f387de57c"], 0x18) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) dup(r9) r10 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x400, 0x0) sendmsg$nl_generic(r10, &(0x7f00000002c0)={0x0, 0x42, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[]}, 0x1, 0x0, 0x0, 0x4044080}, 0x20000000) r11 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000001780)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r11, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f00"}, 0x18) ioctl$FIGETBSZ(r11, 0x2, &(0x7f0000000000)) r12 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r13 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r12, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000380)={0x110, r13, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfa5}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="e5a477e14b8cdececc2bd67c0872ec1d"}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4c}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x60feccc3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x40}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4f}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x20000000}, 0x8844) 19:05:18 executing program 5: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x4402, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000080)=@bridge_getneigh={0x28, 0x1e, 0x601, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r1}]}, 0x28}}, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x206142, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11808118}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv6_delrule={0x28, 0x21, 0x800, 0x70bd28, 0x25dfdbfc, {0xa, 0x20, 0x10, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1}, [@FIB_RULE_POLICY=@FRA_SUPPRESS_PREFIXLEN={0x8, 0xe, 0xb2d}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80088d1) 19:05:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)={{0xcc, 0x8, 0xffffffffffffffff, 0x3d6, 0x1dc, 0x2, 0xaa, 0x800}, "e34761b5948eb8af34298e00bad4cd19104a992b9e798de86bb6f20311c1410dd7d9d8878bde5692167b52e9fb7ce19c4019934c4b268ed464fa00057bc03241e2f5b202f86e156d034c00d81958e74cc7583a98c8cc1276bc620ba59dc306d23e85a1eb5dabf3671dd149bc2c2744208a46cdb65a90d804b72342bc1665", [[], [], [], [], [], [], [], [], [], []]}, 0xa9e) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 19:05:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r2, 0x0, 0x8801) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000840)={0x0, 0x3, 0x3, [0x2, 0x10001, 0xc77a]}, &(0x7f0000000880)=0xe) r3 = socket$inet6(0xa, 0x4, 0x6) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = accept$inet(r5, &(0x7f0000000100)={0x2, 0x0, @remote}, &(0x7f0000000240)=0x10) setsockopt$sock_void(r6, 0x1, 0x24, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000380)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f0000000200)={0x0, 0x3800000000}, 0x8) getsockname$netlink(r1, &(0x7f0000000040), &(0x7f0000000080)=0xc) 19:05:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000080)="678360f21d74c5d02c3242b923977fc868fbfc9b40c53294ef5e62f79ff7656e019b1dd76b207782dbf2d4032d884832bfd9357c0ec1dbc7b0814f7493b7b871387508b936002afeff9a85778d41152a889d36d25ff9665edd466c1bb42d713df5df2720a6df36ff1e3de51c200d7d7253c7b108bc", 0x75, 0x8020, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = dup(r3) ioctl$PIO_UNISCRNMAP(r4, 0x4b6a, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r4, 0x6431) sendmmsg$alg(r2, &(0x7f0000005400)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="9e", 0x1}], 0x1}], 0x1, 0x0) [ 236.744542][T11087] debugfs: Directory 'vcpu0' with parent '11087-4' already present! [ 236.951601][T11060] device hsr_slave_0 entered promiscuous mode [ 237.019648][T11060] device hsr_slave_1 entered promiscuous mode [ 237.039013][T11060] debugfs: Directory 'hsr0' with parent '/' already present! [ 237.171604][T11060] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.183622][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.191608][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.227811][T11060] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.239126][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.248068][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.256964][T10802] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.264086][T10802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.273954][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.318236][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.328011][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.336967][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.344685][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.352977][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.361840][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.370554][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 237.379111][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.387736][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 237.398401][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 237.407976][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.448457][T11060] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 237.460194][T11060] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 237.472747][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.481802][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.490193][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 237.533747][T11060] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 237.570061][ T60] device bridge_slave_1 left promiscuous mode [ 237.576388][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.630700][ T60] device bridge_slave_0 left promiscuous mode [ 237.637409][ T60] bridge0: port 1(bridge_slave_0) entered disabled state 19:05:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) dup(r0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, 0x0, &(0x7f0000000140)=""/1}, 0x18) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80800, 0x0) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f0000000080)={0xfffffffffffffc7b, 0x8}) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000001c0)={r2, 0x6, 0xffffffffffffffff, r2}) 19:05:19 executing program 4: mmap(&(0x7f0000000000/0xfd4000)=nil, 0xfd4000, 0x1, 0x40000000000032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfc1000)=nil, 0xfc1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fc1000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000a20000)={0x8, 0x0, &(0x7f0000fc1ffc)=[@decrefs={0x40106308}], 0x0, 0x0, 0x0}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) 19:05:19 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvmmsg(r0, &(0x7f0000003540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x10000, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f0000000100)={{0x10000, 0x3, 0x7f, 0x6, 'syz0\x00', 0x4}, 0x0, [0x3, 0x9, 0x80000001, 0x8, 0x2, 0x1ff, 0x9, 0x81, 0x8000, 0xfffffffffffffff7, 0x2f0, 0x200, 0xffffffff80000000, 0x1400000000000, 0xfffffffffffffff7, 0x4b, 0x4, 0x8, 0xff, 0xfffffffffffffff8, 0x4, 0xfffffffffffffff9, 0x4, 0x6, 0x7f, 0xdd7f, 0x100000001, 0xff, 0x2, 0x7, 0xad8a, 0x8, 0x8000, 0xfffffffffffffffe, 0x5, 0x3ff, 0x9, 0x7, 0x9, 0xc24d, 0xb818, 0x4, 0x8000, 0xfffffffffffff800, 0x8, 0x2, 0x7fffffff, 0x9, 0xffff, 0x1, 0xffffffffffffff00, 0x1, 0x2837, 0x2, 0x38df, 0x4, 0x8, 0xfffffffffffffffc, 0x7d1, 0x0, 0xfff, 0x4, 0x100, 0x6, 0x9, 0x9a1, 0xfff, 0x10000, 0x1, 0x80000001, 0xef4, 0x8402, 0x2, 0x81, 0x0, 0x8eb9, 0x10000, 0xffff, 0xfffffffffffffffe, 0x4, 0xffffffffffffff7f, 0x7, 0x6, 0x7, 0x1, 0x2, 0x200, 0x0, 0x2, 0x81, 0x9, 0x9, 0x4, 0x800, 0x4f, 0x9, 0x9, 0x81, 0x4, 0x4f6a, 0x7, 0x7, 0x7e, 0x80, 0xca64, 0x5, 0x0, 0x1, 0x77e, 0x2, 0xffffffffffffef7b, 0xffffffffffffffe1, 0x74, 0x9, 0x4, 0x9, 0x70c2, 0x8, 0x100000001, 0x401, 0x6, 0x5, 0x2, 0x2, 0x6d74ecb3, 0x8000, 0x1, 0x88a]}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000740)={&(0x7f0000000680)={0xbc, r4, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffffa}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x400}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100000001}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffffffffffffffa7}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3f}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xb5b4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x17c}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfaf}]}, 0xbc}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) bind$bt_rfcomm(r3, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x9}, 0xf) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x0) 19:05:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r2, 0x0, 0x8801) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000840)={0x0, 0x3, 0x3, [0x2, 0x10001, 0xc77a]}, &(0x7f0000000880)=0xe) r3 = socket$inet6(0xa, 0x4, 0x6) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = accept$inet(r5, &(0x7f0000000100)={0x2, 0x0, @remote}, &(0x7f0000000240)=0x10) setsockopt$sock_void(r6, 0x1, 0x24, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000380)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f0000000200)={0x0, 0x3800000000}, 0x8) getsockname$netlink(r1, &(0x7f0000000040), &(0x7f0000000080)=0xc) 19:05:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x165881) ioctl$LOOP_SET_STATUS64(r0, 0x127f, &(0x7f0000000000)={0xa00, 0x60000, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "abb4291ede5e270d0cf0a272133483bbf2df4849c6faf88a21befeff8b0000000000000000f800000000008000000800000400000000bda5282df52a4cdf00", "141f99c942e1460e4000000049d5d1f8efaf6bb5b3000000000000000000000008f6ffffff00defffffdffa531ff0000000000000000000000804000", "be926e81f06197ab930d0061bd00"}) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000240)="f9f68e158b9433c2afb4c083b241c8364d670f1f54301fa4e47662e365aa77967b7438220bfb7bc61e2ea3f86d8fa90af0c5d18b581019647551fce88c8f1786942cfa3f61e918d169b97e1630a9f64d241588d1df5ceaa39d682a1eaa2a9766dee776789de44cc2a621b82d4b502ff24a7a9ba9938673fb55ad62ecbdb38a6e25595ac6de1eac1d3e2a5e7a175e0100e1914b1a72b70d828507543319cc7b4adc45b52ecaeabe8125c00ce32603087da89b73edb2f79332f6") close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = dup(r1) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x401, 0x100000000, 0x0, 0xa, 0x2, 0x10, "60d7593988fe0b1b75e7abd0b0594902ae5417daefd7c60e39f6cef54ebc2cc40d557e1b357e8676e3ef615d4983472a2332328393f979586e65576ad3d3947e", "47e506b218e3ac25367d251bebfc87112d8476a3c567837020598d5f01c6eb5ee96a528443e8c2855b6df50affedcc93635a0ddad2d9fe36985fd88e4daad7d7", "b017aaeffb69a2abc7b19d28b63ad8a4de31fbdc1a2b490c48ee15b386e024ad", [0x8001, 0x9]}) 19:05:19 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0xe800) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x229, &(0x7f0000000100)={&(0x7f0000000000)={0x18, 0x32, 0x100, 0x0, 0x0, {0x2804, 0x1000000}, [@nested={0xffffffffffffff6c}]}, 0x18}}, 0x0) 19:05:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYRES16=r0, @ANYRES32=r2, @ANYRES16], 0x3}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x40, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x14, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}, @TCA_HHF_QUANTUM={0x8}]}}]}, 0x40}}, 0x0) r5 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="230000005e007df4de081081aee41474b79c05000f02000012a3e790030000000000d5", 0x23}], 0x1}, 0x0) [ 238.054913][ T26] audit: type=1400 audit(1568487919.680:52): avc: denied { map_read map_write } for pid=11142 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 19:05:19 executing program 4: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x20000) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0x4000000000000) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) stat(0x0, 0x0) getresgid(&(0x7f00000004c0), &(0x7f00000007c0), 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000640)=ANY=[], 0x0) r2 = perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xa, 0x0, 0x2, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5e45, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x0, 0xc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xffb0, 0xe, 0x0, 0x1d) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000100)={'#! ', './file0', [{0x20, 'vmnet1^('}, {0x20, 'wlan0:wlan1&mime_type'}], 0xa, "1afac8484d153d44d00359f36df9fa35059b0cfe72dd272f5f856b3f456f021c00d911db9869d4"}, 0x51) 19:05:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000700)=ANY=[@ANYBLOB="2000005d3cbdadff233c9d000000000002000000000000000000000015000100"], 0x20}, 0x1, 0x0, 0x0, 0x8084}, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x8000, &(0x7f0000000000)=0xa4d4, 0x8000, 0x5) socket$inet_udplite(0x2, 0x2, 0x88) 19:05:19 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback, 0x1}, 0x10) syz_extract_tcp_res(&(0x7f0000000040), 0x7, 0x7) [ 238.328876][T11164] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48444 sclass=netlink_route_socket pig=11164 comm=syz-executor.3 19:05:20 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x3, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = dup(r1) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, 0x0) connect$bt_sco(r2, &(0x7f0000000040)={0x1f, {0x40, 0x8, 0x3, 0x3, 0x280000, 0x28cea769}}, 0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000200)={0x8098f90a, 0x0, "9c6ebc48978e357c4b1b409a68962401009a27daa6ab637acc4af6a7a0c8d404", 0x0, 0x0, 0xfffffffffffffffd}) write$P9_RLOCK(r0, &(0x7f0000000000)={0x8, 0x35, 0x1, 0x1}, 0x8) 19:05:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r2 = userfaultfd(0x800) fsetxattr$security_selinux(r2, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:watchdog_device_t:s0\x00', 0x27, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = dup(r3) ioctl$PIO_UNISCRNMAP(r4, 0x4b6a, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r4, 0x80044326, &(0x7f0000000180)=0x9) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r5, 0x2, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 19:05:20 executing program 0: r0 = socket(0x2000000000000025, 0x1, 0x0) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}], 0xe1, 0xe0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x9, 0x900200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x68, r3, 0x457e44295867a64f, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-\x14ink\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20048}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r3, 0x714, 0x70bd28, 0x25dfdbfb, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x1}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4004}, 0x24008006) 19:05:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x1, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000280)={0x0, 0x2a, 0x4, 0x15, 0x3, 0x9, 0x4, 0x1ff, 0xffffffffffffffff}) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000002c0)={0x2, 0x4c, 0x20, 0x10000, 0x6}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000080)=0x100, 0x4) r2 = socket$inet6(0xa, 0x800, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f00000003c0)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000005806000018020000580300000000000070050000700500007005000004000000", @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000be16ecb400000000000000000000000000000000000000000000002b1ab5790f7d6213a27e2ea925927f7220421b4fb92d3c1ceb3127ba07835d9abe05b527a0f1ce4c327ae6aa91f86998d0b43c665f2ef330f5fef0b4d39290baa5356053490497821e07238dca7e9cc004e616e07724929e11c0822b5e7fe91168452e8f518ff993b95fb7d6cc7dc66b59875a96b5d826fd137b8f791b1940b5d68f05bdfdeb2c05026f8a03a746de877715390c95cbcb2ebfeed2dd75c8c1120000"], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0001802000000000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000010000000600000073797374656d5f753a6f626a6563745f723a7075626c69635f636f6e74656e745f743a7330000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c6500000000000000000000000000000000000000000000000000000000000000000000000000000000b660b5f9814b0000000000000000000000000000ac14141c0800000001000000ac1414bb0000000000000000ffffffffffffffffffff00000000000000000000000000000000000000810000feff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff8000000000000000000000fc340000392e00810000000376657468305f746f5f7465616d00000076657468305f746f5f6873720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000120000000000000000000000f0001802000000000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000010000000900000073797374656d5f753a6f626a6563745f723a73656e646d61696c5f657865635f743a7330000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x6a8) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, 0x0, &(0x7f00000000c0)) [ 239.069384][T11186] Unknown ioctl 1076129799 [ 239.126696][T11189] Unknown ioctl 1076129799 19:05:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000700)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1829442}, 0xc, &(0x7f00000006c0)={&(0x7f0000000340)={0x37c, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xb0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1000}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'bond_slave_1\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xfff, @ipv4={[], [], @rand_addr=0xbe}, 0x67535696}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x4, @remote, 0x8}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20000000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER={0x88, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x67db0d53}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb417}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6ed6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffffaa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc8f}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc21e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7d7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA={0xec, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5a}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7a10}]}]}]}, 0x37c}, 0x1, 0x0, 0x0, 0x4000}, 0x24000801) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff27}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600203f00000a0000000000f5ffef0400e50000070000001f000000000000250019000000000200010000000000000000020000627c05000500000000000a00000000000000ff17000000000000000000080000000000000041be000000"], 0x80}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0xc9, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqsrc(r3, 0x0, 0x69, &(0x7f0000000000)={@local, @remote, @multicast1}, &(0x7f0000000080)=0xc) [ 239.469375][ T60] device hsr_slave_0 left promiscuous mode [ 239.508958][ T60] device hsr_slave_1 left promiscuous mode [ 239.574261][ T60] team0 (unregistering): Port device team_slave_1 removed [ 239.585635][ T60] team0 (unregistering): Port device team_slave_0 removed [ 239.595634][ T60] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 239.645233][ T60] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 239.702717][ T60] bond0 (unregistering): Released all slaves 19:05:21 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = dup(r1) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, 0x0) ioctl$IMGETCOUNT(r2, 0x80044943, &(0x7f0000000000)) socket$kcm(0x2, 0x2, 0x73) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @local}, {0x2, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1200000000000000, 0x0, 0xf000000, 0xfd000000]}}}}, 0x48) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = dup(r3) ioctl$PIO_UNISCRNMAP(r4, 0x4b6a, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = dup(r5) ioctl$PIO_UNISCRNMAP(r6, 0x4b6a, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e24, @loopback}, 0x2af) [ 240.194162][T11215] IPVS: ftp: loaded support on port[0] = 21 [ 240.272902][T11215] chnl_net:caif_netlink_parms(): no params data found [ 240.302759][T11215] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.309926][T11215] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.317454][T11215] device bridge_slave_0 entered promiscuous mode [ 240.325292][T11215] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.332452][T11215] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.340385][T11215] device bridge_slave_1 entered promiscuous mode [ 240.356206][T11215] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 240.366744][T11215] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 240.383853][T11215] team0: Port device team_slave_0 added [ 240.390695][T11215] team0: Port device team_slave_1 added [ 240.470605][T11215] device hsr_slave_0 entered promiscuous mode [ 240.539341][T11215] device hsr_slave_1 entered promiscuous mode [ 240.599075][T11215] debugfs: Directory 'hsr0' with parent '/' already present! [ 240.619892][T11215] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.627079][T11215] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.634420][T11215] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.641624][T11215] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.672237][T11215] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.684844][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.694559][T10802] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.702429][T10802] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.713433][T11215] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.724381][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.732746][ T3014] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.739876][ T3014] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.750729][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.759317][T10802] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.766357][T10802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.822573][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.839122][T10795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.880048][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.890163][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.898462][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.907150][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.915493][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.923793][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.932053][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.940361][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.948496][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.956889][T11215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 240.997982][T11215] 8021q: adding VLAN 0 to HW filter on device batadv0 19:05:22 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = dup(r1) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) dup(r3) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000080)="dbf096117132affe4612de0832c05d24da62cdcee8241d8811f2c998ca33cb68acf7c73f5b1f91f670bd1e0a92dfc2968635ef80ea7753f8be2964694a8bc5b4dd56ea965e9114673f51a926efc982799a7d18bf0f9aa1", 0x57}], 0x1, 0x1) accept4$alg(r2, 0x0, 0x0, 0x180000) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x10) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000380)={r1, 0x81, 0xc0, "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"}) 19:05:22 executing program 1: perf_event_open(&(0x7f0000000680)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 19:05:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x4, &(0x7f0000000040)=[{0x3, 0x3ff, 0x1, 0x3}, {0x101000, 0x1, 0x4, 0xfcc}, {0x0, 0xf1b, 0x7fff, 0x7}, {0x5, 0x4, 0x8, 0x8}]}) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000300)={r3, @loopback, @remote}, 0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'team0\x00', r3}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000019c0)={'team0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001a80)={&(0x7f0000001a00)=@newneigh={0x48, 0x1c, 0x610, 0x70bd28, 0x25dfdbfb, {0x7, 0x0, 0x0, r4, 0x22, 0x18, 0x1}, [@NDA_DST_MAC={0xc}, @NDA_MASTER={0x8, 0x9, 0x1}, @NDA_IFINDEX={0x8, 0x8, r5}, @NDA_VNI={0x8}, @NDA_MASTER={0x8, 0x9, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0xc020001) r6 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000003740)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_DOWNDELAY={0x8, 0x1b}]}}}]}, 0x3c}}, 0x0) 19:05:22 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xac8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x121040) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x8a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$VIDIOC_S_PARM(0xffffffffffffffff, 0xc0cc5616, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x91, 0x2000000000002) 19:05:22 executing program 5: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x301000, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000100)=r1, 0x1) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r2) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x1001, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, r3, &(0x7f0000000380)='asymmetric\x00i\x8dRT\xcc|\rO\xe2\xbe\x95\xe2\x80}5y\xd6\xda1\xbd\x15\xddH_\xed\xe3\xae\x0e\x14\xc1\x87$\xae&\x90cPh\xb1,\x93[D\xd7\x88\x9dI^AD\xf4[3\xe17\xfa\x05\xc7\x16\x1c\x02G\xa8z\xd3\xda\xc1\xd01\x87\xbf\xdf\xe6)\\=\xc2\x15\x7fu\xf1n\xba\xb8\xdc\x80\x0f\xf8m@\xb2\x88\xce+\vXKa\xaeK\xed\x89<\x84_a\x8e\x82\x15\x9d\x9d^\x99\xa6\xbd\xbd\v\xd6\x1d\x80%#}\xaeDZa\xb9\x01\xff\xca\xf5\xc5\\F)F]\xc0\xfe\xd9\xff\xc79\x86\x01\xf9\xf1\x00\x80\x00\x00\x00\x00\x00\x00\x19@\xd7\x1ds\b4\x98U\x17Od\xaa\x98\x1cu\x13\x1c<\x01 \xe5\xf6\x8b\xe6C\x99\xe4\xc5\xf5v\x98{\xce\xc40N\x03\xcb\xffh\xf2h0xffffffffffffffff}, 0x400) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x1ff}]}, 0x10) 19:05:23 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x18440, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r3, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'vcan0\x00'}}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x18, r3, 0x0, 0x70bd2c, 0x0, {}, [@TIPC_NLA_MON={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r3, 0x8, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24004880}, 0x4000000) r4 = socket(0x1, 0x1, 0x0) getsockopt$sock_int(r4, 0x1, 0x3, 0x0, &(0x7f0000000140)) [ 241.323378][T11244] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 19:05:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') lseek(r0, 0x0, 0x2) syz_mount_image$nfs4(&(0x7f0000000080)='nfs4\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="adcb5b68ce39320233054b4e6ee31a6caa5108ffd235c006c5a18d2b931df62fa239328fb973563c9f8103ee9cbea0995a64669e14913af6ca761f30d38fedc1250a7fc2d0be224c9c3a5978d79bc74db0bc22203c388ce951976168fe38f2d5417f3960039684d0f557c0bb7b44978bb76eb045e371f783c681ed6898b70fbc7cc79759dec8caf88c85ce78", 0x8c, 0x20}], 0xdabbe32aaeb7e0a8, &(0x7f0000000140)='oom_score_adj\x00') symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') [ 241.382535][T11244] (unnamed net_device) (uninitialized): option tlb_dynamic_lb: mode dependency failed, not supported in mode balance-rr(0) 19:05:23 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000000)=0x800, 0x4) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x80000, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @dev, @initdev}, &(0x7f0000000100)=0xc) sendmsg$FOU_CMD_GET(r2, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r3, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x62}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x34}}, 0x4) 19:05:23 executing program 1: r0 = socket(0x15, 0x80005, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x5, 0x404c00) r2 = dup(r1) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="09200020f60000006c650cf349af864d71ac88b8956e6d4c5608a07f78652b25d994b408fc3a6c2ec067479b119232001353d918a351d8232d4b9e7c912d6db807805c2f2e9fc15b"], 0x10) socket$vsock_dgram(0x28, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x3000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0xfffffdfffffffffe}, 0x1c) 19:05:23 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f0000000400)='./file0\x00', 0x0) setgid(0x0) r0 = syz_open_dev$usbmon(0x0, 0x8001, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r4, r2, 0x0) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x10000, 0x7, &(0x7f0000001780)=[{&(0x7f0000000180)="c105a58c50779578022683d7c5b3ed392994cfb23c6ba43d73af63858314e7a3f30ab3104eb5cab302a2cee20b4f473461b4", 0xfffffffffffffe00, 0x10001}, {&(0x7f00000001c0)="cff9110105388173af86a77794936f63efe5eb0465af46573dbb1646d31ecae90df13e8d396f72d2fab83b38ccadff50d72a641f6ba448eb15f720889613471ce00a03bd30d51c128a5f180c2e70ba7e8760cc66208867301c7a86e536384ea3f090c03b99a3f44e795eeabfee902201cedf3af0a63ef66e4b9dcb4a58934b4c79a92da1177419ae7c765b8e4524531a0526528ef2c0a9a7dc5999b28d7c47011f05b1e40dce55143ef00111e9a9e87b4a3ee016d284976308f8bed64453ce350d8750186ce44bfb1914370d2a892bed699c57fb934ca3d19ac9b1f4c1cc425065ea2e10ef8441", 0xe7, 0xd817}, {&(0x7f00000005c0)="56f96ce0c0f9633fab41a51150df1dae98a60cb17b78f54223234a7421fb94b62e47405f585a3219cb69864fadc657e6cb073c6e1e9095a25a7567c13c73b4dd62fc37e2a5654c188429495b52b44c68df2d022f183dfdbdab23d7c652601d1270297aad4a63df219e453dce5560c3636c646bc3417425dbb2d13464fedb50bbec2809d3d6f6827ea9382dd2ab8eac20e73ac2dbfffd34ed2bf6dd75897befb2dbbd5a8acb564dfe79492a04c4ed74698cf0a284faa0725379ca851d6a09272a8574b4ccf1a2b1794979e98570362b066100520b1080b4a05a27d57c45a4778dc0b01c03", 0xe4, 0x17aa}, {&(0x7f00000006c0)="d74d9ddf044326971bb6198c79dcfecc2c8287efb84e3ae62d4b4c4003bff290acc474006d0bef6caf624fa43b96b93b0543083f5012a1d1c40f280bbff524cadf8e61084505e4aaa9ae446badd3858b0bd40531d03dd1cc014698e91724c2f7c8c406f04195b6b401e3382beb2a34bf9baf148fb605678b15351367b5ad22592f137661fc20f9e9879832d9ac314546af68d213b11a7e303b2286f0fe4e0bcc8f482598", 0xa4, 0x2ce}, {&(0x7f00000002c0)="2282b9104052de0bc614f55575c10a25926985f2700b92779d56b5650ba8bae4824c4d41cfad790ab4161af9", 0x2c, 0x1345}, {&(0x7f00000018c0)="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", 0x1000, 0x8001}, {&(0x7f0000000380)="580d9a6fe7ed37663b42", 0xa, 0x80}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='max3,dont_hash,hash,fowner=\x00'/42, @ANYRESDEC=r4, @ANYRES16]) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$usbmon(0xffffffffffffff9c, 0x0, 0x800, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000480)='./file0\x00', &(0x7f0000001840)='trusted.overlay.nlink\x00', &(0x7f0000001880)={'L+', 0x1}, 0x28, 0x3) setsockopt$packet_buf(r0, 0x107, 0x5, &(0x7f00000004c0)="4bac66a951d4286c5da0e4b6abf0321da6ebd8d588edd0284748fec8a07e84f57bf485fa331351a6d86cb7e94cea977a3fd22411182a57a87fd891f72c467da582614af3c3990560a60f344062d1339e59bd08d9c6a4af199d592df36be2d79690823359b007e8cb327777de15681f204d88b81e76a5e9430eb2b312b578dce9a41546572009736ac2537a4e6072f70a1fe2307800f20708dc82248476361ff429c40d3e1a06dc402d9652cdd6404db5e996f2aa961db4ddae55efd86d319ccd0ba07394219e33a9f15d72fc15a5304ef5fc44028c38231e9a6e6d43e4585f0c239c06924813a7867662ad1cdbd9039b265ee835063521c8", 0xf8) r5 = socket$inet6_udp(0xa, 0x2, 0x0) write$smack_current(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x481, 0x80, 0x6, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = dup(r6) ioctl$PIO_UNISCRNMAP(r7, 0x4b6a, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r7, 0x541b, &(0x7f0000000440)) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f0000000340)={@local}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x4612}) 19:05:23 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x2) getsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) write$P9_RFSYNC(r0, &(0x7f00000000c0)={0x7, 0x33, 0x2}, 0x7) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r4, 0x80404506, &(0x7f00000001c0)=""/191) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="200000f7", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000000)={r5}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={r5, 0x42c0, 0xdb67ec1e40f4a70d}, &(0x7f0000000140)=0xc) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = dup(r6) ioctl$PIO_UNISCRNMAP(r7, 0x4b6a, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r7, 0x40605346, &(0x7f0000000280)={0x4b78, 0x1, {0x3, 0x2, 0xfffffffffffffff8, 0x3, 0x7}}) [ 241.841638][ T26] audit: type=1400 audit(1568487923.450:56): avc: denied { map } for pid=11231 comm="syz-executor.3" path="/dev/nullb0" dev="devtmpfs" ino=1849 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=blk_file permissive=1 [ 241.999976][ T26] audit: type=1326 audit(1568487923.540:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=11230 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c72a code=0x0 19:05:23 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\xf2', 0x5, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000006c0)={0x67, @rand_addr=0x8000, 0x4e24, 0x0, 'wlc\x00', 0x22, 0xca09, 0x1e}, 0x2c) pwritev(r1, &(0x7f00000005c0)=[{&(0x7f0000000100)="3a571c9aa942770862c96293c54903e55e2d352247d135f9f386f8202aff20233b3553ca1c3bff441faed9e16a7568d7eb5aedad44012e1142a608904c0fdf3b738c4db904c0b719f67ae3cb31548efb742b9d", 0x53}, {&(0x7f0000000180)="c3a2c6699749dbdd", 0x8}, {&(0x7f00000001c0)="3362fdbd1a529631f3cc6b403e31c2de1e966b7780becc3a9295550680c66bd89dad9afdad450719dec0e328d5f25fbe9181fd23bc0f34a3b03228f55b4402a8914b197edbb20860275a89386969698378d019c79c2f19c5ed60d1799f2e5a33c38e61e8cd6169d2a4b0488b5b09a60f0ca4fa485cd583d0763282f2792ee97ecdbdd19fed1dd6a9363baf0051e595aee7db9987df12289fb3d495f8ef5f687701585df4deb889c77d07eccd92126e4afcc1a00d56748175ffe7110ec709e6ffd8fea5d2c25896efa0d0c7e03af42b9bc69bed16a327b69cb41ad533df2e53e431b23c30b9f06b5cfc3a20315e6ec375df191f69fa23", 0xf6}, {&(0x7f00000002c0)="8823fd17165437e1c9c249f7850af55773570ae41e3bcc4eaf9e091a578633d7c93fcb598646b9632c3c1ab786c971ffe36654b4b863", 0x36}, {&(0x7f0000000300)="28ac83f8355d14a56b03970491ffc078261db7e4ea02d5a22ca821b45884fbf4ba341ca48b3a373e4cf0972a2bb2f79274f10a03ec6c6ed05cb31fb59da3918d9e43bb06c6dfaf3e002116144cb18f0127a8314a85f5725e19dc906d2df5b8c516a5547eb8fb9510c55d167445b99e59f285e8c90f0d4c3cb474a4d3e8c49efec95e1c87fb5f3376cfcb767577638b29682c4297d35f021f91", 0x99}, {&(0x7f00000003c0)="a128544cae04b19d378272c4f59045a39affd793adc046be0adaeca0112a92bdfad20edc67ec57cfcbe01c2b26663db1a81a927ac262e003864f20", 0x3b}, {&(0x7f0000000400)="01fc75816d0310937ff17891ed779d562a075a701f18cbd9095e77350db834b4343071a1a710703d49c9c86f7a8f2f7534f02bf0b62a9ee9639deeaf40dfd6bf919378bc9cc54c2ee059aa54991f7d0a93d3aa8be6f9b1d586b3d57f07a27e8a225a0949496309f5b0d63e7e", 0x6c}, {&(0x7f0000000480)="dc7a8a8e3a512b8a4c88c220a59f9267d61376d2de328d25e4b866ee36279a5475219215be40d244f1575ddedf561e482ec77ff8be8ab8218eb5028ffd6d1db654a2ff06ab53ffe697bf8559a0107b012ad51c8583088571c502c6674a9285120bf12fba6ee625eb9c2287476dbd22c54675da5282da701a8dd36f5ebeaf8198018afa34fb2b6bd046a4e09648e809f9b878acfca5dc328719d66279863632d91576e7fc4e8012d6d2ec15e11961b558d84b55a3210c0d2e6f00bffa2b50e3ec13e28715a253e4412a2db425c5aa9bc18de4f7660b09d6", 0xd7}, {&(0x7f0000000580)="e95b253863ddeed6e5ca5a85", 0xc}], 0x9, 0x0) ioctl$int_out(r0, 0x100810090804520, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000680)=""/45) r2 = syz_open_dev$media(&(0x7f0000000700)='/dev/media#\x00', 0xffffffffffffffea, 0x12c40) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000740)=0x3f, 0x4) [ 242.311773][T11233] syz-executor.3 (11233) used greatest stack depth: 22760 bytes left [ 242.878161][T11316] SELinux: policydb string length 1912602632 does not match expected length 8 [ 242.892341][T11316] SELinux: failed to load policy [ 347.098821][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 347.105743][ C0] rcu: 0-....: (1 GPs behind) idle=50a/1/0x4000000000000004 softirq=13362/13365 fqs=5230 [ 347.115700][ C0] (t=10500 jiffies g=15613 q=2227) [ 347.121003][ C0] NMI backtrace for cpu 0 [ 347.125313][ C0] CPU: 0 PID: 11277 Comm: syz-executor.2 Not tainted 5.3.0-rc8+ #0 [ 347.133321][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.143448][ C0] Call Trace: [ 347.146714][ C0] [ 347.149627][ C0] dump_stack+0x172/0x1f0 [ 347.154024][ C0] nmi_cpu_backtrace.cold+0x70/0xb2 [ 347.159233][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 347.165487][ C0] ? lapic_can_unplug_cpu.cold+0x45/0x45 [ 347.171105][ C0] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 347.177070][ C0] arch_trigger_cpumask_backtrace+0x14/0x20 [ 347.182950][ C0] rcu_dump_cpu_stacks+0x183/0x1cf [ 347.188265][ C0] ? find_next_bit+0x107/0x130 [ 347.193024][ C0] rcu_sched_clock_irq.cold+0x4dd/0xc13 [ 347.198561][ C0] ? raise_softirq+0x138/0x340 [ 347.203324][ C0] update_process_times+0x32/0x80 [ 347.208342][ C0] tick_sched_handle+0xa2/0x190 [ 347.213172][ C0] tick_sched_timer+0x53/0x140 [ 347.217927][ C0] __hrtimer_run_queues+0x364/0xe40 [ 347.223117][ C0] ? tick_sched_do_timer+0x1b0/0x1b0 [ 347.228397][ C0] ? hrtimer_start_range_ns+0xcb0/0xcb0 [ 347.233957][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 347.239663][ C0] ? ktime_get_update_offsets_now+0x2d3/0x440 [ 347.245850][ C0] hrtimer_interrupt+0x314/0x770 [ 347.250976][ C0] smp_apic_timer_interrupt+0x160/0x610 [ 347.256530][ C0] apic_timer_interrupt+0xf/0x20 [ 347.261514][ C0] RIP: 0010:hhf_dequeue+0x506/0xa20 [ 347.266708][ C0] Code: 00 0f 85 35 04 00 00 4c 89 f8 4c 89 7b 08 48 c1 e8 03 42 80 3c 20 00 0f 85 12 04 00 00 49 89 1f e9 4b fb ff ff e8 7a 05 ac fb <48> 8b 45 b8 4c 8b 75 c8 42 80 3c 20 00 0f 85 3a 04 00 00 49 8b 85 [ 347.286466][ C0] RSP: 0018:ffff8880ae809518 EFLAGS: 00000206 ORIG_RAX: ffffffffffffff13 [ 347.294868][ C0] RAX: ffff88804f266380 RBX: ffff88809b5f62f8 RCX: ffffffff85c670f9 [ 347.302830][ C0] RDX: 0000000000000100 RSI: ffffffff85c66f86 RDI: ffff88809b5f6300 [ 347.310925][ C0] RBP: ffff8880ae809568 R08: ffff88804f266380 R09: 0000000000000000 [ 347.319007][ C0] R10: fffffbfff134afaf R11: ffff88804f266380 R12: dffffc0000000000 [ 347.327158][ C0] R13: ffff88809b5f6000 R14: ffff88809b5f6380 R15: ffff88809b5f6390 [ 347.335420][ C0] ? apic_timer_interrupt+0xa/0x20 [ 347.340530][ C0] ? hhf_dequeue+0x679/0xa20 [ 347.345116][ C0] ? hhf_dequeue+0x506/0xa20 [ 347.349697][ C0] ? hhf_dequeue+0x506/0xa20 [ 347.354348][ C0] __qdisc_run+0x1e7/0x19d0 [ 347.358862][ C0] ? dev_queue_xmit+0x18/0x20 [ 347.363606][ C0] __dev_queue_xmit+0x16f1/0x3650 [ 347.368798][ C0] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 347.374310][ C0] ? __ip6_finish_output+0x444/0xa50 [ 347.379908][ C0] ? ip6t_do_table+0xd75/0x1c80 [ 347.384782][ C0] ? lock_downgrade+0x920/0x920 [ 347.389623][ C0] ? lock_acquire+0x190/0x410 [ 347.394283][ C0] ? __ip6_finish_output+0x444/0xa50 [ 347.399577][ C0] dev_queue_xmit+0x18/0x20 [ 347.404109][ C0] ? dev_queue_xmit+0x18/0x20 [ 347.408795][ C0] ip6_finish_output2+0xf58/0x2520 [ 347.413958][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 347.420343][ C0] ? ip6_forward_finish+0x530/0x530 [ 347.425778][ C0] ? ip6_mtu+0x16f/0x460 [ 347.430397][ C0] __ip6_finish_output+0x444/0xa50 [ 347.435532][ C0] ? __ip6_finish_output+0x444/0xa50 [ 347.440826][ C0] ip6_finish_output+0x38/0x1f0 [ 347.445834][ C0] ip6_output+0x235/0x7c0 [ 347.450172][ C0] ? ip6_finish_output+0x1f0/0x1f0 [ 347.455270][ C0] ? __ip6_finish_output+0xa50/0xa50 [ 347.460586][ C0] ? ndisc_send_skb+0x803/0x1450 [ 347.465504][ C0] ndisc_send_skb+0xf29/0x1450 [ 347.470334][ C0] ? nf_hook.constprop.0+0x560/0x560 [ 347.475598][ C0] ? memcpy+0x46/0x50 [ 347.479559][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 347.485779][ C0] ndisc_send_rs+0x134/0x6d0 [ 347.490523][ C0] addrconf_rs_timer+0x30f/0x680 [ 347.495449][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 347.500364][ C0] ? ipv6_get_lladdr+0x490/0x490 [ 347.505289][ C0] ? lock_acquire+0x190/0x410 [ 347.509945][ C0] call_timer_fn+0x1ac/0x780 [ 347.514509][ C0] ? ipv6_get_lladdr+0x490/0x490 [ 347.519699][ C0] ? msleep_interruptible+0x150/0x150 [ 347.525058][ C0] ? trace_hardirqs_on+0x67/0x240 [ 347.530061][ C0] ? __kasan_check_read+0x11/0x20 [ 347.535060][ C0] ? ipv6_get_lladdr+0x490/0x490 [ 347.539976][ C0] ? ipv6_get_lladdr+0x490/0x490 [ 347.544892][ C0] run_timer_softirq+0x697/0x17a0 [ 347.549906][ C0] ? add_timer+0x930/0x930 [ 347.554309][ C0] ? kvm_clock_read+0x18/0x30 [ 347.559223][ C0] ? sched_clock+0x2e/0x50 [ 347.563624][ C0] ? sched_clock_cpu+0x1b/0x1b0 [ 347.568815][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 347.575310][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 347.581525][ C0] __do_softirq+0x262/0x98c [ 347.586011][ C0] ? sched_clock_cpu+0x1b/0x1b0 [ 347.590842][ C0] irq_exit+0x19b/0x1e0 [ 347.594989][ C0] smp_apic_timer_interrupt+0x1a3/0x610 [ 347.600532][ C0] apic_timer_interrupt+0xf/0x20 [ 347.605448][ C0] [ 347.608368][ C0] RIP: 0010:_raw_spin_unlock_irq+0x54/0x90 [ 347.614183][ C0] Code: c0 60 f4 d2 88 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 33 48 83 3d 75 be 94 01 00 74 20 fb 66 0f 1f 44 00 00 01 00 00 00 e8 d2 8b 10 fa 65 8b 05 03 c8 c3 78 85 c0 74 06 41 [ 347.633771][ C0] RSP: 0018:ffff88804f26f720 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 347.642170][ C0] RAX: 1ffffffff11a5e8c RBX: 0000000000000000 RCX: 1ffffffff134b5ee [ 347.650316][ C0] RDX: dffffc0000000000 RSI: ffffffff8177f15e RDI: ffffffff873e35c8 [ 347.658464][ C0] RBP: ffff88804f26f728 R08: ffff88804f266380 R09: ffffed1012e94fad [ 347.667205][ C0] R10: ffffed1012e94fac R11: ffff8880974a7d63 R12: ffff8880974a7d60 [ 347.675159][ C0] R13: ffffea0001efa880 R14: 0000000000000001 R15: 0000000000000000 [ 347.683125][ C0] ? trace_hardirqs_on+0x5e/0x240 [ 347.688148][ C0] ? _raw_spin_unlock_irq+0x28/0x90 [ 347.693424][ C0] shmem_add_to_page_cache+0xd1a/0x14c0 [ 347.698947][ C0] ? shmem_writepage+0xee0/0xee0 [ 347.703908][ C0] shmem_getpage_gfp+0xeb0/0x2680 [ 347.708918][ C0] ? shmem_unuse_inode+0x1010/0x1010 [ 347.714185][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 347.720412][ C0] ? balance_dirty_pages_ratelimited+0x168/0x1f00 [ 347.726801][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 347.733108][ C0] ? iov_iter_fault_in_readable+0x22c/0x450 [ 347.739025][ C0] shmem_write_begin+0x105/0x1e0 [ 347.743969][ C0] generic_perform_write+0x23b/0x540 [ 347.749252][ C0] ? timespec64_trunc+0x180/0x180 [ 347.754420][ C0] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 347.762504][ C0] ? current_time+0x140/0x140 [ 347.767172][ C0] ? __kasan_check_write+0x14/0x20 [ 347.772385][ C0] ? down_write+0xdf/0x150 [ 347.776902][ C0] __generic_file_write_iter+0x25e/0x630 [ 347.782526][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 347.787472][ C0] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 347.793194][ C0] generic_file_write_iter+0x356/0x620 [ 347.798659][ C0] ? __generic_file_write_iter+0x630/0x630 [ 347.804452][ C0] ? inode_has_perm+0x1b0/0x230 [ 347.809456][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 347.815690][ C0] ? iov_iter_init+0xee/0x210 [ 347.820386][ C0] new_sync_write+0x4d3/0x770 [ 347.825069][ C0] ? new_sync_read+0x800/0x800 [ 347.829839][ C0] ? mark_held_locks+0xf0/0xf0 [ 347.834606][ C0] ? vfs_write+0x485/0x5d0 [ 347.839010][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 347.845318][ C0] __vfs_write+0xe1/0x110 [ 347.850322][ C0] vfs_write+0x268/0x5d0 [ 347.854627][ C0] ksys_pwrite64+0x183/0x1c0 [ 347.859209][ C0] ? __ia32_sys_pread64+0xf0/0xf0 [ 347.864242][ C0] ? fput+0x1b/0x20 [ 347.868047][ C0] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 347.874132][ C0] __x64_sys_pwrite64+0x97/0xf0 [ 347.878979][ C0] do_syscall_64+0xfd/0x6a0 [ 347.883485][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 347.889358][ C0] RIP: 0033:0x413837 [ 347.893247][ C0] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 347.912859][ C0] RSP: 002b:00007fd75022aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 347.921253][ C0] RAX: ffffffffffffffda RBX: 0000000020001790 RCX: 0000000000413837 [ 347.929214][ C0] RDX: 0000000008100000 RSI: 0000000020000180 RDI: 0000000000000006 [ 347.937298][ C0] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 347.945271][ C0] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000006 [ 347.953225][ C0] R13: 00000000004c89b9 R14: 00000000004df918 R15: 00000000ffffffff