Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 37.939575] audit: type=1800 audit(1571625340.848:33): pid=7271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 37.963164] audit: type=1800 audit(1571625340.848:34): pid=7271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 41.758739] audit: type=1400 audit(1571625344.668:35): avc: denied { map } for pid=7447 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.33' (ECDSA) to the list of known hosts. 2019/10/21 02:35:51 fuzzer started [ 48.369122] audit: type=1400 audit(1571625351.278:36): avc: denied { map } for pid=7456 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/10/21 02:35:53 dialing manager at 10.128.0.105:38533 2019/10/21 02:35:53 syscalls: 2516 2019/10/21 02:35:53 code coverage: enabled 2019/10/21 02:35:53 comparison tracing: enabled 2019/10/21 02:35:53 extra coverage: extra coverage is not supported by the kernel 2019/10/21 02:35:53 setuid sandbox: enabled 2019/10/21 02:35:53 namespace sandbox: enabled 2019/10/21 02:35:53 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/21 02:35:53 fault injection: enabled 2019/10/21 02:35:53 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/21 02:35:53 net packet injection: enabled 2019/10/21 02:35:53 net device setup: enabled 2019/10/21 02:35:53 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 02:38:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000c40)={0x14, 0x0, 0x6, 0x1}, 0x14}}, 0x0) [ 185.763063] audit: type=1400 audit(1571625488.668:37): avc: denied { map } for pid=7473 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15027 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 185.848201] IPVS: ftp: loaded support on port[0] = 21 02:38:08 executing program 1: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c0000001400210100000000000010000a000000", @ANYRES32=r4, @ANYBLOB="080008000000000014000200000000000000000000000000000000011400010000f70000000000000000ffffac1e000114000600000000000900"/68], 0x5c}}, 0x0) [ 185.952182] chnl_net:caif_netlink_parms(): no params data found [ 186.009764] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.028021] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.048640] device bridge_slave_0 entered promiscuous mode [ 186.069023] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.075779] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.087459] device bridge_slave_1 entered promiscuous mode [ 186.134142] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 186.143951] bond0: Enslaving bond_slave_1 as an active interface with an up link 02:38:09 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@acquire={0x128, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in=@remote}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x80}}}}, 0x128}}, 0x0) [ 186.182321] IPVS: ftp: loaded support on port[0] = 21 [ 186.189248] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 186.202678] team0: Port device team_slave_0 added [ 186.220388] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 186.229685] team0: Port device team_slave_1 added [ 186.247712] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 186.256634] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 186.331160] device hsr_slave_0 entered promiscuous mode 02:38:09 executing program 3: ftruncate(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000000)=""/250, 0x128b9372) [ 186.387903] device hsr_slave_1 entered promiscuous mode [ 186.426967] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 186.445183] IPVS: ftp: loaded support on port[0] = 21 [ 186.451428] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 186.508563] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.515142] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.522446] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.528900] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.584665] IPVS: ftp: loaded support on port[0] = 21 02:38:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@flushpolicy={0x38, 0x12, 0x4e326d0846e0c13d, 0x0, 0x0, "", [@address_filter={0x28, 0x1a, {@in6=@dev, @in=@empty, 0x2}}]}, 0x38}, 0x8}, 0x0) [ 186.666634] chnl_net:caif_netlink_parms(): no params data found [ 186.797539] chnl_net:caif_netlink_parms(): no params data found [ 186.918983] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.925938] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.933641] device bridge_slave_0 entered promiscuous mode [ 186.942753] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.949558] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.957261] device bridge_slave_1 entered promiscuous mode 02:38:09 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0505405, &(0x7f0000001000)) [ 186.966991] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 186.973342] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.006801] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.009489] IPVS: ftp: loaded support on port[0] = 21 [ 187.028450] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.048407] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 187.094334] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.103319] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.110983] device bridge_slave_0 entered promiscuous mode [ 187.122745] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.130633] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.138900] device bridge_slave_1 entered promiscuous mode [ 187.146966] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 187.161561] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 187.174732] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 187.188007] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 187.201548] chnl_net:caif_netlink_parms(): no params data found [ 187.202318] IPVS: ftp: loaded support on port[0] = 21 [ 187.221451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.229485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.239004] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 187.251276] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 187.258228] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.286445] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 187.305752] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 187.314557] team0: Port device team_slave_0 added [ 187.320382] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 187.327851] team0: Port device team_slave_1 added [ 187.345831] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 187.361578] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 187.369412] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 187.380863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.389270] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.397380] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.403739] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.411743] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 187.419277] team0: Port device team_slave_0 added [ 187.426573] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 187.434027] team0: Port device team_slave_1 added [ 187.444538] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 187.470002] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 187.485915] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 187.550377] device hsr_slave_0 entered promiscuous mode [ 187.586692] device hsr_slave_1 entered promiscuous mode [ 187.628773] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 187.640082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.649507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.657536] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.664037] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.673377] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.679952] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.687581] device bridge_slave_0 entered promiscuous mode [ 187.694943] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 187.712416] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 187.724148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.735262] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 187.742449] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.751152] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.758241] device bridge_slave_1 entered promiscuous mode [ 187.808213] device hsr_slave_0 entered promiscuous mode [ 187.866727] device hsr_slave_1 entered promiscuous mode [ 187.917107] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 187.924645] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 187.934664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.944516] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 187.963141] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 187.973181] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 187.980748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.989241] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.997168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.004811] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.012950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.021101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.043838] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 188.058140] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 188.066746] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.074500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.082590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.128567] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 188.144894] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 188.159508] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 188.165914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.175367] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 188.213300] chnl_net:caif_netlink_parms(): no params data found [ 188.253583] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 188.261413] team0: Port device team_slave_0 added [ 188.267563] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 188.275064] team0: Port device team_slave_1 added [ 188.302081] chnl_net:caif_netlink_parms(): no params data found [ 188.312052] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 188.321586] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 188.340423] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.347731] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.355020] device bridge_slave_0 entered promiscuous mode [ 188.368056] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.374430] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.381552] device bridge_slave_1 entered promiscuous mode [ 188.439574] device hsr_slave_0 entered promiscuous mode [ 188.466706] device hsr_slave_1 entered promiscuous mode [ 188.517129] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 188.524306] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 188.545180] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 188.558345] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 188.578123] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.608864] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.615377] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.622739] device bridge_slave_0 entered promiscuous mode [ 188.638398] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 188.648190] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.658639] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.670754] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.680088] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.687719] device bridge_slave_1 entered promiscuous mode [ 188.707802] audit: type=1400 audit(1571625491.618:38): avc: denied { associate } for pid=7474 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 188.743694] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 188.756805] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 188.765750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.773067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.780896] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 188.800143] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.808654] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 188.818327] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 188.824548] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.851213] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 188.858903] team0: Port device team_slave_0 added [ 188.863799] audit: type=1400 audit(1571625491.768:39): avc: denied { create } for pid=7496 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 02:38:11 executing program 0: madvise(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0xe) ioperm(0x0, 0x8e5, 0x0) clone(0x400000080400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) ioctl(r1, 0x8, &(0x7f0000000200)="1473128742d44fd2f65f2ed5415a5327180681c20c311cb9c3981a849d697db5461cd8da97c2db0a506e275d62a35dbe06f27b96e78b2652f31d36ee77c6bf04f264d47c8d1999c8e5fa8c1bae30f68ddf04f0bf38e64b7977923cb84c6688681d9fde2b1cca2b42af05412f126e1dc670ff06d7530f079f711628e1ad52a6f8043ef39cca66edd252e8a18f30d681ec12d57493810739285b95ec8c266dff5498636a5cfe981e4d983071a4cacd693b33a4e674f36e8768e0ee7a62b5136e68d581c9a6e328f5c797792f58") getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={r3, 0x9}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r3, 0x4}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000080)={r4, @in={{0x2, 0x4e21, @broadcast}}, [0x81, 0x4, 0x7f, 0x80000000, 0x10001, 0xafc, 0xdd3, 0x100000001, 0xecb, 0x6de, 0x0, 0x1, 0x1, 0x203, 0x7]}, &(0x7f0000000180)=0x100) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xffffffff) [ 188.890431] audit: type=1400 audit(1571625491.768:40): avc: denied { write } for pid=7496 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 188.962394] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 188.982210] team0: Port device team_slave_0 added [ 188.985572] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=7500 comm=syz-executor.0 [ 188.990128] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 02:38:11 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffffb1, 0x0, 0x0, 0xfdfc) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/status\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000700)={'raw\x00'}, &(0x7f0000000780)=0x54) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffdb6) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 189.013328] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 189.021620] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 189.023727] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=7500 comm=syz-executor.0 [ 189.037598] team0: Port device team_slave_1 added [ 189.046112] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 189.074231] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 189.089262] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 189.089811] team0: Port device team_slave_1 added [ 189.125971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.139310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.149376] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.155801] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.181732] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 189.192965] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 189.203930] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 189.211932] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 189.219858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 02:38:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r2, r1, 0x0, 0x80000005) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000340)) [ 189.233670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.244194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.261069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.270859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.281066] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.287530] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.298479] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 189.304638] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.314890] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 189.317327] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=7510 comm=syz-executor.0 [ 189.341372] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=7510 comm=syz-executor.0 [ 189.362270] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 189.370745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.384705] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 02:38:12 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000580), 0x4) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x88c40) getpeername$ax25(r1, &(0x7f0000000080)={{0x3, @netrom}, [@default, @null, @default, @remote, @rose, @default, @default, @default]}, &(0x7f0000000100)=0x48) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmmsg(r0, &(0x7f0000002cc0), 0x1a3, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/sctp\x00') r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r4, r3, 0x0, 0x80000005) setsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000340)=0x80000001, 0x4) sendto$inet(r3, &(0x7f0000000200)="2b4477226141896eefbf87e2a958174cd839dc70f6d33f07d1252f684f645304c37dba728a4138c90ea66372d0d90d4d10721cdf721c11840c90e6c853c4d959ba8224be35cd0f25032f6e084093a08e94c40722dc4b633f8a56a141c71fac58a8afff74ffedad9b698bad7af9fa968e5b947eda39b68ce232f13107ee34e8f1b1b11f4f1b034934e98314beb90fb9a15ccc60daa9cc10c2cb761d102f55cb572079aedea20f91853f18a3e1d20ac9c948c586e0bdc5790549adbe312966d1a236c555b09df88185e638b77d64f248c69bb38ca119e07db64704406233e3a66c82cdad", 0xe3, 0x8000, &(0x7f0000000300)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r5, r2, 0x0, 0x80000005) [ 189.408781] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 189.434383] audit: type=1400 audit(1571625492.338:41): avc: denied { create } for pid=7513 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 02:38:12 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="0dbed4a7ac6e6e4cbd1b7fa0de087d79", 0x10) syz_emit_ethernet(0x82, &(0x7f0000000100)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0xe000000], [], {@ipv4={0x800, {{0x18, 0x4, 0x0, 0x0, 0x74, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote, {[@timestamp={0x44, 0x28, 0x5, 0x0, 0xe, [{[], 0x4}, {[@dev={0xac, 0x14, 0x14, 0x28}]}, {[@rand_addr]}, {}, {[], 0x4}, {}, {[], 0x8}]}, @noop, @ssrr={0x89, 0x1b, 0x1f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x12}, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @dev={0xac, 0x14, 0x14, 0xf}, @multicast2]}, @ra={0x94, 0x6}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 189.461886] device hsr_slave_0 entered promiscuous mode [ 189.463886] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=7514 comm=syz-executor.0 [ 189.485365] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=7515 comm=syz-executor.0 [ 189.506799] device hsr_slave_1 entered promiscuous mode 02:38:12 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x183) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x804000, 0x28120001) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x0, 0x9) [ 189.560066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.572368] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.583120] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.589510] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.600659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.609175] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.619414] audit: type=1400 audit(1571625492.528:42): avc: denied { write } for pid=7523 comm="syz-executor.0" path="socket:[27429]" dev="sockfs" ino=27429 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 189.631767] 8021q: adding VLAN 0 to HW filter on device bond0 02:38:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000139ff0)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000340)="d2", 0x1}], 0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="2000000000000000840000100200000007000400ff7f000001000000", @ANYRES32=0x0, @ANYBLOB="18000000000000008400000000000000080001000200a60818000000000000008400000000000000020001000000c70820000000000000008400000008000000fe8000000000000000000000000000bb"], 0x70}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000100)=0x8) [ 189.661869] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 189.670684] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 189.691854] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 189.710523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.722405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.732207] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.742909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.751128] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.757528] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.767872] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 189.778920] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 189.787483] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 189.797219] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 189.804203] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 189.848529] device hsr_slave_0 entered promiscuous mode [ 189.896851] device hsr_slave_1 entered promiscuous mode [ 189.977299] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 189.984746] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.992261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.999158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.005981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.014021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.021667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.029989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.041881] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 190.048296] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.059749] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 190.067014] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 190.076438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.088609] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 190.102913] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 190.112224] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 190.119672] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 190.127572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.135130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.142924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.151449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.159429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.167193] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.173518] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.180926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.191213] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 190.200274] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 190.211828] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 190.220320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.231922] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.239944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.248008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.255516] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.261881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.269438] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.279771] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 190.292987] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 190.300889] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 190.307370] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.314247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.322360] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.330254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.351331] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 190.363471] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 190.370956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.379892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.387760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.406007] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.419525] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 190.430217] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 190.438541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.449454] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.457303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.464786] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.473010] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.482838] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 190.493661] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 190.501672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.510548] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.519696] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 190.525734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.534904] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 190.544328] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 190.551165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.559446] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.570237] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 190.579237] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 190.588070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.595763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.603473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.610457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.619703] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 190.625760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.634003] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 190.640266] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.650064] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 190.671621] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 190.684347] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.691851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.701563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.709624] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.715963] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.723184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.734444] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.745052] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 190.760253] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 190.774776] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 190.791032] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.799211] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 190.805846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.816068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.829351] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.835748] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.844452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.855216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.873648] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 190.880944] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.898047] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 190.911333] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 190.922466] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.929968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.938847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.950780] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 190.960814] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 190.968841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.977493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.985159] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.991552] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.999004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.007113] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.015085] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.022520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.033132] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 191.054860] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 191.068833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.085451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.104644] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.111136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.122300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.130449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.141621] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 191.158315] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 191.165610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 191.173960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 191.187181] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 191.196472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.204179] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.214599] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 191.232818] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 191.239865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.255130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.263524] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.277630] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.285835] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.302178] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready 02:38:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='errors=remount-ro,fmask=00000000000000000000,fmask=0000000000000,gid=', @ANYRESHEX=0x0, @ANYRESOCT=0x0]) 02:38:14 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) geteuid() setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) dup(0xffffffffffffffff) recvfrom$unix(0xffffffffffffffff, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x100000, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) [ 191.319389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.335097] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.375925] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 191.384512] hrtimer: interrupt took 36966 ns [ 191.384809] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 191.401553] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.427962] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 191.437317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.445331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 02:38:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000300)=0x9) r2 = socket$key(0xf, 0x3, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x80000005) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r3, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40100012}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x18c, r4, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x14}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}, @TIPC_NLA_BEARER={0x80, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x64, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e20, @loopback}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x0, @loopback, 0xfffffe00}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x3ff, @rand_addr="1dd21b5853bf41cd0fff6e36ab2b9d3d", 0x9}}}}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2bee98f4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffc}]}]}, 0x18c}, 0x1, 0x0, 0x0, 0x8000}, 0x40) r5 = socket$key(0xf, 0x3, 0x2) dup2(r2, r5) [ 191.469701] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 191.481269] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 191.492137] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 191.511983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.524457] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.539324] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. [ 191.549882] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 191.555944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.582297] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.597582] audit: type=1400 audit(1571625494.508:43): avc: denied { read } for pid=7557 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 191.637841] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 191.691135] 8021q: adding VLAN 0 to HW filter on device batadv0 02:38:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x26, 0xed, 0x1}, 0x20) socket$pppoe(0x18, 0x1, 0x0) dup3(r2, r3, 0x0) io_setup(0x7, &(0x7f0000000340)=0x0) io_submit(r4, 0x400000d8, &(0x7f000049bfe8)=[&(0x7f00004dbfc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x3c6}]) 02:38:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8}]}}}]}, 0x3c}}, 0x0) 02:38:14 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200400, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000000200)=0xe8) sendmsg$kcm(r1, &(0x7f0000000500)={&(0x7f0000000240)=@hci={0x1f, r2, 0x1}, 0x80, &(0x7f0000000480)=[{&(0x7f00000002c0)="f7c3171959e1e19fdb50c6a557bdb1532cf1abc35a901d5e61e4a32e0ccf849e42c27a6087dc113146ca02799d162aabd73f094fa126543f2f74de212972f6f1144c37cec480a443cc41eb5110ca85e5b44570720e7d186379c31afb53dd1e02929d409bfd8dfaa8dea7bc09596394a2aa1359db8fb9bfaf6e277da4d66b99ff2fba422f1c987971df0ff50c073f2e39c1383ea248c3785ed5377c9a8885ca13baf7766af25a160f1ac5faa6bada3e4f1ab4e335d97f3424090c7ba5c6132dc8dc806f37af539ef522c99a735b81fa27d884a8924671df487ef9910c2b103c7726d8509cb53085e76dde2d6de2c287", 0xef}, {&(0x7f00000003c0)="fa811a7b37ee1e7d2bb4e9dc1f723bb04b9648596b0d584827b6a3110cc65606de7aee18d443614c1b3080b4b960897720639f36bc9fa9083c6b818d4aa99cc9df0b8da8d6288274e07c15120764b70a666dbf1f6a6b1201e57f6969021b916092", 0x61}, {&(0x7f0000000440)="2360fb1ab4c05b9a193ec3380c9b0181d22400cfcf2ec0a2f40f84c290f56cf63fdf0a42019f4aa929b38de18ab54ba356e8f798223f", 0x36}], 0x3, &(0x7f00000004c0)}, 0x22040001) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) 02:38:14 executing program 1: sendmsg$rds(0xffffffffffffffff, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/252, 0xfc}, {&(0x7f0000000280)=""/161, 0xa1}, {&(0x7f0000000380)=""/113, 0x71}], 0x3, &(0x7f0000001dc0)=[@rdma_args={0x48, 0x114, 0x1, {{0x3, 0xffffffff}, {&(0x7f0000000200)=""/5, 0x5}, &(0x7f0000000a80)=[{&(0x7f0000000400)=""/238, 0xee}, {&(0x7f0000000500)=""/39, 0x27}, {&(0x7f0000000540)}, {&(0x7f0000000580)=""/148, 0x94}, {&(0x7f0000001ec0)=""/140, 0x8c}, {&(0x7f0000000700)=""/155, 0x9b}, {&(0x7f00000007c0)=""/168, 0xa8}, {&(0x7f0000000880)=""/173, 0xad}, {&(0x7f0000000940)=""/205, 0xcd}, {&(0x7f0000000a40)=""/35, 0x23}], 0xa, 0x1, 0x310}}, @rdma_args={0x48, 0x114, 0x1, {{0x8000, 0x1}, {&(0x7f0000000b40)=""/135, 0x87}, &(0x7f0000001d80)=[{&(0x7f0000000c00)=""/105, 0x69}, {&(0x7f0000000c80)=""/252, 0xfc}, {&(0x7f0000000d80)=""/4096, 0x1000}], 0x3, 0x1, 0x8298}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x400}], 0xa8, 0x1}, 0x4000000) r0 = socket(0x9, 0x5, 0x0) signalfd4(r0, &(0x7f00000001c0)={0x5}, 0x8, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000240)={0xa, 0x4e20, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}, 0x1c) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x481, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$rfkill(0xffffffffffffffff, &(0x7f0000000540)={0x2, 0x6, 0x3, 0x0, 0x1}, 0x8) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000340)={@local}) 02:38:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getpid() openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x0, 0x20040) getpid() ptrace(0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x300000b, 0x44031, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffd9) 02:38:14 executing program 4: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000480)={0x0, {{0xa, 0x4e22, 0xd0, @rand_addr="382e302f2166a4ff26d28230b6e96b8e"}}}, 0x88) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000200)={0x0, @aes128}) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4000000043) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$nl_generic(0xa, 0x3, 0x10) r3 = syz_open_dev$swradio(&(0x7f0000000340)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_tcp_int(r3, 0x6, 0x0, &(0x7f0000000380), 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000040)=@ccm_128={{0x303}, "c6e546fa0b7b185c", "b2a103a716c002247e08fbb9aa6eaa76", "c3776646", "35970aa0daf16327"}, 0x28) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4(0xffffffffffffffff, 0x0, 0x0, 0x1000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f0000000300)=0x4) shutdown(0xffffffffffffffff, 0x0) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r6, r5, 0x0, 0x80000005) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000080)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, r7, 0x2, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) chmod(&(0x7f0000000000)='./file0/file0\x00', 0x12) [ 191.930774] audit: type=1400 audit(1571625494.828:44): avc: denied { map } for pid=7580 comm="syz-executor.3" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=28736 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 02:38:14 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x1) fcntl$setstatus(r0, 0x4, 0x46802) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) utimensat(r1, 0x0, &(0x7f0000000140)={{0x77359400}, {0x77359400}}, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r3 = open(&(0x7f0000000300)='./file0\x00', 0x400000, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r3, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x1150) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r5, r4, 0x0, 0x80000005) getsockopt$inet_tcp_buf(r4, 0x6, 0x1c, &(0x7f00000001c0)=""/198, &(0x7f0000000000)=0xc6) ftruncate(r0, 0x48280) r6 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x40) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) write$capi20_data(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) chdir(&(0x7f00000004c0)='./file0\x00') rename(0x0, &(0x7f0000000080)='./file1\x00') write$P9_RATTACH(r6, &(0x7f0000000080)={0x14}, 0xfffffff4) r7 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm-control\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, &(0x7f0000000a00)=0x8, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 191.997102] (unnamed net_device) (uninitialized): Unable to set up delay as MII monitoring is disabled 02:38:14 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0xa, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x40, 0x0, 0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x10, 0x5, 0x3, 0x0, [{[@rand_addr]}, {}]}, @timestamp={0x44, 0x4}]}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x7fff, 0x4, 0xea2, 0xd7f, 0x7}}}}}, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f0000000040)) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="46c682daf0012dfae26a27c73acffdf894f1fb94585d462680a0dfb2", 0x1c}, {&(0x7f0000000180)="9b7d69e55985e40b2577591fad1ed7757b19671f92c168a0cd9c955eb5021b2509441029d647b65510c0be13a4daaaeab1e65ce19cff713855c935a3782d23b678d6b9b3e6e56e5cb21ec716535cbda56525f98b26acdaf65b215aa84a38c4429f36804bdf70c2f2ccf029c996f065f1046489dba8f97de83e5789336f2329b034739ab40a4c7a58b0f341093d49de3a5f0d2ed273ffbe2815a3b1fadacf09dca763e3c315af34c85d", 0xa9}], 0x2, 0x2) 02:38:15 executing program 2: write(0xffffffffffffffff, &(0x7f0000000040)="1f0000001000ff00fd4354c007110000f305030205000100130423dcffdf00", 0x3f2) 02:38:15 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x424080, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="1e0000003701000100000800000000000500000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'], 0x1d) stat(0x0, &(0x7f0000000300)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000380)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000001780)='./file0\x00', 0x0, 0x0) fchdir(r0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0x4000) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$P9_RWRITE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x8000000000, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000600)="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", 0x15d) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r4, r3, 0x0, 0x80000005) ioctl$VIDIOC_S_SELECTION(r3, 0xc040565f, &(0x7f0000000200)={0x4, 0x103, 0x4, {0x80, 0x1, 0x0, 0x800}}) truncate(&(0x7f0000001740)='./file0\x00', 0x4) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 192.113448] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=7603 comm=syz-executor.5 [ 192.114727] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=7588 comm=syz-executor.4 02:38:15 executing program 2: r0 = socket$inet6(0xa, 0x2010000000002, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6b42, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x20400000000b}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6050a05e089dd1d9dd3e2a7d749f68d800000000000000000000000000aa00004e200008907800000000000000000000000000c87f080000beb2c708ff2bfc9066870a6904255a9d1445c89a3b7625526a3bce08d836bce06230d160615a48361e550d20acc294b81504f629f2923e60db12f7cf2e9469ee54ea2b2fe806722bbb16cd1d0866c4352ee6ab590022911a43122b944be4558d9ff9e1c5f284f165e39c1cb73ea028281a35a0e6ce7f1f47800798db2ddca25a48731d749cca50621c82a145b577ac97335a913d5af4bc018c8beeb87a876ad1b4b519ac6a764b"], 0x0) [ 192.242304] audit: type=1800 audit(1571625495.148:45): pid=7608 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=3 res=0 02:38:15 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7fffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x28, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x3}, 0x10}, 0x70) 02:38:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xfeffff0700000000, 0x80, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]}, 0x344) [ 192.394246] audit: type=1804 audit(1571625495.178:46): pid=7608 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir961487002/syzkaller.3o0QVA/10/file0/file0" dev="loop0" ino=3 res=1 02:38:15 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x124) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000080)='./file0\x00', 0xbde, 0x6, &(0x7f0000000540)=[{&(0x7f0000000180)="63f1da919c3eed622eb89eb507604f5fd86ac28f381ff1899db2690d1b3b118192c32b657c791813fc5a4c4d8511b2d4a212f62b0b50dfd88b2f0093308e575acd5e878ca9e3ee53c7b7", 0x4a, 0x3}, {&(0x7f0000000200)="8a1d24406281327505c39d4626197b856538e25a9ac6c7e9c50daa6252b074c3f40c5543c68ec4918dd6563a5b639a2fd2c759e2373a55e58a241ca5d4f33684ac8d13083268fbd251fa0b932899cf3dcf682acd5078e52511df921ace1da98b813c6a7e2280906be8491b4742539c4ef9f43d1e53840656e581c903be280302a29baa86e821f2824f25bd8edad3e4eb71972810c6dccc840128acba9e87e079628db1076420464758326393f592b75f56b5f16b61912c6c8ba9231b646fe02b45d66b66faba92ecf928e982801c33e055de62f7117eaa8ef5", 0xd9, 0x6}, {&(0x7f0000000300)="e8a174aa0a258bf4c4d9559c0d757e9254d9ff2a374c6f3f1239699756e9f56e132721c8200841be038582c0a04812b6095b7e869aabb850cb13e44908bad1918a5b61d4ecd926a2fcbdddd8f7bc9ec9ad1f3c3e4939b980a75af35fa12099c9167d205a04c95499f7b6b9678a2a81d57d8d52068d23cdde6e6eb2493350c1ea726f4ff94d70bf662caabac0f77078f1ff9eb0074973e3acee8a8fd0bfefebd0a98a3198130f8593e2d339448a28fab7b8bb4815fc345d71a17c9a28103fe9c6bef2e5dbbab6f9d533", 0xc9, 0x80000001}, {&(0x7f00000000c0)="468eab8afa5258e3a8dd096e4a", 0xd, 0x9}, {&(0x7f0000000400)="da39442106b3e9abd960fd62b5e3a9576375e6e52f653b70608cd336a9435da0f8284cc9c6e49fc93279ebd07dd0cfc15d54e0f995cc858a1249a4f834fa65817feab24df0c933a04ce648a4c45fb58337fa5db88ce21000217d7898949d7824486bb9d92e1f5a8a4d94bcf0d8dbed00d581ef4942ee8bcb5eb1bfd92b8d1e22c5e9803b8b82b6fcedf750a227044958910b13df214599dd030bf3a2cdb587bf99d2a10cb5d862afd6262254c9eabf14598574d60d0d706b346cfe54e177950d05708244c4ea34591fbd98036d69d269f40fb7ff790e38c0aca644cbc47a7df707ae6cac0fc3c2df7cb82f", 0xeb, 0x2}, {&(0x7f0000000500)="b5c63baa4a7629b6b67d8c", 0xb}], 0x40000, &(0x7f0000000600)='!ppp1\x00') mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) [ 192.408212] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=7608 comm=syz-executor.0 02:38:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x53d, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000140)={0xa, 0x2}, 0x1c) socket(0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) alarm(0xffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f00000000c0), 0xfffffffffffffd4d, 0x1, 0x0, 0x44) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) 02:38:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r2, r1, 0x0, 0x80000005) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000080)={0x3, 0x0, 0x102, 0x8, {0x3, 0x7, 0x80000000, 0x1}}) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000140)={0x8, 0x20, 0x19, 0x5}) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x0, 0xda95, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000280)=""/204, 0x12f, 0x0, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_S_FMT(r4, 0xc0d05605, &(0x7f00000007c0)={0x1, @sliced}) ioctl$sock_inet_SIOCSIFPFLAGS(r4, 0x8934, &(0x7f0000000400)={'ip6gre0\x00'}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) socket$l2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000180), &(0x7f00000001c0)=0xc) connect$l2tp(r3, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) sendmmsg(r3, &(0x7f0000005fc0), 0xa9, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r6, r5, 0x0, 0x80000005) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000200)={0x0, 0x6}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000380)={0x2, 0x40, 0x8304, 0x10001, 0x5, 0x5, 0x3, 0x9, r7}, &(0x7f00000003c0)=0x20) [ 192.652934] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=7641 comm=syz-executor.3 02:38:15 executing program 4: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x10001, 0x400}, 0x14) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000100)=0x2, 0x4) write$binfmt_misc(r1, &(0x7f00000001c0)=ANY=[], 0xfffffdcb) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 02:38:15 executing program 2: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x33c) r3 = gettid() tkill(r3, 0x3000000000016) r4 = getpgid(r3) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x1f, 0x8, 0x3f, 0x1, 0x0, 0x5, 0x18110, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0x10000, 0x9, 0x0, 0x7, 0x1, 0x5, 0xc279}, r4, 0x7, 0xffffffffffffffff, 0xd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000004) sendmsg$tipc(r6, &(0x7f0000000500)={&(0x7f0000000280), 0x10, &(0x7f00000002c0)}, 0x0) [ 192.884843] audit: type=1400 audit(1571625495.788:47): avc: denied { map_create } for pid=7653 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 02:38:16 executing program 0: socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000)=0xb, 0x4) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @broadcast}) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r3, r2, 0x0, 0x80000005) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={r5, 0x9}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r5, 0x400}, &(0x7f0000000100)=0x8) 02:38:16 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x8400, 0x0) mmap$perf(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x4000006, 0x80010, r3, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x2812, r4, 0xa) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="c8"], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 193.405966] audit: type=1400 audit(1571625496.308:48): avc: denied { map } for pid=7662 comm="syz-executor.3" path="/dev/dlm-monitor" dev="devtmpfs" ino=1066 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 193.418895] device team0 entered promiscuous mode 02:38:16 executing program 5: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={r3, 0x9}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0)={r3, 0x1}, &(0x7f0000000180)=0x8) r4 = getpid() ptrace(0x4206, 0x0) ptrace$getregset(0x4205, r4, 0x2, 0x0) write$P9_RGETLOCK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="290000003700000001000000000000000100000000000000", @ANYRES32=r4, @ANYBLOB="0b9e83891e337528468df96700"], 0x29) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = add_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)="8d", 0x1, 0xfffffffffffffffb) keyctl$clear(0x7, r5) r6 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f00000002c0)='\x00', r5) r7 = add_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)="8d", 0x1, 0xfffffffffffffffb) keyctl$clear(0x7, r7) keyctl$unlink(0x9, r6, r7) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)) pipe(&(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) acct(0x0) [ 193.507561] device team_slave_0 entered promiscuous mode [ 193.526221] device team_slave_1 entered promiscuous mode 02:38:16 executing program 4: syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000f10d000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x1004899, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000040)={0x4, 0x9, 0x2}) 02:38:16 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x70) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="be"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r3, r3) ioctl$FICLONE(r1, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 02:38:16 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x20080) set_mempolicy(0x4001, &(0x7f00000000c0)=0x2, 0x7e) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, &(0x7f0000000040)=0x8) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) [ 194.005302] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 194.038027] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 194.059185] F2FS-fs (loop4): Fix alignment : internally, start(5120) end(12288) block(6656) 02:38:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0x20000000006) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340), 0x1, 0x0, 0x3ce}, 0x10004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r3, r2, 0x0, 0x80000005) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000002400e50d00"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100636273001c010000180001000200000000000000000000000000000000000000a610055d6b4c3dccb5c1bc127272901b3ac88f4aca8fa743f083d94f4a1abb79046c294e37bec8fe4f8bc7834ef50300ce52beaca5e732f9fe5d508158064f7fc2ce99f22197f43627e22882fa81b828b9b94f8c8e656e70558f5c373706"], 0x48}}, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r8, r7, 0x0, 0x80000005) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={r10, 0x9}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r7, 0x84, 0x7c, &(0x7f0000000240)={r10, 0xcd6, 0x8}, 0x8) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'nr0\x00', r6}) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv4_getaddr={0x2c, 0x16, 0x4, 0x70bd2c, 0x25dfdbfc, {0x2, 0x71, 0x43, 0xff, r11}, [@IFA_CACHEINFO={0x14, 0x6, {0xd6, 0xffffffff, 0x0, 0xba}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4888}, 0x28811) socket$l2tp(0x18, 0x1, 0x1) [ 194.112408] attempt to access beyond end of device 02:38:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x9, {0x7f, 0x9, 0xb7, 0x6, 0x5, 0x5}, 0x5, 0xa3}, 0xe) clock_settime(0x6, &(0x7f0000000d40)={0x77359400}) fallocate(r0, 0x0, 0x0, 0x10000101) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$IMGETCOUNT(r2, 0x80044943, &(0x7f0000000dc0)) pwritev(r1, 0x0, 0x0, 0x0) ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000e00)=0x4) pwritev(r1, &(0x7f0000001500)=[{&(0x7f0000000040)="468eaccf253164d8fa0501fc0ce89c02f04d7ac901620ac20c", 0x19}, {&(0x7f0000000080)="714e73ecdd1134632c7a7f8f41051ac3a51c23169e273e04247dd8463b8878cffa1b9436d41f7119602d0304b1d7877229e6d312f8153cc3a2b4b21ad6a3bad179cb4f21456cf9bc388447ef15a678ea52cf84f85e71ce97dda171b40d319c330299d91e6569acba5b05fadb02dfa13814d7604b36d40e646028fc46b085c9b7", 0x80}, {&(0x7f0000000140)="6057a4c2d0a3bf4582", 0x9}, {&(0x7f0000000180)="f01df15437b53217f82ab99c6eee09aa4aa34c1a87a3fe11633836848bd595ddb6893cebbb436b9f5c395f53afdc4f776547b4dc612e93d09168c506f168e1ade873373a9d1a2ddc7327f413467ccbbe010370a37e61763179419ab924f075d72341b47294ff4923171c2bb9183b1d7216d3beb50b66b86fdbe9c2651f25575d2df9519b6dccf520362552d9a221b8c9fb2df5513e5fe690081a5f36494e84f104ea39b6ee7119a54f352dc47062840e9ccc5a663d9ea52dfd1f82c1c2ab8eaeccd44e190db8cd5631ab57b5ab17d568e02edfce8b100f30001399aa07e2582ae7f8fccf67ab41c6cba9517b244f2defaaf4f48afdbed6d8d5895645c249bb45fbb58553fa62880f7898b4c8c84e43470619e05c84970c3e7a33695e56157d3f2285eba114bfd1053d6b2aef4e43712cdf6bf3bf05419c1e4b6bb790ba0b656402fb4c7d65c7307586c0dd34872dc715ea16f8f2331c05a2bc4847712282511d20228b15755cc7fe5ed930ecb91ae42af5d9a0940374f380d98b8f5654c583cb8be1df47cf74b500d610a98dd353a6d6fcd21d7177ec20ddce0f22c58f8b9bf3b94604b3ae4e4e43da0300a0958d310b501e30c762bd964b0a282f32c56d6f6caa9fbda7e1069f0738c02bac89431ddd22b8b2604e70e547d5c0ec5dcf6fbcf18bf6cd060c8f358c09464f2123d6dc73bf1dcd1b41800c6fc9cf5b2903977813c2bded0ac7c1618b8bf060faff94c287951cfaf24db79a0d5767ae5b41b3a013ccff78512a1b75adaf2e409bfa8917171940eb554dcf1ad6ff186e09918758498d2ba2c8ce69a2c51b921b3c5a72bbf8706252f040366aefbb081790d9daaab832dc6a30a76533fecd76e5b55f2b2c9cc16d3c12b8736e2a36955ebcc24ef89bb432c45bd86f1350b939de3f33a43ce91340bd4176634547699c169bf5b4018e49340dba8ca5c99404c22268425a4a9cf629ea83142480c88474bd24900a65544d0491c5c7ace0ae6835e2486ee3e0863f6955c80e9a767bf1fa264bd2e1a04ad773541f2d43911c6d279a8f7f8739b81f81480c65f31f3da7687d9970a8c8e05ef9d4bb8d5a255ca5f694cc8c88a515e01c242aa86cee5fab0db123a68e438e5ce33607ab1a0ecbb8af1c5972161b8142abcd0362394b75c148d9487d53b4fe10151052018f95e68051949259be76023e81b6a086a442774f71d7de8616b7b6adf5b54d53c845e2886fd1e0de1d22b1d11338eec8b4a3ae3237d53bcadd6b4f22ad0e51d18a79ab966185acff347bd806a7f1ca9d758d5fbb70ca994a99083fe460be2208a6d9cb0746d09dc9bdcaeca4422640d7924786dd4b3444eb93786abe813f60e0db23dea1b561763f75355a2ded99943abb2cba39f88c370df1ae6b671fb0243dc39a4c8b9b88f99f79b79c1df4e5cb0b4e215f2b8fed291b1a7bf3ff2434f65ab437fa40a7081326a1b418fe8fc0367924a62f84d5295939fcf450b59dc406314874271fd7ba3b66c36c65470e4484789062e48ca50cecc92f08a77710b2da9297c654bc106afd1e5ac7741cde3151d30dff5fb6db7a982ad1d238bf2b8c7d62e730cd68af6cd772499d4cd3a7e80205eed69d4a36cb12937f31eeb04a64630a3d6153dc73d2d0c5e1f5848f0d025c20eb6078c4046b1733577d0803a96fbf333f3aa9f1d6ad240b069178a13750fe58729694d31fd6a9787375fdc80f72cea60a9015fcc2009470183039d8fb93f8d34e065a74007123c43810e98cf24972034d0be5f31837c0db4adac2ac24602688820a04e8a2367eaea00701d12aaf7170d5e225224df72f8465b6711ceaa8481bda7cbc6ffecc991e8bf6011d8f5488e35ad20e65661d973c198334b90a66d2a0a7c3652145228d1c060d44d99b2d72c709accf0b26358b7402e82728bf1c17ceb2d56dbd3aa9daa5e73a256df09abeacf969a4564aa80720d0e7b255e35634ea5146dbdb1ad21266b5d7fa3009af931d13ba8e4c67903e29af00739a7e4dc69d56b3239bb6bb502379e00699a06004ecb6d1e0c95897c4d6aa5abb8aba49f66475b7891ac9b4333ac2bc3f6e5785a4c79e551e04a5ffb5c79a24471001fe3a8249b9c34cd2fdcb71db6752e6e74c65824df99cbbfaac71573f1116917dbde7e791acc656beb18259e489bf226a4768cd614d124ab83f003b798cab44f76b8603b85bbf715692e3c3fdd074f35c4a88243fb91d71d0740c0e53e624efb7248e430f150c06f29e2b89eb85ea536a2fa3963af34e01aa3fc206d4a32a38be6739c0e869d85ef95051a5eff6e74c5cb676cc05ad1515c64dd07b5aff39b42e2713e25329ee7980a3e20315209c501ae9877d5e7866b2955538d5d31b1f08748d27237ff7463459545a6d315677834c58e05e64ab703305b3daaaebedfce4cbf23311eb1587bc44f0c195a8e319e61637abde9443203986a1267cd80e90e7565a8a929d3b9f54cfb89334f889d59174640878e49c96361ea2c3ad675ff75fe9436d50e2c5bda02611e0c9d54815bf003cf026213a9e9c04e2bc88ea5d2bf673699fdb63f521312162b873b17655bbb6c6119194ce588272ea02fbf336a97087541ed62b9a2e1ee3f339451f3d7217392927dc4ef509253eb2797664ad320fb491b726a13edcf13728ee630dd57455e830d80ea30e8c265628d4b65c6113d2f4a5d25148c11c14e1606c5c725c1cc909b60a6eb5618e559717e0fb8649daa7b7ed892f40c49aacd522713fe217f4bb35e75531d04f036d6ae5c85c56597f379f64279233d169aadce059c1e5115aed7e899f2c7b906cd2644b11917d5b38fd3c4b21fc25701e3a0b9807dc54d23e9996ea779e4c2c8807e50de143346b2453de3b025f2b07384cf16fc63c8d6df998c0ed302422c38f1637ebe78b2390d2cf09f7a166deab556751381c7f452acb837c17303d3081f9c631d62a5398f88656b9f1485b4a571a2a803d5cde63451d90bcecd76bd0c75628cb544b785635cef0d42010b989154cc7d6c00b5d0023cf9c571d5e1973b3899530376367f0b9196cc06e3391696380e2b83aecd187d1556f1c7dca120b6633ec88ee6fc042964bd3ed98fa1983c16881f3c3a1cb81719d45d75a83c4238fc544ec982845e30d4fb3226ea73e9aa9aefcbdbb8bb8533da5dcee16302d4049e72ff8ac5bb4c01ec68814926cf2556a0aec75464f26b219ab53e6c4c87f758b23b38f446edbf774dab327bd0df7969261e25b3f7b129aacef70acbf99660b9b3a3e00cb19b12a8a52c48af3ff1b39aa7fd407f880906e3c77e806b4d535a9fee4dc0877b5f48dd51122dd07a9ce79d0d6c97ec50a22dc6d8afbbbc2692df8e08d39cc43ebc43d5aa507d32a3db9318e687c3aab1d20c16cf5cf2dc44732f327b150a99348f6ba2c1a4305f6f8c10e95e5aaf7e9ab15dd4575d033d200c75fc1e5f3cdbb36df083041dcc43a53f6ac398416e0c1338efdb5ad85fc1474490f8ce7a7336c3a0579b38151d68f802503ff80fc6cdafb361b586238e3fb7d4b4d26cf04259272e71a66109a81c16879ef5c5dc98f6508ce10dde7cf3f1e002254e4bfa2045542d66f8cc1624070f308430f38f9d6018351f2eb2f109b7defde469a00cbc7239cd16b19e48fd5d352cd387446171e5a8cfec28477d14e29207baca67ce420188afeeba73ab33428b1faa6c738f074105409c6cc6fa70c54a5f6fa02d7bbd660083f8e01c16936bd219534312d7fa8937f783237f365f5034e5f7dc0a4a068213741b1933bffc6ce2a26dd498f0288c5138e2086af975a36342943085c1680223c440d639b2ec17b2e4a1f7aec65312a99992526c1fec89ba524bd02614f6b2c3a8ac4cca581a60dcefd5e5b53be673fca3a294950d86f35a8f4d98c94b134d041ecf035c423a6168ce6aece09883f1264fab86fd52c174cd373df2248e6b7fe254b645cb0d467393884e4bd65b265a521c4480dd299bdc434169808532491ff47665e429e517f43bc8988f497bd8753dcef0f11f5d2a5060192161fa33fc47a0e4d1c880d8c63bb1b76e5b692f22b6f3e3c1897fa2078fca82685c97bc834e3eb4b7ea18097651a4c3c885ce432fa5172a2eb7e716d28d0242c306f6f2d4bc244aa0384fc7d59f41f880afd95ab98e8b1a57e287c42b39b04d424c225987a3dbaa16331a98c9e0405aefa19d1dbdb8b4419b1985e57f02ba8262bacb4b9a81cefd7f4ca2d95280555d6b2267f9bfb894cfbf6ba9b", 0xbc0}, {&(0x7f0000001180)="aec3f8bc78478a76802162dfa13bb13d6aeef761f931aa1bc418962ab6db72d6a3476bfc4d972b9e3bb8cf4f9cf9d298f02ca8994bbad7b941c7771231eabc90c3f6b40191f5a3465df12dfa6c433e285466d66307f7d92b14f7c29ca459", 0x5e}, {&(0x7f0000001200)}, {&(0x7f0000001240)="6d9a86b6bfba758b07e083a4fe2d6ce6261f57c06c1c67352c5b3ef576dc1bc2f1da45ce7bd357926b20faf3e42dbe7ae34e527f0739addd128567ec9dfb4ddbdc67ba6dba1c40ca518cf48670ee929182906a1448bc8eb57f451bbf0332f167c8f9792e5a508808e6dd6a2eda03", 0x6e}, {&(0x7f00000012c0)="6f3f799b972e7fbf33572c0126c8efeadb7ab6c6a1171e5ed4ec99abde769d7c37ad5ac59f10c8cdd53e0240d6e346313a7179098f70ed441819f02088fb60ad17f8fdc8f4f56d5e35067294767238bc5f4f375e4a77694c5ade07b60c1ac00a9d77c3a04eb4255ba08057c6e7dd8a5fcd71e3de42ca32f0037d0c7159877ff6edb0a1bad254977e2929d08bb1900e5f9c05a0365d8438d63c0c06ee4c", 0x9d}, {&(0x7f00000013c0)="383e987baacc58a5", 0x8}, {&(0x7f0000001400)="1f961a564e0718f72d0ae1534d77e6557a2be09ee73195ad47d2c5ae3fe2e80c39878472601f8dbd61805914cc123fdb19bdc5d970de249323c50306c31149fbf0ab65844666917cf0060f74fafabc068c63484f9c28333416ce4a722c510616f11d832171beccec88fccfeb70e54581e04bdf82e83678a844cc40760cfc1618dfdc5f7b48a367aa8bf15ab9d962dde4634d277ed95bea6ae6ccda576e745b67e36c44881ab1d53c91ef67fbd7afa753b959caa678494b9eb352728a8ab20a9518db2c391daf1234ecde696b802a955d5fb6579c9127ae2825491c229ae2622b", 0xe0}], 0xa, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12ddcfb6061275ad, &(0x7f0000000e40)=0x81, 0x4) [ 194.149400] loop4: rw=12288, want=8200, limit=20 [ 194.168972] selinux_nlmsg_perm: 3 callbacks suppressed [ 194.168991] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=7697 comm=syz-executor.3 [ 194.195919] attempt to access beyond end of device [ 194.245784] loop4: rw=12288, want=12296, limit=20 [ 194.245879] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 194.266485] F2FS-fs (loop4): Failed to get valid F2FS checkpoint [ 194.273436] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) 02:38:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x1, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="b6772d6341957428db11fa5503aa0a473c54c299aface98d6d0cda7f94ea8a0e986039fea2fc876728d401eb970d2005dc6b8752df5207a3141411758b28960b0b5d43287e888258298b8c150fdce80ac81a69535538bb3fc124b4426398e7c084df033f3bef235c4f2a825ae82fc2e2ff104c17a8e003ceb6b8edbc", 0x7c) [ 194.296668] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 194.329113] kasan: CONFIG_KASAN_INLINE enabled [ 194.330568] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=7697 comm=syz-executor.3 [ 194.338552] attempt to access beyond end of device 02:38:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x101001, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "b5470173152f1390", "17a1008d080186bdfb47cf69e9dad93cb8706e6cc8ce0d621c6a9f577e0bb5de", "0ab58bee", "e28fdfda2f4091d5"}, 0x38) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f00000000c0)=0x5, 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040882, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}}, 0x1c) [ 194.368118] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 194.380587] loop4: rw=12288, want=8200, limit=20 [ 194.383708] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 194.391624] CPU: 0 PID: 7705 Comm: syz-executor.3 Not tainted 4.19.80 #0 [ 194.392846] attempt to access beyond end of device [ 194.398459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.398482] RIP: 0010:hrtimer_active+0x11e/0x230 [ 194.398495] Code: 48 39 c3 0f 84 d3 00 00 00 e8 2e 22 0f 00 48 8b 45 c8 80 38 00 0f 85 06 01 00 00 49 8b 5d 30 4c 8d 63 10 4c 89 e0 48 c1 e8 03 <42> 0f b6 14 38 4c 89 e0 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 [ 194.398502] RSP: 0018:ffff88805412f350 EFLAGS: 00010202 [ 194.398512] RAX: 0000000000000002 RBX: 0000000000000000 RCX: ffffc9000c6c3000 [ 194.398524] RDX: 000000000001d1ab RSI: ffffffff815ba512 RDI: ffff88809c5cd4c0 [ 194.403878] loop4: rw=12288, want=12296, limit=20 [ 194.412780] RBP: ffff88805412f3a8 R08: ffff88805458e580 R09: 0000000000000000 [ 194.412788] R10: ffffed10138b9a4c R11: ffff88809c5cd267 R12: 0000000000000010 [ 194.412797] R13: ffff88809c5cd4c0 R14: ffff88807d0dc500 R15: dffffc0000000000 [ 194.412808] FS: 00007fd2093ab700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 194.412821] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 194.412828] CR2: 000000002095dffc CR3: 00000000a4fb2000 CR4: 00000000001406f0 [ 194.412842] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 194.417942] F2FS-fs (loop4): Failed to get valid F2FS checkpoint [ 194.436475] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 194.436480] Call Trace: [ 194.436507] hrtimer_try_to_cancel+0x74/0x5b0 [ 194.436521] ? hrtimer_run_softirq+0x270/0x270 [ 194.436535] ? __lock_is_held+0xb6/0x140 [ 194.436553] hrtimer_cancel+0x20/0x40 [ 194.544560] qdisc_watchdog_cancel+0x16/0x20 [ 194.548982] cbs_destroy+0x5e/0xd0 [ 194.552528] ? cbs_dequeue_soft+0x400/0x400 [ 194.556863] qdisc_create+0xaa6/0x1230 [ 194.560763] ? tc_get_qdisc+0xbb0/0xbb0 [ 194.564744] ? nla_parse+0x1fc/0x2f0 [ 194.568472] tc_modify_qdisc+0x51b/0x1bdc [ 194.572628] ? qdisc_create+0x1230/0x1230 [ 194.576782] ? find_held_lock+0x35/0x130 [ 194.580846] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 194.586400] ? qdisc_create+0x1230/0x1230 [ 194.590541] rtnetlink_rcv_msg+0x463/0xb00 [ 194.594766] ? rtnetlink_put_metrics+0x560/0x560 [ 194.599527] ? netdev_pick_tx+0x300/0x300 [ 194.603671] ? netlink_deliver_tap+0x22d/0xc20 [ 194.608252] ? find_held_lock+0x35/0x130 [ 194.612308] netlink_rcv_skb+0x17d/0x460 [ 194.616381] ? rtnetlink_put_metrics+0x560/0x560 [ 194.621126] ? netlink_ack+0xb30/0xb30 [ 194.624998] ? kasan_check_read+0x11/0x20 [ 194.629134] ? netlink_deliver_tap+0x254/0xc20 [ 194.633708] rtnetlink_rcv+0x1d/0x30 [ 194.637423] netlink_unicast+0x537/0x720 [ 194.641488] ? netlink_attachskb+0x770/0x770 [ 194.645885] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.651417] netlink_sendmsg+0x8ae/0xd70 [ 194.655466] ? netlink_unicast+0x720/0x720 [ 194.659687] ? selinux_socket_sendmsg+0x36/0x40 [ 194.664484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.670023] ? security_socket_sendmsg+0x8d/0xc0 [ 194.674766] ? netlink_unicast+0x720/0x720 [ 194.678996] sock_sendmsg+0xd7/0x130 [ 194.682696] ___sys_sendmsg+0x803/0x920 [ 194.686669] ? copy_msghdr_from_user+0x430/0x430 [ 194.691434] ? lock_downgrade+0x880/0x880 [ 194.695580] ? kasan_check_read+0x11/0x20 [ 194.699715] ? __fget+0x367/0x540 [ 194.703153] ? iterate_fd+0x360/0x360 [ 194.706938] ? lock_downgrade+0x880/0x880 [ 194.711072] ? __fget_light+0x1a9/0x230 [ 194.715031] ? __fdget+0x1b/0x20 [ 194.718381] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 194.723906] __sys_sendmsg+0x105/0x1d0 [ 194.727780] ? __ia32_sys_shutdown+0x80/0x80 [ 194.732197] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 194.736945] ? do_syscall_64+0x26/0x620 [ 194.740918] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.746279] ? do_syscall_64+0x26/0x620 [ 194.750244] __x64_sys_sendmsg+0x78/0xb0 [ 194.754290] do_syscall_64+0xfd/0x620 [ 194.758091] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.763272] RIP: 0033:0x459a59 [ 194.766458] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 194.785353] RSP: 002b:00007fd2093aac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 194.793066] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 194.800319] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000009 [ 194.807579] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 194.814845] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd2093ab6d4 [ 194.822097] R13: 00000000004c7c0c R14: 00000000004ddad8 R15: 00000000ffffffff [ 194.829371] Modules linked in: [ 194.845990] ---[ end trace c939ff9d9f90433c ]--- [ 194.853019] RIP: 0010:hrtimer_active+0x11e/0x230 [ 194.859430] Code: 48 39 c3 0f 84 d3 00 00 00 e8 2e 22 0f 00 48 8b 45 c8 80 38 00 0f 85 06 01 00 00 49 8b 5d 30 4c 8d 63 10 4c 89 e0 48 c1 e8 03 <42> 0f b6 14 38 4c 89 e0 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 [ 194.877273] protocol 88fb is buggy, dev hsr_slave_0 [ 194.881907] RSP: 0018:ffff88805412f350 EFLAGS: 00010202 [ 194.884522] protocol 88fb is buggy, dev hsr_slave_1 [ 194.889591] RAX: 0000000000000002 RBX: 0000000000000000 RCX: ffffc9000c6c3000 [ 194.903006] kobject: 'loop4' (000000005f4f5788): kobject_uevent_env [ 194.906197] RDX: 000000000001d1ab RSI: ffffffff815ba512 RDI: ffff88809c5cd4c0 [ 194.909534] protocol 88fb is buggy, dev hsr_slave_0 [ 194.919606] RBP: ffff88805412f3a8 R08: ffff88805458e580 R09: 0000000000000000 [ 194.921819] protocol 88fb is buggy, dev hsr_slave_1 [ 194.929143] R10: ffffed10138b9a4c R11: ffff88809c5cd267 R12: 0000000000000010 [ 194.941781] kobject: 'loop4' (000000005f4f5788): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 194.962788] kobject: 'loop0' (0000000075f61d37): kobject_uevent_env [ 194.970893] audit: type=1800 audit(1571625497.878:49): pid=7702 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16560 res=0 [ 194.972875] kobject: 'loop0' (0000000075f61d37): fill_kobj_path: path = '/devices/virtual/block/loop0' 02:38:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x101001, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "b5470173152f1390", "17a1008d080186bdfb47cf69e9dad93cb8706e6cc8ce0d621c6a9f577e0bb5de", "0ab58bee", "e28fdfda2f4091d5"}, 0x38) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f00000000c0)=0x5, 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040882, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}}, 0x1c) [ 195.018256] R13: ffff88809c5cd4c0 R14: ffff88807d0dc500 R15: dffffc0000000000 [ 195.026315] FS: 00007fd2093ab700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 195.041716] kobject: 'loop4' (000000005f4f5788): kobject_uevent_env [ 195.054156] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 195.056280] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=7697 comm=syz-executor.3 [ 195.071215] CR2: 0000001b2f427000 CR3: 00000000a4fb2000 CR4: 00000000001406e0 [ 195.077256] kobject: 'loop4' (000000005f4f5788): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 195.080796] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 195.098232] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 195.101697] kobject: 'loop1' (00000000e4c654b8): kobject_uevent_env [ 195.115143] kobject: 'loop1' (00000000e4c654b8): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 195.116832] Kernel panic - not syncing: Fatal exception [ 195.131474] Kernel Offset: disabled [ 195.135109] Rebooting in 86400 seconds..