[ 56.987881] audit: type=1800 audit(1540385509.032:25): pid=6090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 57.007045] audit: type=1800 audit(1540385509.032:26): pid=6090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 57.026479] audit: type=1800 audit(1540385509.062:27): pid=6090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 57.106924] audit: type=1800 audit(1540385509.102:28): pid=6090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.24' (ECDSA) to the list of known hosts. 2018/10/24 12:52:05 fuzzer started 2018/10/24 12:52:10 dialing manager at 10.128.0.26:35127 2018/10/24 12:52:10 syscalls: 1 2018/10/24 12:52:10 code coverage: enabled 2018/10/24 12:52:10 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/24 12:52:10 setuid sandbox: enabled 2018/10/24 12:52:10 namespace sandbox: enabled 2018/10/24 12:52:10 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/24 12:52:10 fault injection: enabled 2018/10/24 12:52:10 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/24 12:52:10 net packed injection: enabled 2018/10/24 12:52:10 net device setup: enabled 12:54:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x2, 0x0, [0x486]}) syzkaller login: [ 238.640661] IPVS: ftp: loaded support on port[0] = 21 [ 241.200820] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.207506] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.216204] device bridge_slave_0 entered promiscuous mode [ 241.376999] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.383566] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.392169] device bridge_slave_1 entered promiscuous mode [ 241.536254] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 241.677456] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 12:54:54 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, &(0x7f00000002c0), 0x8) [ 242.172970] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 242.457044] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 242.703238] IPVS: ftp: loaded support on port[0] = 21 [ 242.793356] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 242.800390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 243.036526] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 243.043780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 243.586824] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 243.594994] team0: Port device team_slave_0 added [ 243.816178] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 243.824328] team0: Port device team_slave_1 added [ 244.046248] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 244.053468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 244.062310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 244.209473] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 244.216680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 244.225613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 244.434679] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 244.442787] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.451676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 244.651898] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 244.659541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 244.668752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.270878] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.277550] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.286024] device bridge_slave_0 entered promiscuous mode [ 246.527173] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.533859] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.542313] device bridge_slave_1 entered promiscuous mode [ 246.694515] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 246.885250] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 247.418684] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.425329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.432365] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.438813] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.447730] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 247.458446] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 247.592748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.710879] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 247.866097] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 247.873337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 248.050123] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 248.057343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 12:55:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") tee(r0, r0, 0xce1, 0x0) [ 248.831719] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 248.839678] team0: Port device team_slave_0 added [ 249.048794] IPVS: ftp: loaded support on port[0] = 21 [ 249.169033] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 249.177224] team0: Port device team_slave_1 added [ 249.374110] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 249.381273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 249.390259] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.609760] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 249.617112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 249.626246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.853422] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 249.860995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.870455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.047247] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 250.054883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.064030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.205203] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.211756] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.218646] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.225224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.233967] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 253.471890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.819187] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.825798] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.834410] device bridge_slave_0 entered promiscuous mode [ 254.115776] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.122788] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.131483] device bridge_slave_1 entered promiscuous mode [ 254.457235] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 254.638931] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 255.309250] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 255.634945] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 255.956094] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 255.963436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 256.272202] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 256.279286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 12:55:08 executing program 3: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000940), 0x0, 0x80020000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000240), 0x2e2) vmsplice(r1, &(0x7f0000000140)=[{&(0x7f00000006c0), 0xfffffdb7}], 0x1, 0x0) splice(r0, 0x0, r2, 0x0, 0xab11, 0x0) [ 257.066438] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 257.074832] team0: Port device team_slave_0 added [ 257.452932] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 257.460968] team0: Port device team_slave_1 added [ 257.826197] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 257.833317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 257.842193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 257.951307] IPVS: ftp: loaded support on port[0] = 21 [ 258.235919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 258.243191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 258.252413] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 258.628356] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 258.636255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 258.645397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 259.030849] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 259.038602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.047645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 260.109417] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.465010] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 261.802361] ip (6699) used greatest stack depth: 53536 bytes left [ 262.790151] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 262.796703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.804899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.090661] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.097225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.104267] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.110714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.119405] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 263.271987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 264.054235] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.060704] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.069213] device bridge_slave_0 entered promiscuous mode [ 264.105951] 8021q: adding VLAN 0 to HW filter on device team0 [ 264.411010] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.417692] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.426602] device bridge_slave_1 entered promiscuous mode [ 264.788822] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 265.160861] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 266.312052] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 266.697075] bond0: Enslaving bond_slave_1 as an active interface with an up link 12:55:19 executing program 4: socket$packet(0x11, 0x3, 0x300) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000540)="6367726f75702e70726f6373000b816949100445531497cdb3bcf18cfa7befd92197483ab23b662fbd9615b57228cfe5fc881ed993baac961bd7d3b4c1d38bf073c41a23e5ac82eb7425e3635009c0ce521d9875e63f3f8b4ff5de3e23861fec6308649ac95e2eb7e5ade9e2fc9af80569", 0x2, 0x0) epoll_create(0x2) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000480)={&(0x7f0000000440), 0x8}) [ 267.038341] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 267.045544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 267.468373] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 267.475650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 267.861198] 8021q: adding VLAN 0 to HW filter on device bond0 [ 268.392957] IPVS: ftp: loaded support on port[0] = 21 [ 268.694368] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 268.702687] team0: Port device team_slave_0 added [ 269.081003] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 269.089152] team0: Port device team_slave_1 added [ 269.427592] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 269.568683] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 269.575871] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 269.584670] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 269.967486] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 269.974682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 269.983423] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 270.393235] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 270.400801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 270.409800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 270.816764] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 270.824605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.833629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 271.011958] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 271.018288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 271.026416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.798903] 8021q: adding VLAN 0 to HW filter on device team0 [ 273.706099] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 12:55:26 executing program 0: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x5, &(0x7f0000000100)) 12:55:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000a, &(0x7f0000000680)=0x86, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f00000000c0)={'icmp\x00'}, &(0x7f0000000140)=0x1e) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0xc1fd, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000040)={0x9, 0x200, 0x2, 0x3, 0x100000001}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100), 0xfffffffffffffffa) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) [ 275.553478] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.560035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.567330] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.573852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.582362] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 12:55:27 executing program 0: modify_ldt$write(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x10) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') writev(r0, &(0x7f0000000080), 0x1a6) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0xf) [ 275.791956] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.798426] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.806981] device bridge_slave_0 entered promiscuous mode 12:55:28 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x4e22, 0x36d6, @mcast1, 0x3}}, 0x6, 0x7, 0x6, "16de6f4dae8b8d842501c4ff497cb697b96dddf7f467e632ff6f9f02fa0169a26306581223968027c8c31344eea0d302db7a04790312f9f4f31bd92729ecf67da0c11aae344aca65fd9dfe6796f29a1d"}, 0xd8) listen(r1, 0x5) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000240), 0x4) listen(r1, 0x0) [ 276.237082] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.243628] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.252151] device bridge_slave_1 entered promiscuous mode [ 276.581986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 276.618595] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 12:55:28 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000001700)={0x53, 0xfffffffffffffffb, 0x7e, 0x101, @scatter={0x6, 0x0, &(0x7f0000001580)=[{&(0x7f0000000040)=""/72, 0x48}, {&(0x7f0000000100)=""/66, 0x42}, {&(0x7f00000002c0)=""/65, 0x41}, {&(0x7f00000013c0)=""/183, 0xb7}, {&(0x7f0000001480)=""/254, 0xfe}, {&(0x7f0000000340)=""/119, 0x77}]}, &(0x7f0000001600)="52a2348492be5d906e40e5f7e19221bdfb438158b69c67f9bb6656252b26b06d3323fdb41fdc2fbb9509b0829d9ed94cbd753205d8f36971b6339aa91070abc54637d60d4bcbe91d563e73dedf7363a148167ab15dee8cf65c858403f774198279d1c9e9f3ec741f06c9c079aabc794fd6a60af94c9f543ef9dd6415a56a", &(0x7f0000001680)=""/75, 0x0, 0x10000, 0x3, &(0x7f0000000180)}) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), 0x8) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234418dd25d766070") r2 = getpgrp(0x0) process_vm_readv(r2, &(0x7f0000002580)=[{&(0x7f00000001c0)=""/238, 0xee}, {&(0x7f00000003c0)=""/4096, 0x1000}], 0x2, &(0x7f0000003900)=[{&(0x7f0000002600)=""/173, 0xad}, {&(0x7f00000026c0)=""/4096, 0x1000}, {&(0x7f00000036c0)=""/28, 0x1c}], 0x3, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/current\x00', 0x2, 0x0) [ 276.918164] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 12:55:29 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000480)=""/4096) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) pwritev(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)="0725aff44e7478affbc66331ae8be0fc", 0x10}], 0x1, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000080)={'ip_vti0\x00', 0x875d}) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) 12:55:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000d80)=@ipv4_newroute={0x28, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@RTA_MULTIPATH={0xc, 0x9, {0x8, 0xffffff9e}}]}, 0x28}}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000180)=0x80000000002, 0x93) sendto$inet(r0, &(0x7f0000000340), 0x0, 0xfffffffffffffffd, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x10) socketpair(0x3, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000240)={0x300000, 0x7f, 0x0, 0x4, 0x20, 0x1f}) 12:55:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000400)="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") r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0xb, 0x1, "4d41b8ef3b8084d4dafc9d65f9bfd257b464927f048d09236cb1c594a04120d72e7a183af3ed447fab3bcf87ec953340c4da5ffa4373b8f6eed30e304c4b50e3", "53ef2701299f83581a5e9787b74fa22f6a5499c23a0a573adb79d0e8bc41a7b805076ad91e6da6772480986cce31d58856e09d1000384d143058ac25ed81f9d0", "aa204174162233e2ddc62a99630e1481a397388e314cfcac879eaaceb3864850", [0x2, 0x2]}) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) ioctl(r0, 0x7, &(0x7f0000000100)="b54ec2ee4a9b336129116bd530a3d78c4fd2853387de99f32f333196c650bc0bb284e798ee2a3f78ae60f045918c9c2f5615ef02b43b4f306de78025cbb5") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f0000000040)=""/64) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r4 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r4, &(0x7f00000001c0)=ANY=[], 0x358) recvmmsg(r4, &(0x7f0000008e80)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x536}], 0x1, &(0x7f0000001680)=""/72, 0x48}}], 0x1, 0x0, &(0x7f0000002240)) [ 278.415375] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 279.211921] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 280.138711] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 280.145870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 280.345280] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 280.352511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 281.379906] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 281.388435] team0: Port device team_slave_0 added [ 281.763850] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 281.772108] team0: Port device team_slave_1 added [ 282.024476] 8021q: adding VLAN 0 to HW filter on device bond0 [ 282.135548] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 282.142915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 282.151825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 282.456729] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 282.463893] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 282.472655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 282.850352] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 282.858072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 282.867011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.072810] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 283.080368] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.089318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.415923] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 283.557433] kauditd_printk_skb: 2 callbacks suppressed [ 283.557469] audit: type=1326 audit(1540385735.602:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7204 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 284.362235] audit: type=1326 audit(1540385736.412:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7204 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 284.410658] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 284.417178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 284.425104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 12:55:36 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, &(0x7f00000002c0), 0x8) [ 284.658892] audit: type=1326 audit(1540385736.702:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7236 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 285.418546] 8021q: adding VLAN 0 to HW filter on device team0 [ 286.017661] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.024208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.031126] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.037711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.046124] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 286.052842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 289.431135] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.214822] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 12:55:42 executing program 2: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) io_setup(0x9, &(0x7f0000000080)=0x0) io_destroy(r0) [ 290.844800] audit: type=1326 audit(1540385742.892:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7418 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 291.003725] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 291.010202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 291.018073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 291.600751] 8021q: adding VLAN 0 to HW filter on device team0 [ 291.637909] audit: type=1326 audit(1540385743.682:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7418 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 293.953722] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.511153] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 295.077785] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 295.085327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 295.093179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 12:55:47 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, "73797a310000000000004b1a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000800"}) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) [ 295.530754] input: syz1 as /devices/virtual/input/input5 [ 295.574827] input: syz1 as /devices/virtual/input/input6 [ 295.690810] 8021q: adding VLAN 0 to HW filter on device team0 12:55:49 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) getdents(0xffffffffffffffff, &(0x7f0000000200)=""/4096, 0x1000) 12:55:49 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x105000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000040)=0xf003) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='net/if_inet6\x00') getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x5, 0x2, 0x31e}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000180)={r3, 0x8}, 0x8) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000001c0)={0x9, 0x0, 0x10001, 0x9}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000200)={r4, 0x39}) eventfd2(0x9, 0x1) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000240)={'mangle\x00'}, &(0x7f00000002c0)=0x54) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x80, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000380)={0x7, 0x2, 0x10, &(0x7f0000000340)="b1159f40f68f5b17e311513f1c9ec969"}) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000003c0)=""/4096, &(0x7f00000013c0)=0x1000) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000001400)={r3, 0x9}, 0x8) vmsplice(r2, &(0x7f0000001b80)=[{&(0x7f0000001440)="5ccdb1d48178515ed29b89f80e51382c50fe6d7589b0a201f90c404a6e3b13a5078212cf923a05fe4f3bf51b39d953901e39fb4e77063652aacee5fa2bc40245ba29c550883a5389269027b5ca1e3197b0913360822c07f8760abdf6220c159bdea4a69c127ba3281b6f9de6fd21289e8b89f46ea7586d925c50c8c8e047e8c76d05edffa6c23f124aff53e6dfa195c7a425e766ccf413441f082a32d640dbc61496c6e0710f62212d4a", 0xaa}, {&(0x7f0000001500)="dcd984c859e874594d43bd9def71883ae2c2683d80f31034da41fa5cf44e6661e3e6d40e3ad69c937d61d2ebce92b4df27eaba1d8396b0ec577faa3a22a4589f6fb5caf225f8888445c4ea803f18d095f234c5f3cd951a734c27cdb7d70c3ca5944e563b215ae06bfcb29085c3f9fffd759004615a51511a85727ff0bc3bd28f9837bd572638ffef2397042388d3931566f1986aa04a18ecb07f912cc76648b93769c501058c5d0c2d0fa1131763b54a5f04aa73c23610468deac685d2d8991eb7d522302fdd2d3fdbefda9e9baf1517ae2b22", 0xd3}, {&(0x7f0000001600)="d94401e6bb6dd193a1aeae8f324cfc2aa0632ef0e7ad1d5b0b30f9e6c5d13d79232c6690156ef9bffc6e11b40a9f478dadfb35373634efb739ac050751ad5e92a3aebfb749d8ff4525342d3bae062b6036ae71b052b4043b514aa8acdfa18f5b2388c84b6cddd97b7a54df5ad74405d92564bb7ac04f006f6b89873afd1f013cc15fbce7fd2cd7995a2a879d4b3b42d818068a9408829e024228c1447f66ec36f920618c0da869d54a3e1a13596dbbc7d22de8427246acc0", 0xb8}, {&(0x7f00000016c0)="a16d3e31e2f1a3323c0f15f1c75fcbfb36051462355d04cf12469db4dcb845c3e1c593b3da0dd65e8be23c9c107207828c54a9e138c0c1e98fe4d3c51c47d5325ddca542ff706844da3f1694b6e9ef6b3f495b6cb22fdf7b53918a52cc", 0x5d}, {&(0x7f0000001740)="f44a5b124db3dab7b71677d5d2252a61919657059dfb4f335f071f2cefe20884ac92ae45e3a0299e5d52a5d2d6b45bd5a492dba2cd39fc1b521499a0c8266d1df5a9b4f32b06f8ed83fb5207ea1af2e070510589f527179b0c6b74070c51ba30a66f6d0be64a35c7dda70b050c4248620b03570875960ea27985ec9e5fd43cecefdacb2f530cf34785f1fcd00463260f9652b93d89ca76813377dc3a1eb47229d531dd046bb429ac937c95eb055fb827", 0xb0}, {&(0x7f0000001800)="37ba6636671cbc4e2dc25c5200c029d3a97ca8aa2c9cca1eaaf0814c94191de6ed93450a88ef11a6369c0ee89786edaffa32524633697fa10e97acdf0cefb403dd41ee94ff49fdc7ea27cb4fe103a9eaa6859fe05f0d8058f09b86f7ce76f64fe76f59e1ea58ca2edb8b1d852e0b04598e16e4893afae4d9f8c60e99dea7dcc28c72237b1979fbed54e8ee6386f815f7937b12", 0x93}, {&(0x7f00000018c0)="bfe52d4176d4fd4f41a6de938f35e9d43119ad131a14d9a6418e7eac218da8b07b6433047a636f3b45b6fbb9e1806cfd1197c23eb9484fb4b962e9ac2356c6ec528432c49402789af6062c65027da49a39f538224e0cd3ee37e215601192c2ee105157b57393cc001a37b729cf6fa36de27c04578fe7f3244695d0f819231e654993e888ece3f04bfc6cabc283333f341f6820ed1943901380091de6b3a69696987a7b80da28fbf1f4a977cc603b88a6b02c61580a09817a2ee6e5cee420d00f5eef8f49f2c786e7180c1f04896ef2a6aa3435a8e149d9", 0xd7}, {&(0x7f00000019c0)="2af545b86dcd95673e4e929f1183b4e6914fd7ce181ecdaaf63f9b41f7bb4c1ec2fcda6755588f8fa43dd85aa2d05482aac35b8d8d746112b2eda727c947ab54f3926e46ec004c07ecd33e7ca570fd472b7afb55ecb0d0a854150dfe0f01ea8a9a9be280ddbea3e46e77998fede2905b2f23a93fa8da86f34d5831b1f8224ee931325ef0019fec41df52142f7c24f4c1d83c78ad9f2d62185da970a3393c6e251d025e964c4b78e889", 0xa9}, {&(0x7f0000001a80)="f3f67b4f0b6606bc9da352e7f3bdc5d8d3ca162bc0b8b5cab93031ef6c841328d9e3cdbe92e75d35d90e72d39930f203fe2dcef8152bf60dce053c9b31c0113130150e65a04c054c3d8c5d8cb1eb9cf287b0bac189c8aeb50bbcc45425b7f57563f67bf63c6f00cea77e73cb034c362926ff32af19e3950b3798bfdc42a31fa831abbe2960b191dab1532079b66f8db95e4cbbfa0749a3ba9a0dcd52ae38e4769ebf9793c34d73589fb72e279209596d87aac98c5d1003354fd18ac86e62afeba5ecc476fdbd17fbfad8acf8cd5dda208703d924d7415d8c1768bfb334c32d2e0139c82d7dc06747c532b89a55fa66eed5be", 0xf2}], 0x9, 0x4) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000001c40)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}, &(0x7f0000001c80)=0x10) ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f0000001cc0)=""/172) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000001d80)=0xd, 0x4) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x3, 0x4) msgget$private(0x0, 0x80) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000001dc0)={&(0x7f0000ff9000/0x3000)=nil, 0x3000}, &(0x7f0000001e00)=0x10) ioctl$TUNSETNOCSUM(r5, 0x400454c8, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000001e40), &(0x7f0000001e80)=0x4) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000001ec0)={0x4db8, 0xed3}) ioctl$BLKPG(r0, 0x1269, &(0x7f0000001fc0)={0x51, 0xff, 0xb8, &(0x7f0000001f00)="9660454203fa8f81bd0aa768c1890905e026351e6d7525a86bf03c905adb35de1c541c7b800809a4a6a7f10b8673d8246d5389685036a5b77df1db8584e732cfeb00797b71a0dcebf776ad8ebcc0eb075447113aa46e94770c5ed305deed694fb6d02ec3e6ac2ad61ce1c9098c06c17f5f89384351b2c0d17dd037088888a46e65a62ee275dddd3ab760c1b30275f0b337f8513405bb26ea0d0a0bd29e1e9751194d8603bd73f8b0fdfb733d8288817be8e6f2990a8791b3"}) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000002000)="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") setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000003000)=0xdea4, 0x4) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0xeee) 12:55:49 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/fib_trie\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209, 0xd1}], 0x1, 0x10400003) 12:55:49 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:55:49 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x7f}) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000003c0), 0x7d) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000600)={0x0, 0x7, 0x6, 0xf0, &(0x7f0000000400)=""/240, 0xfffffdca, &(0x7f0000000380)=""/63, 0xf8, &(0x7f0000000500)=""/248}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x9f000000, 0xfffffffe, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000}) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000200)={0x0, 0x1, {0x1}}) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x9) 12:55:49 executing program 3: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x0) [ 297.911810] audit: type=1326 audit(1540385749.952:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7614 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 297.983764] hrtimer: interrupt took 51765 ns [ 297.997543] audit: type=1326 audit(1540385750.042:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7621 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:55:50 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@ipx, 0x80, &(0x7f0000000400)}, 0x0) 12:55:50 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)="2e2f6367726f7570000c239fd085acc49b812db3d73d43ea", 0x200002, 0x0) fchdir(r0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) [ 298.539326] audit: type=1326 audit(1540385750.582:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7630 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 298.668200] audit: type=1326 audit(1540385750.712:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7614 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:55:50 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000180)) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 298.740428] audit: type=1326 audit(1540385750.782:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7621 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:55:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") syz_emit_ethernet(0xff27, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x43, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000002c0)}, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000580)=@in6={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000600)=0x80, 0x0) 12:55:51 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000600)={'veth1_to_bond\x00', &(0x7f0000000640)=ANY=[@ANYBLOB='(']}) 12:55:51 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)="2e2f6367726f7570000c239fd085acc49b812db3d73d43ea", 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$tun(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1) fcntl$setstatus(r1, 0x4, 0x4bff) io_setup(0x1, &(0x7f00000001c0)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RWSTAT(r1, &(0x7f00000000c0)={0x7}, 0x7) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000200), 0xfffffd07}]) [ 299.164719] sit: non-ECT from 172.20.255.187 with TOS=0x3 [ 299.212886] sit: non-ECT from 172.20.255.187 with TOS=0x3 [ 299.251102] audit: type=1326 audit(1540385751.292:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7630 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 299.379651] IPVS: ftp: loaded support on port[0] = 21 12:55:51 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000c40)={0x20, 0x2, 0x1, 0x1, 0x0, 0x0, {}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2000000000000029, &(0x7f0000000100), 0xf3) [ 299.566176] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 299.597035] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 301.003779] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.010225] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.018770] device bridge_slave_0 entered promiscuous mode [ 301.100574] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.107149] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.115081] device bridge_slave_1 entered promiscuous mode [ 301.192344] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 301.270970] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 301.501865] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 301.582239] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 301.661742] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 301.668707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 301.745305] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 301.752325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 301.988496] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 301.996224] team0: Port device team_slave_0 added [ 302.074583] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 302.082551] team0: Port device team_slave_1 added [ 302.161115] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 302.241063] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 302.319770] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 302.327559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 302.336718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 302.410764] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 302.418112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 302.427557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 302.720627] ip (7744) used greatest stack depth: 53488 bytes left [ 303.440545] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.447008] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.453949] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.460372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.468632] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 303.642125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 306.669143] 8021q: adding VLAN 0 to HW filter on device bond0 [ 306.965737] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 307.258631] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 307.265149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 307.273153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 307.569742] 8021q: adding VLAN 0 to HW filter on device team0 12:56:01 executing program 5: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) personality(0x0) 12:56:01 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) shmdt(0x0) 12:56:01 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) munlockall() 12:56:01 executing program 0: clone(0x0, &(0x7f0000000500), &(0x7f00000001c0), &(0x7f0000000100), &(0x7f0000000140)) io_submit(0x0, 0x7fffffffefff, &(0x7f0000000a80)) 12:56:01 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced761) r1 = getpgid(0x0) sched_setattr(r1, &(0x7f00000003c0)={0x0, 0x2, 0x0, 0x0, 0x7}, 0x0) r2 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) lseek(r2, 0x0, 0x80000000000003) creat(&(0x7f0000000480)='./file0\x00', 0x0) 12:56:01 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_RMID(r1, 0x0) [ 309.497023] audit: type=1326 audit(1540385761.542:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7925 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 309.572550] audit: type=1326 audit(1540385761.622:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7928 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 309.671999] audit: type=1326 audit(1540385761.712:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7938 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/18) 12:56:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 12:56:02 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/190, 0xbe) 12:56:02 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) capget(&(0x7f0000000100)={0x20071026}, &(0x7f0000000180)) [ 310.274082] audit: type=1326 audit(1540385762.322:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7955 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 310.331302] audit: type=1326 audit(1540385762.352:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7925 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 310.353164] audit: type=1326 audit(1540385762.372:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7928 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 310.496393] capability: warning: `syz-executor3' uses deprecated v2 capabilities in a way that may be insecure [ 310.523163] audit: type=1326 audit(1540385762.482:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7938 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:02 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000180)) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 310.545032] audit: type=1326 audit(1540385762.492:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7962 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:02 executing program 4: 12:56:02 executing program 5: 12:56:02 executing program 2: 12:56:03 executing program 5: 12:56:03 executing program 4: [ 311.051746] audit: type=1326 audit(1540385763.092:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7955 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 311.215497] audit: type=1326 audit(1540385763.262:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7962 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:03 executing program 1: 12:56:03 executing program 5: 12:56:03 executing program 0: 12:56:03 executing program 4: 12:56:03 executing program 2: 12:56:03 executing program 3: 12:56:03 executing program 5: 12:56:03 executing program 0: 12:56:03 executing program 4: 12:56:04 executing program 1: 12:56:04 executing program 2: 12:56:04 executing program 3: 12:56:04 executing program 5: 12:56:04 executing program 4: getrandom(&(0x7f00000000c0)=""/241, 0xf1, 0x2) 12:56:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000300)=0x10000000000062) read(r1, &(0x7f0000000080)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f00000000c0)) dup3(r2, r1, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)) 12:56:04 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) 12:56:04 executing program 3: unshare(0x20000000) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, 0x0, 0x40000000, &(0x7f00000002c0)) 12:56:04 executing program 2: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/57) 12:56:04 executing program 5: request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000040)='.[\x00', 0xfffffffffffffffb) 12:56:04 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 12:56:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\'', 0x1, r0) 12:56:05 executing program 5: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) chdir(&(0x7f0000000080)='./file0\x00') 12:56:05 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={0x8}, &(0x7f0000000100), 0x0) 12:56:05 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\'', 0x1, r0) 12:56:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, "73797a310000000000004b1a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000800"}) rt_sigtimedwait(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)={0x77359400}, 0x8) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) 12:56:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@random={'osx.', 'systemmime_typelo\x00'}, &(0x7f0000000340)=""/182, 0xb6) [ 313.556178] input: syz1 as /devices/virtual/input/input7 12:56:05 executing program 2: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) 12:56:05 executing program 0: r0 = socket$packet(0x11, 0x40000000000a, 0x300) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x2}, 0xf) write$P9_RXATTRCREATE(r2, &(0x7f0000000200)={0xffffffffffffffef}, 0xfdb1) creat(&(0x7f0000000180)='./bus\x00', 0x0) rename(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file0\x00') 12:56:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcdb1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:56:06 executing program 4: clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000c35ffc), &(0x7f0000000140)) getpgrp(0xffffffffffffffff) 12:56:06 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) chroot(&(0x7f0000000040)='./file0\x00') 12:56:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x24e23, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000000100)='<', 0x1, 0x1100020000801, &(0x7f00000002c0)={0x2, 0x4e23, @local}, 0x10) recvfrom$inet(r1, &(0x7f00000000c0), 0x0, 0x1, &(0x7f0000000140)={0x2, 0x0, @loopback}, 0x705000) 12:56:06 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x2a, 0x0, @thr={&(0x7f0000000100), &(0x7f0000000080)}}, &(0x7f0000000200)) timer_getoverrun(0x0) [ 314.344530] input: syz1 as /devices/virtual/input/input8 12:56:06 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) nanosleep(&(0x7f0000000040), &(0x7f0000000080)) [ 314.615881] kauditd_printk_skb: 10 callbacks suppressed [ 314.615916] audit: type=1326 audit(1540385766.662:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8098 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 314.747571] audit: type=1326 audit(1540385766.702:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8072 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x24e23, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000000100)='<', 0x1, 0x1100020000801, &(0x7f00000002c0)={0x2, 0x4e23, @local}, 0x10) recvfrom$inet(r1, &(0x7f00000000c0), 0x0, 0x1, &(0x7f0000000140)={0x2, 0x0, @loopback}, 0x705000) 12:56:06 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x2000) close(r0) 12:56:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={&(0x7f0000000ac0), 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)=@newlink={0x34, 0x10, 0x621, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0x4}}}]}, 0x34}}, 0x0) 12:56:07 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f0000002ec0)=[{{&(0x7f0000000340)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "b4b9cea0dc5ffb64461377415f55a1d601b2e7bb5f59c102d1e64e98058aa82259de88eed7f74a3e98e9a387906294559b41bae4a13c96dd055c7f36f9b10c"}, 0x80, &(0x7f0000001b00), 0x0, &(0x7f0000001b80)}}], 0x1, 0x20008800) [ 315.158033] audit: type=1326 audit(1540385767.202:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8085 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x24e23, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000000100)='<', 0x1, 0x1100020000801, &(0x7f00000002c0)={0x2, 0x4e23, @local}, 0x10) recvfrom$inet(r1, &(0x7f00000000c0), 0x0, 0x1, &(0x7f0000000140)={0x2, 0x0, @loopback}, 0x705000) 12:56:07 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000003c0), 0x7d) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000600)={0x0, 0x7, 0x6, 0xf0, &(0x7f0000000400)=""/240, 0xfffffdca, &(0x7f0000000380)=""/63, 0xf8, &(0x7f0000000500)=""/248}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x9f000000, 0xfffffffe, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000}) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000200)={0x0, 0x1, {0x1}}) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x9) [ 315.365152] audit: type=1326 audit(1540385767.412:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8098 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:07 executing program 3: 12:56:07 executing program 4: 12:56:07 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) chroot(&(0x7f0000000040)='./file0\x00') 12:56:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x24e23, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000000100)='<', 0x1, 0x1100020000801, &(0x7f00000002c0)={0x2, 0x4e23, @local}, 0x10) recvfrom$inet(r1, &(0x7f00000000c0), 0x0, 0x1, &(0x7f0000000140)={0x2, 0x0, @loopback}, 0x705000) 12:56:08 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x0, @loopback}, 0x10) 12:56:08 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) mkdir(&(0x7f0000000680)='./control\x00', 0x0) r0 = open(&(0x7f0000000600)='./control\x00', 0x0, 0x0) mknodat(r0, &(0x7f00000000c0)='./control\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000040)='./control\x00', r0, &(0x7f0000000100)='./file0\x00') [ 316.061913] audit: type=1326 audit(1540385768.052:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8138 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") flistxattr(r0, &(0x7f0000000180)=""/151, 0x97) [ 316.290812] audit: type=1326 audit(1540385768.332:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8149 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:08 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x7f, 0x8, 0xfffffffffffffffe}, 0xe) 12:56:08 executing program 5: 12:56:08 executing program 2: 12:56:08 executing program 4: 12:56:09 executing program 0: [ 317.043205] audit: type=1326 audit(1540385769.092:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8149 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:09 executing program 2: 12:56:09 executing program 5: 12:56:09 executing program 3: 12:56:09 executing program 4: 12:56:09 executing program 2: 12:56:09 executing program 1: 12:56:09 executing program 0: 12:56:09 executing program 5: 12:56:09 executing program 3: 12:56:09 executing program 4: 12:56:10 executing program 2: 12:56:10 executing program 5: 12:56:10 executing program 0: 12:56:10 executing program 1: 12:56:10 executing program 3: 12:56:10 executing program 5: 12:56:10 executing program 4: 12:56:10 executing program 3: 12:56:10 executing program 2: 12:56:10 executing program 0: 12:56:10 executing program 1: 12:56:10 executing program 4: 12:56:10 executing program 5: 12:56:11 executing program 0: 12:56:11 executing program 3: 12:56:11 executing program 2: 12:56:11 executing program 1: 12:56:11 executing program 5: 12:56:11 executing program 4: 12:56:11 executing program 0: 12:56:11 executing program 2: 12:56:11 executing program 3: 12:56:11 executing program 1: 12:56:11 executing program 4: 12:56:11 executing program 5: 12:56:11 executing program 0: 12:56:12 executing program 3: 12:56:12 executing program 2: 12:56:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x1}) 12:56:12 executing program 5: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) 12:56:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f0000000000)=0xfffffe32) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0), 0x4) sendmmsg(r1, &(0x7f0000003e00)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="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", 0x1000}], 0x1, &(0x7f0000001480)=[{0xc8, 0x13f, 0x1f, "f58b3f7f2e4f3117f363c867f41ade92b6808df7629e21a2ea4a80540f07108bf3d290681617e478dc8868a7bcae623a86583d79a0f652222465e58f81cf6d6dfd6ccf73fca444b69179a2758f1447860b8bc0dcb96ee8264470cb48d8cd9c480d58c63f0fa806c799e8f8631a85ec94e953637eb72120e6781f3fcc3be967dac4f032341d72d502c407e9bd2f0c5e9f2def46869312d9fa1802cb24eaf1e6ef02e8deae37fa4db39410647b74df1aaf69"}], 0xc8}, 0x3ff}, {{&(0x7f00000001c0)=@sco={0x1f, {0x0, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000003b40)=[{&(0x7f0000002880)}], 0x1, &(0x7f0000003c00)}, 0x3b1}], 0x2, 0xc000) 12:56:12 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xd0b261bdca025373, 0x0) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='system.posix_acl_access\x00') 12:56:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000300)="67660f3a400300baf80c66b85fbeb78066efbafc0cb0e3eeba200066edc30f350f20e06635200000000f22e0660f3830b3708f3e0f060f01712166b9800000c00f326635000100000f30", 0x4a}], 0x1, 0x13, &(0x7f0000000380), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="f0811a08002ef2260f0134440f20c0663503000000440f22c0660f73f7bfdca59100b889098ed80fb4940040262e0fc72fbaf80c66b858799d8c66efbafc0cb0c3ee2e660f3806fc", 0x48}], 0x1, 0x0, &(0x7f0000000140)=[@flags], 0x1) 12:56:12 executing program 3: pipe(&(0x7f0000000180)) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040)={0x40}, 0x8) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) [ 320.526446] audit: type=1326 audit(1540385772.572:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8257 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:12 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwritev(r1, &(0x7f0000001840)=[{&(0x7f0000000840)="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", 0xadd}], 0x1, 0x0) 12:56:12 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4000) io_setup(0x1002, &(0x7f0000000040)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 12:56:12 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) [ 320.989023] *** Guest State *** [ 320.992675] CR0: actual=0x0000000080000039, shadow=0x00000000e0000019, gh_mask=fffffffffffffff7 [ 321.001936] CR4: actual=0x0000000000002070, shadow=0x0000000000000030, gh_mask=ffffffffffffe871 [ 321.010825] CR3 = 0x0000000000004000 [ 321.014739] PDPTR0 = 0x00000000000000e7 PDPTR1 = 0x0000000000000000 [ 321.021294] PDPTR2 = 0x0000000000000000 PDPTR3 = 0x0000000000000000 [ 321.027990] RSP = 0x0000000000000f6e RIP = 0x000000000000912c [ 321.034102] RFLAGS=0x00000006 DR7 = 0x0000000000000400 [ 321.040166] Sysenter RSP=0000000000000f80 CS:RIP=0030:0000000000002810 [ 321.047052] CS: sel=0x0010, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 321.055200] DS: sel=0x0000, attr=0x100f3, limit=0x0000ffff, base=0x0000000000000000 [ 321.063406] SS: sel=0x0038, attr=0x04093, limit=0x0000ffff, base=0x0000000000000000 [ 321.071449] ES: sel=0x0000, attr=0x100f3, limit=0x0000ffff, base=0x0000000000000000 [ 321.079632] FS: sel=0x0000, attr=0x100f3, limit=0x0000ffff, base=0x0000000000000000 [ 321.087767] GS: sel=0x0000, attr=0x100f3, limit=0x0000ffff, base=0x0000000000000000 [ 321.095921] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 321.104056] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 321.112153] IDTR: limit=0x000001ff, base=0x0000000000003800 [ 321.120183] TR: sel=0x00d0, attr=0x0008b, limit=0x000001ff, base=0x0000000000004e00 [ 321.128286] EFER = 0x0000000000000001 PAT = 0x0007040600070406 12:56:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) [ 321.134816] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 321.142392] Interruptibility = 00000000 ActivityState = 00000000 [ 321.148656] *** Host State *** [ 321.151986] RIP = 0xffffffff812bde4b RSP = 0xffff8801799ff428 [ 321.158073] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 321.164686] FSBase=00007f7a3783e700 GSBase=ffff88021fc00000 TRBase=fffffe0000003000 [ 321.172616] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 321.178555] CR0=0000000080050033 CR3=000000012c3a8000 CR4=00000000001426f0 [ 321.185760] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff8ac01260 [ 321.192581] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 321.198677] *** Control State *** [ 321.202318] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 321.209036] EntryControls=0000d1ff ExitControls=002fefff [ 321.214671] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 321.221720] VMEntry: intr_info=00000306 errcode=00000000 ilen=00000000 [ 321.228436] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 321.235169] reason=80000021 qualification=0000000000000002 [ 321.241617] IDTVectoring: info=00000000 errcode=00000000 [ 321.247121] TSC Offset = 0xffffff4ece6e5071 [ 321.251507] EPT pointer = 0x000000012b4ff01e [ 321.259955] audit: type=1326 audit(1540385773.302:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8283 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000300)=0x10000000000062) read(r1, &(0x7f0000000080)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6}) dup3(r2, r1, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)) [ 321.336189] audit: type=1326 audit(1540385773.352:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8257 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f00000003c0)=0x1, 0x800000000008, 0x0, &(0x7f0000000280)={0x77359400}, &(0x7f0000048000), 0x0) 12:56:13 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x7f}) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000003c0), 0x7d) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000600)={0x0, 0x7, 0x6, 0xf0, &(0x7f0000000400)=""/240, 0xfffffdca, &(0x7f0000000380)=""/63, 0xf8, &(0x7f0000000500)=""/248}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x9f000000, 0xfffffffe, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000}) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000200)={0x0, 0x1, {0x1}}) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x9) 12:56:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f000000a580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a5c0)=0x14) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f0000000240)) 12:56:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000018100)={&(0x7f0000017740)=ANY=[@ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300460000000800040000000000"], 0x1}}, 0x0) 12:56:14 executing program 5: pipe(&(0x7f0000000180)) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) [ 321.986068] audit: type=1326 audit(1540385774.032:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8283 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000000c0)) 12:56:14 executing program 0: socketpair$unix(0x1, 0x40100000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00') 12:56:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000380)={0x10203, 0x0, &(0x7f0000ffa000/0x4000)=nil}) 12:56:14 executing program 2: add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000200)={'syz'}, &(0x7f0000000280)="98", 0x1, 0xfffffffffffffffc) 12:56:14 executing program 1: pipe(&(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 12:56:14 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000140)=0xfffffffffffffffe, 0x4) socket(0x10, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000001240)='net/ip_tables_targets\x00') sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r2, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt(r3, 0x1, 0x2, &(0x7f0000008d00)=""/130, &(0x7f0000008dc0)=0x82) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x22}]}, 0x10) sendto$inet(r3, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) clock_gettime(0x0, &(0x7f0000005180)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000004f00)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/195, 0xc3}, {&(0x7f0000000280)=""/148, 0x94}], 0x2, &(0x7f0000000340)=""/139, 0x8b, 0x1}, 0xffffffff}, {{&(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/114, 0x72}, {&(0x7f0000000480)=""/38, 0x26}], 0x2, &(0x7f0000000500)=""/198, 0xc6, 0x2}, 0x1ff}, {{&(0x7f0000000600)=@vsock, 0x80, &(0x7f0000000740)=[{&(0x7f0000000680)=""/89, 0x59}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000000700)=""/15, 0xf}], 0x3, 0x0, 0x0, 0x7cab}, 0xffffffffffffff64}, {{&(0x7f0000000780)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000800)=""/242, 0xf2}, {&(0x7f0000000900)=""/238, 0xee}], 0x2, 0x0, 0x0, 0x9}, 0x40}, {{&(0x7f0000000a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000ac0)=""/145, 0x91}, {&(0x7f0000000b80)=""/248, 0xf8}, {&(0x7f0000000c80)=""/29, 0x1d}, {&(0x7f0000000cc0)=""/239, 0xef}, {&(0x7f0000002340)=""/4096, 0x1000}, {&(0x7f0000000dc0)=""/255, 0xff}, {&(0x7f0000000ec0)=""/57, 0x39}, {&(0x7f0000000f00)=""/130, 0x82}], 0x8, &(0x7f0000001040)=""/20, 0x14}, 0x800}, {{&(0x7f0000001080)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)=""/43, 0x2b}, {&(0x7f0000001140)=""/24, 0x18}], 0x2, &(0x7f00000011c0)=""/150, 0x96, 0xfffffffffffffe00}, 0x200}, {{&(0x7f0000003340)=@xdp, 0x80, &(0x7f0000003500)=[{&(0x7f0000001280)=""/55, 0x37}, {&(0x7f00000033c0)=""/151, 0x97}, {&(0x7f0000003480)=""/88, 0x58}], 0x3, &(0x7f0000003540)=""/190, 0xbe, 0x100}, 0x1ff}, {{&(0x7f0000003600)=@nfc, 0x80, &(0x7f0000003800)=[{&(0x7f0000003680)=""/175, 0xaf}, {&(0x7f0000003740)=""/114, 0x72}, {&(0x7f00000037c0)=""/7, 0x7}], 0x3, &(0x7f0000003840)=""/105, 0x69}, 0x10001}, {{&(0x7f00000038c0)=@nfc, 0x80, &(0x7f0000004c80)=[{&(0x7f0000003940)=""/32, 0x20}, {&(0x7f0000003980)=""/216, 0xd8}, {&(0x7f0000003a80)=""/3, 0x3}, {&(0x7f0000003ac0)=""/4096, 0x1000}, {&(0x7f0000004ac0)=""/45, 0x2d}, {&(0x7f0000004b00)=""/189, 0xbd}, {&(0x7f0000004bc0)=""/130, 0x82}], 0x7, 0x0, 0x0, 0x2000}, 0x7ff}, {{&(0x7f0000004d00)=@can, 0x80, &(0x7f0000004ec0)=[{&(0x7f0000004d80)=""/8, 0x8}, {&(0x7f0000004dc0)=""/228, 0xe4}], 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffe4f0}], 0xa, 0x100, &(0x7f00000051c0)={r4, r5+30000000}) connect(r3, &(0x7f00000012c0)=@nl=@unspec, 0x80) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 12:56:14 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x0, 0x0, 0xff, 0x3}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x88d9, @loopback}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000004c0)={@mcast2}, &(0x7f0000000900)=0x20) 12:56:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") fsetxattr(r0, &(0x7f0000000180)=@random={'user.', '&/procem1*ppp1\x00'}, &(0x7f00000001c0)='\'\x00', 0x2, 0x0) 12:56:15 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x24e23, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000000100)='<', 0x1, 0x1100020000801, &(0x7f00000002c0)={0x2, 0x4e23, @local}, 0x10) recvfrom$inet(r1, &(0x7f00000000c0), 0xfffffdce, 0x1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x278bded9c2b0425f) 12:56:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000040)) 12:56:15 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000400)=""/119) 12:56:15 executing program 5: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) [ 323.385809] audit: type=1326 audit(1540385775.432:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8359 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000180)=0x3) [ 323.519299] audit: type=1326 audit(1540385775.562:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8365 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:15 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) munmap(&(0x7f00001bf000/0x2000)=nil, 0x2000) 12:56:16 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000080)) socket$netlink(0x10, 0x3, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x7f}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000600)={0x0, 0x7, 0x6, 0xf0, &(0x7f0000000400)=""/240, 0xfffffdca, &(0x7f0000000380)=""/63, 0xf8, &(0x7f0000000500)=""/248}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x9f000000, 0xfffffffe, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000}) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000009c0)=ANY=[], &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000200)={0x0, 0x1, {0x1}}) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x9) [ 323.887567] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:56:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) munmap(&(0x7f00001bf000/0x2000)=nil, 0x2000) [ 324.150486] audit: type=1326 audit(1540385776.192:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8359 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 324.308516] audit: type=1326 audit(1540385776.332:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8365 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 324.406317] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 324.883028] mmap: syz-executor1 (8393) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 12:56:17 executing program 5: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000000)) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000040)='.[\x00', 0xfffffffffffffffb) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000240)={@local, 0x0}, &(0x7f0000000280)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000002c0)=r1) getpeername$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0xfffffffffffffffe) 12:56:17 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) getpid() 12:56:17 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') sendfile(r0, r1, &(0x7f00000000c0), 0x80000002) 12:56:17 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mmap$binder(&(0x7f000022b000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00000000c0), 0x1, 0x2000000000002) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x1, 0x4000) write$P9_RREAD(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="2c0000007502002100000074a16bfdde6fbc6231c12bb95f7258ba14f3e0141136719977e83276a9f3599305"], 0x2c) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001480)={{{@in=@rand_addr, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setresuid(r3, r4, r5) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000400)=@generic={0x3, "dfb643ef1bdf412da010d4c6963f2a772df25c6bb650a3c4421cc6a60f1403e4e25201ae6e7db85f113e67301c1c6591c1a4d0c8b70ca25500b26f28153080c8be2fd86e088390e0dae11248b427016c0d2dc3e0b6498eb11b213f5dfcae56d640a94000f4615e71f4e65f818bd6ab07f64c7a953ee0e707d919e3e7326b"}, 0x80, &(0x7f0000000300), 0x4, &(0x7f0000000340), 0x7c, 0x20000810}, 0x0) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f00000001c0)) r6 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xe49, 0xa200) ioctl$RTC_ALM_SET(r6, 0x40247007, &(0x7f0000000040)={0x28, 0x19, 0x17, 0x1d, 0x2, 0x2, 0x3, 0xa7, 0x1}) getsockname$inet(r2, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f0000000180)=0x10) getrandom(&(0x7f0000000480)=""/4096, 0x1000, 0x2) 12:56:17 executing program 2: pipe(&(0x7f0000000180)) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r0+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) [ 325.359377] audit: type=1326 audit(1540385777.372:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8404 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:17 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000640)=ANY=[]}}, 0x40000) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast1, @remote}, &(0x7f0000000080)=0xc) socket$inet6(0xa, 0x0, 0xc270) r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000500)={0x20}, 0x20) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={&(0x7f0000000540)=ANY=[]}}, 0x40000) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000000c0)) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000001280)='ip6gretap0\x00', 0x10) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) request_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440)='ip6gretap0\x00', 0xfffffffffffffffa) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000740)="ab39042d428f3682c4f256aa92e2e4016f7e250f6ccd9449ef6c506ee24be3c57c66c647a8430ec7ee4670feed5cc2d06ba677774cc6b2471168e9f69c8e1caeb2df935ead0ff12efd4a30c55db790f459d60ec2eaa13b", 0x57) 12:56:17 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) preadv(r0, &(0x7f00000005c0), 0x0, 0x0) 12:56:17 executing program 2: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 12:56:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000140)) [ 325.658230] audit: type=1326 audit(1540385777.702:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8415 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 325.790622] audit: type=1326 audit(1540385777.832:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8421 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 326.092518] audit: type=1326 audit(1540385778.142:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8404 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:18 executing program 0: r0 = socket$inet6(0xa, 0x9000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000300)=""/28) [ 326.488098] audit: type=1326 audit(1540385778.532:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8415 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:18 executing program 1: [ 326.644845] audit: type=1326 audit(1540385778.612:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8421 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:18 executing program 3: 12:56:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 12:56:19 executing program 0: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000300)="98", 0x1, 0xfffffffffffffffc) 12:56:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 12:56:21 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) rt_sigsuspend(&(0x7f0000000180), 0x8) 12:56:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 12:56:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") fsetxattr(r0, &(0x7f0000000000)=@known='user.syz\x00', &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00", 0x39, 0x0) 12:56:21 executing program 4: 12:56:21 executing program 5: 12:56:21 executing program 3: [ 329.289867] audit: type=1326 audit(1540385781.332:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8468 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:21 executing program 5: 12:56:21 executing program 3: 12:56:21 executing program 4: 12:56:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 12:56:21 executing program 1: 12:56:21 executing program 5: [ 330.110317] audit: type=1326 audit(1540385782.152:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8468 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:22 executing program 0: 12:56:22 executing program 3: 12:56:22 executing program 4: 12:56:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 12:56:22 executing program 1: 12:56:22 executing program 5: 12:56:22 executing program 4: 12:56:22 executing program 1: 12:56:22 executing program 0: 12:56:22 executing program 5: 12:56:22 executing program 3: 12:56:22 executing program 4: 12:56:22 executing program 3: 12:56:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 12:56:23 executing program 1: 12:56:23 executing program 5: 12:56:23 executing program 0: 12:56:23 executing program 4: 12:56:23 executing program 3: 12:56:23 executing program 1: 12:56:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 12:56:23 executing program 0: 12:56:23 executing program 5: 12:56:23 executing program 4: 12:56:23 executing program 3: 12:56:23 executing program 0: request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000200), 0x0) 12:56:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)="b6", 0x1, 0xfffffffffffffffc) 12:56:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 12:56:24 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 12:56:24 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000080)={0x80, 0x0, 0x2}) 12:56:24 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000009c0)) inotify_init1(0x0) [ 332.269859] audit: type=1326 audit(1540385784.312:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8551 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:24 executing program 2: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 12:56:24 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000001700)) 12:56:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) [ 332.524320] audit: type=1326 audit(1540385784.572:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8559 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:24 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000080)={0x80, 0x0, 0x2}) 12:56:24 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) setsockopt$inet_dccp_buf(r1, 0x21, 0xd, &(0x7f0000000140)="607f6849c6b37d16e8d341a6a8f9b76e29724502506409ce207f5fc5535913b687f644e815492e5c7607f8c53d3bb37257edeb3a3b41279625777db28568a4095469d969cf88aa1bf2f0031ef860e72d1f8cec4651767e0156f4fb9e8bcb2e61d076ecde7388b232f219b226c6fe22bff28244bbba1fb0dbf7173ef60585226124897034cb36e89dba59773815440817cfcc0a02b652bbf967efb7efad41", 0x9e) bind$can_raw(r0, &(0x7f0000000240), 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000100)='\x00\x00\x00\x00', 0x4) fcntl$setflags(r1, 0x2, 0x1) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x0) 12:56:24 executing program 2: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 12:56:25 executing program 5: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) setitimer(0x0, &(0x7f0000000280), &(0x7f00000002c0)) [ 333.017385] audit: type=1326 audit(1540385785.062:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8551 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) membarrier(0x0, 0x0) 12:56:25 executing program 2: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) [ 333.282356] audit: type=1326 audit(1540385785.322:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8559 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:25 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) io_setup(0x9, &(0x7f0000000080)) 12:56:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000200)='.[\x00', 0xfffffffffffffffb) 12:56:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) socket(0x10, 0x2, 0xc) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000580)={0x6a, 0x7d, 0x0, {{0x0, 0x54, 0x81, 0x0, {0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x4, 0x12, '/dev/loop-control\x00', 0x0, "", 0x8, 'keyring\x00', 0x7, 'vmnet0-'}, 0x1, '\x00'}}, 0x6a) syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a") setresuid(0x0, 0xee01, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)="b6", 0x1, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0x0) 12:56:25 executing program 0: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000200), 0x0) 12:56:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") fchown(r0, 0x0, 0x0) [ 333.757736] audit: type=1326 audit(1540385785.802:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8601 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 12:56:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") fchown(r0, 0x0, 0x0) 12:56:26 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000001c0)=""/58) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000140)) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000000500)={0x90, 0x0, 0x4, {0x0, 0x1, 0x100000001, 0x9, 0x0, 0xffffffffffffff2f, {0x1, 0x90, 0x101, 0xffffffffffff6337, 0x8, 0x4, 0x7fffffff, 0x81, 0x0, 0x0, 0x2, 0x0, r3, 0x9, 0x40000000000000}}}, 0x90) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) write(r1, &(0x7f0000000340), 0x10000014c) openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r5+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:56:26 executing program 5: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) setreuid(0x0, 0x0) 12:56:26 executing program 4: llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/17, 0x11) seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f0000001300)='/dev/sequencer\x00', 0x0, 0x0) [ 334.175119] audit: type=1326 audit(1540385786.222:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8620 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 12:56:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$unix(r0, &(0x7f0000000500)=@abs, &(0x7f0000000580)=0x6e) [ 334.338890] audit: type=1326 audit(1540385786.382:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8628 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x7ffc0000 [ 334.436349] audit: type=1326 audit(1540385786.422:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8628 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x7ffc0000 [ 334.458185] audit: type=1326 audit(1540385786.422:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8628 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x7ffc0000 [ 334.479753] audit: type=1326 audit(1540385786.422:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8628 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x7ffc0000 12:56:26 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200), &(0x7f0000000180)='./file0\x00', &(0x7f0000000480)="b3b8155713fb18dea1325403cf49458ea055d7591982903d491d14c2e9cbc39e8bf705c21d4cc6c570ba1b1b03c6db40040c163a6dee9329d669c3a83a02ef2119957d6d4d06f79c5d29c3f97acbbbd1a0034898939712cc63020f31107f31c3a7ea6b055a3d9cd058451eefee6ebdb0357831796761e16f810e2452be7d0bbb99ee890739873f2de48187428342a5e95f625e7b49265dcb01cdb718bd2920863ed6af48bf044ad87394625a24423d5fefebc93d3a4a96d582c636a0bc3ec3fa80854deb41daa221d12ed5bdc1aeaabed9dcbb850b47a98ab25649387ab11d7b205a07b9082b736c17f97d", 0x0, 0x0) 12:56:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 12:56:26 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) r0 = shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) shmdt(r0) 12:56:26 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) unshare(0x400) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_team\x00', 0x0}) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") sendmmsg(r0, &(0x7f0000008a80)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x2d3, &(0x7f0000000200), 0x0, &(0x7f0000000480)=[{0x10}], 0x10}}], 0x5ec5f144db556138, 0x0) 12:56:27 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) splice(0xffffffffffffffff, &(0x7f0000000240), 0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0) 12:56:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 12:56:27 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f00000000c0)) 12:56:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000100)={r2}) 12:56:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 12:56:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)="6f6f6d5f73636f72655f61646a00f9a1d5028f7543b0a29d8da9abf5b11eb19152d43799fb057afd476975cc7794bdd6a94f0eacad59c06e9ebe44aa59ec910d4d5dde09fa1ab53c12816ecb97bde4e8d597494c3000780a08caad7d3d289a1adee3ae65de8c3ff308aff95863042e0015ee3c27152bca00fc96d3285939e0ddcf018942711e62") pread64(r0, &(0x7f0000000080)=""/111, 0x6f, 0x0) 12:56:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x2, 0x0, [0xc0000101]}) 12:56:27 executing program 1: request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000200)='.[\x00', 0xfffffffffffffffb) 12:56:27 executing program 4: request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000040)='.[\x00', 0xfffffffffffffffb) 12:56:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000200)='.[\x00', 0x0) 12:56:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 12:56:28 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, &(0x7f0000000700), 0x0, 0x0, &(0x7f00000005c0)={0xa, 0x3, 0x0, @mcast2}, 0x1c) 12:56:28 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file1/file0\x00') chdir(&(0x7f0000000000)='./file1/file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) 12:56:28 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x175d900f) 12:56:28 executing program 5: r0 = socket$inet6(0xa, 0x100000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) write(r0, &(0x7f00000001c0), 0x0) 12:56:28 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xfffffffffffffffd, 0x7d, 0x0, 0x0, 0x0}, 0x2c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in=@rand_addr, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="da21dee3d987aee06c82f53d98ba70496ff22b5462ea7a6d3f2a83e6"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000700)=""/4096}, 0x48) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000140)={0x0, @speck128, 0x0, "e0b49d64cd4eb1b2"}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240), 0xfffffffffffffefc) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f0000000200)=0x1c) fcntl$addseals(r2, 0x409, 0x5) keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000300)=""/246) ioctl$EVIOCGREP(r1, 0x40047459, &(0x7f0000000240)=""/174) io_setup(0x3, &(0x7f0000000bc0)) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x7) readv(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/132, 0x84}], 0x1) ustat(0x2, &(0x7f0000001700)) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000ac0)) write$P9_RCREATE(r1, &(0x7f0000000080)={0x6c6f25688faa5297}, 0x18) r3 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000006c0)) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x192, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, &(0x7f0000000080), &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x20a) rt_sigreturn() fcntl$getownex(r3, 0x10, &(0x7f00000004c0)={0x0, 0x0}) ioprio_set$pid(0x1, r4, 0x80) 12:56:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x24e23, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000000100)='<', 0x1, 0x1100020000801, &(0x7f00000002c0)={0x2, 0x4e23, @local}, 0x10) recvfrom$inet(r1, &(0x7f00000000c0), 0x0, 0x1, &(0x7f0000000140)={0x2, 0x0, @loopback}, 0x10) 12:56:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='illinois\x00', 0x9) 12:56:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 12:56:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) mlockall(0x2) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) write$P9_RCLUNK(r2, &(0x7f0000000000)={0x7}, 0x7) 12:56:29 executing program 1: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000200)={'syz'}, &(0x7f0000000280)="98", 0x1, 0xfffffffffffffffc) keyctl$update(0x2, r0, &(0x7f00000002c0)='u', 0x1) 12:56:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000340)={{0x2, 0x0, @dev}, {0x0, @random="5d982d051370"}, 0x0, {0x2, 0x0, @multicast1}, 'veth0_to_bridge\x00'}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x3f8) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 12:56:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 12:56:29 executing program 5: sendmsg$rds(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/191, 0xbf}], 0x2, &(0x7f0000000640)=ANY=[]}, 0x20000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:56:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000001c0)=""/11, 0x222) prctl$intptr(0x1d, 0xfffffffffffff433) prctl$intptr(0x1e, 0x0) syz_execute_func(&(0x7f0000000040)="3666440f9bf56664400f9f3241c3c4e2c9975842c4c27d794e003e0f11581010196f04cd04cd0f2902") 12:56:29 executing program 1: request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000040)='.[\x00', 0xfffffffffffffffb) 12:56:29 executing program 3: 12:56:29 executing program 4: 12:56:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) 12:56:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) 12:56:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000040)=0x8000) [ 338.235789] kauditd_printk_skb: 22 callbacks suppressed [ 338.235824] audit: type=1326 audit(1540385790.282:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8773 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:30 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000640)=ANY=[]}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 12:56:30 executing program 1: 12:56:30 executing program 2: 12:56:30 executing program 1: 12:56:30 executing program 4: [ 338.975729] audit: type=1326 audit(1540385791.022:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8773 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:31 executing program 0: 12:56:31 executing program 2: 12:56:31 executing program 1: 12:56:31 executing program 4: 12:56:31 executing program 5: 12:56:31 executing program 2: 12:56:31 executing program 0: 12:56:31 executing program 3: 12:56:31 executing program 1: 12:56:31 executing program 5: 12:56:31 executing program 2: 12:56:31 executing program 4: 12:56:32 executing program 0: 12:56:32 executing program 3: 12:56:32 executing program 5: 12:56:32 executing program 4: 12:56:32 executing program 1: 12:56:32 executing program 2: 12:56:32 executing program 3: 12:56:32 executing program 0: 12:56:32 executing program 4: 12:56:32 executing program 5: 12:56:32 executing program 2: 12:56:32 executing program 1: 12:56:32 executing program 3: 12:56:33 executing program 0: 12:56:33 executing program 4: 12:56:33 executing program 5: 12:56:33 executing program 2: 12:56:33 executing program 3: 12:56:33 executing program 1: 12:56:33 executing program 0: 12:56:33 executing program 5: 12:56:33 executing program 4: 12:56:33 executing program 3: 12:56:33 executing program 2: 12:56:33 executing program 1: 12:56:34 executing program 2: 12:56:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") fsetxattr(r1, &(0x7f0000000000)=@known='user.syz\x00', &(0x7f0000000140)="2f0409004bddd9de91be10eebf000ee9a90f798058439ed554af1f02acc7edbcd7a071fb35331ce39c5a0000000000000000080000000000000000000aaad955a3c93f9d248b46a7c99eb35b406bf918ff01739e56187b2db8f1074424745271062042fb3808186e0a837132f9108c583073a4ca94b3e4e58717fe2b659fa3903c7b73bd66b83f5ecc0a7361257896883f1b43ff4ec0a1e336b92f705461af0b60825a7834ffd0a7339d85c51b8db7b4c0e4f40953dd2d9f2110f04c9fdf8489eaa996", 0xc3, 0x0) 12:56:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") fsetxattr(r0, &(0x7f0000000080)=@random={'user.', 'vmnet0\x00'}, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00", 0x28, 0x0) 12:56:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000240)={0x0, 0x1f, 0x2, 0x0, 0x1, [{}]}) 12:56:34 executing program 5: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) alarm(0x0) 12:56:34 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) getitimer(0x0, &(0x7f0000000100)) [ 342.399694] audit: type=1326 audit(1540385794.442:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8889 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") fsetxattr(r1, &(0x7f0000000000)=@known='user.syz\x00', &(0x7f0000000140)="2f0409004bddd9de91be10eebf000ee9a90f798058439ed554af1f02acc7edbcd7a071fb35331ce39c5a0000000000000000080000000000000000000aaad955a3c93f9d248b46a7c99eb35b406bf918ff01739e56187b2db8f1074424745271062042fb3808186e0a837132f9108c583073a4ca94b3e4e58717fe2b659fa3903c7b73bd66b83f5ecc0a7361257896883f1b43ff4ec0a1e336b92f705461af0b60825a7834ffd0a7339d85c51b8db7b4c0e4f40953dd2d9f2110f04c9fdf8489eaa996", 0xc3, 0x0) 12:56:34 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)="760001b076", 0x3080, &(0x7f0000000200)) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xfffffef6) unlink(&(0x7f0000000040)='./file0\x00') setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000440), 0xc, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000140)=0xfffffcf7, 0x0) 12:56:34 executing program 2: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) lookup_dcookie(0x0, &(0x7f00000001c0)=""/200, 0xc8) 12:56:34 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)="2e2f6367726f7570000c239fd085acc49b812db3d73d43ea", 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f00000001c0)) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000000)={0x31, 0x6, 0x0, {0x0, 0x0, 0x8, 0x0, 'skbedit\x00'}}, 0xfffffe49) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) [ 342.712900] audit: type=1326 audit(1540385794.762:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8895 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 342.823046] audit: type=1326 audit(1540385794.862:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8902 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) exit_group(0x0) 12:56:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = inotify_init() r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x12) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x80000003) truncate(&(0x7f0000000000)='./file0\x00', 0x0) 12:56:35 executing program 0: socketpair$unix(0x1, 0x20000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp\x00') read$eventfd(r1, &(0x7f0000000040), 0x8) [ 343.164508] audit: type=1326 audit(1540385795.212:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8889 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x800003, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 12:56:35 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) setreuid(0x0, 0x0) [ 343.466820] audit: type=1326 audit(1540385795.512:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8895 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:35 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) dup3(r0, r1, 0x0) [ 343.612553] audit: type=1326 audit(1540385795.652:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8902 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 343.732019] audit: type=1326 audit(1540385795.732:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8931 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:35 executing program 1: getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000b40)) seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) clone(0x2182001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) clock_gettime(0x2, &(0x7f00000001c0)={0x0, 0x0}) nanosleep(&(0x7f0000000400)={0x0, r0+30000000}, &(0x7f00000000c0)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) [ 343.846527] audit: type=1326 audit(1540385795.812:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8942 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0xe, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 12:56:35 executing program 2: socketpair$unix(0x1, 0x40000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0xfffffffffffffffe, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, r1, 0x0) 12:56:36 executing program 4: pipe(&(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') [ 344.103684] audit: type=1326 audit(1540385796.142:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8948 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:36 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000002500), 0x0, &(0x7f0000000180), 0x3b9}, 0x20000000) 12:56:36 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) signalfd4(r0, &(0x7f0000000040), 0x8, 0x0) [ 344.366351] audit: type=1326 audit(1540385796.412:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8931 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000540)) 12:56:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @dev, 0xe94}, 0x1c) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60c22df704011100fe800000000000000000000000000000fe8000000000000000000000000000aa00004e2004019078000087ae00ca83452b00b32def4f1142b6793bb530f9b20e90aa25d5c2b9431efd840a07c1922833b2c789aefbbaee9f63cbab38a8acfb8dba0595ecb683e74ea2bc44a7aee9c52e18ca01c06a5c354712b8b1ff75fb81a55a3487c83849023d37e037d2d3e3e842e9ba099e9ed8775d1173d8e78335aa65d58f54c1d78d4fce897cfefa24b7f268f90be76c7f4e1bfe4d84a869353e931c3732afea55697618a1318ecb657b34172b93fd59d7988d43630cf81e976a0ea01fd8b2547ab593030030c794e2d2d5070af38d83dc275da88cfe6910b2ded59f6c418af5d247237eceb14857c1d7c3ee32e729d9793040f8f4e432eb875a89fe31cbed117f0e76643797169fba3dac3f377d145ce97980ba626da7a279e698a9e040a22d63c535f0ee06adb59e9e06ad7295e6601f3a5fe9b581975993c6c775734212bccb26288d42a672c965d40e80d0e1908f04425a60a08241378ec7ff88315de073b64c5f9647e51732be34988e0948f12e6c560bedbece811bca501d4389dbfe20e4df5160cd7324c0673f9e9fd24326924c076e01631a0b9703a6106accfaa064075fa1f16e16c5171b6aa7ca4e5be383e84995c9b146dd4d324e8642b2ab76618b824110c312ab12d9f65d6a980634a6a7cba8bf89e01a9125d1300befab1a2f6e8261e07336c5692db37bb7d3cebf4a942b62f2fa6cceb7e488aa02b2e52c6f82bd3792845fff41cce52e0469d14821ce11491864860c11421a92cae3152eb23106a0c679d2b1f0a9809b56abdcf893f9531508f24e64ec911fd8e8b3c8fd2291f1a7b910222c38533d4caadac9acd194be7e53549c17db91f668887a0e19db83b5356f8f7d93cbef1ef3505dcc40d0d2a02a2745ab518979b9c3774babfe8e70ead767c7a00289b8cc6e51d1a957548270cb3f5064961a88f61b34f9442d78ae5a8551713f9afb4269d689f9adb6b4a902a637184f7f899efe9fa0ddb45cd1076c4eeeda51ca8dc20dcfc9cc5f56768073b3f4c2c9f543324a4fd0b8bc7b95e232bf85bf222394fa4336ab4007d7ad2dc85afa6eb79ad2624c4be6c674ee98fce9a51786b7cc2b5044de114d36d2690e13bcedf96590c7d5aeb8040b74c4d6a5aa38a7c1f0857522f4f968795056b9a7034dc3444784f9486b575e44dec3216d72845500e63297d7197961e7e593ea3411001d1d47ba42d70e7af8e91246c02d7e37ff0eb60abebc37dd00315b4fbb09e77a6b5f7e8441818ebcfafecf622731f1db8a11fa2de8e30d808bedbfee104b3b5100f5094675521da07dd2a28be7e486b325a0f0e6d75116be1bbc2aa20deb64a6e4e7b824b12d009e6f1802f5a8e31559b125d71d00a5684fbde4668f5af1eb4ca04fa7c4ef4d2a194b0856e00727a2ea460c3eb447c024bffd16024952"], &(0x7f0000001780)) [ 344.540627] audit: type=1326 audit(1540385796.582:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8942 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:36 executing program 4: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$tun(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1) fcntl$setstatus(r0, 0x4, 0x4bff) io_setup(0x1, &(0x7f00000001c0)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RWSTAT(r0, &(0x7f00000000c0)={0x7}, 0x7) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1, &(0x7f0000000340)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000200), 0xfffffd07}]) 12:56:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x106e) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f00000006c0)="66baf80cb8645ab889ef66bafc0ced66b857008ee83e0f22d7c4c3a95f6b4dbcea00000000fb000f1dcdc7442400de2118fac744240200000080c7442406000000000f011c2481861800c0fef40000000fc3bbfb9f000066baf80cb8600d328bef66bafc0ced", 0x66}], 0x1, 0x0, &(0x7f0000000600), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000040)=0x10) 12:56:36 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x7f}) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000003c0), 0x7d) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000600)={0x0, 0x7, 0x6, 0xf0, &(0x7f0000000400)=""/240, 0xfffffdca, &(0x7f0000000380)=""/63, 0xf8, &(0x7f0000000500)=""/248}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000040000, 0x3f00000000000000, 0x9f000000, 0xfffffffe, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000}) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000200)={0x0, 0x1, {0x1}}) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x9) [ 344.841276] audit: type=1326 audit(1540385796.882:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8948 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:37 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2000006) 12:56:37 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 12:56:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='coredump_filter\x00') read$eventfd(r0, &(0x7f0000000040), 0x8) 12:56:37 executing program 0: socketpair$unix(0x1, 0x40100000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x8000b, 0x0, &(0x7f00000000c0)) 12:56:37 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000003c0), 0x7d) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000600)={0x0, 0x7, 0x6, 0xf0, &(0x7f0000000400)=""/240, 0xfffffdca, &(0x7f0000000380)=""/63, 0xf8, &(0x7f0000000500)=""/248}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f000000500d0000, 0x9f000000, 0xfffffffe, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000}) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000200)={0x0, 0x1, {0x1}}) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x9) 12:56:37 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x8f, &(0x7f0000d83f60)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) r1 = memfd_create(&(0x7f0000000240)="3a2b6c6f230060766fdc2e0738dd41c97e2706edd6b4b2218216a1c508f7f35f9d795cb6e36202dc87ae64a8d02058d8ff1909655030e13f3607b1a7dd209444fed0167fc2ce93f869", 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000100)}]) io_destroy(r0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x3c, &(0x7f00000000c0)=""/60}, &(0x7f00000001c0), &(0x7f0000000280)=""/42, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 12:56:37 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x1) 12:56:38 executing program 0: socket(0x3, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fstatfs(r0, &(0x7f0000000000)=""/12) 12:56:38 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) clock_nanosleep(0x0, 0x0, &(0x7f0000000100), &(0x7f0000000200)) 12:56:38 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="0180c274b1d894000000000086dd60093a0600083a00fe8000000000000000000000000000bbff021a9cbd21d38881760000000000010000000000089078"], &(0x7f0000000100)) [ 346.456306] audit: type=1326 audit(1540385798.472:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9028 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x106e) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f00000006c0)="66baf80cb8645ab889ef66bafc0ced66b857008ee83e0f22d7c4c3a95f6b4dbcea00000000fb000f1dcdc7442400de2118fac744240200000080c7442406000000000f011c2481861800c0fef40000000fc3bbfb9f000066baf80cb8600d328bef66bafc0ced", 0x66}], 0x1, 0x0, &(0x7f0000000600), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000040)=0x10) 12:56:39 executing program 5: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) setresgid(0x0, 0x0, 0x0) 12:56:39 executing program 3: 12:56:39 executing program 4: socketpair$unix(0x1, 0x40100000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f00000001c0)=""/160) [ 347.054026] audit: type=1326 audit(1540385799.102:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9047 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xff43) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00') syz_execute_func(&(0x7f0000000200)="3666440f9bf56664400f9f3241c3c4e2c9975842c4c27d794e003e0f11581010196f04cd04cd0f2902") 12:56:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00'}) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="64debbe30a0002000000000067523520"], 0x1}}, 0x0) 12:56:39 executing program 1: socketpair$unix(0x1, 0x20000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setgroups(0x0, &(0x7f0000000340)) 12:56:39 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioprio_get$uid(0x3, 0x0) 12:56:39 executing program 3: 12:56:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x106e) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f00000006c0)="66baf80cb8645ab889ef66bafc0ced66b857008ee83e0f22d7c4c3a95f6b4dbcea00000000fb000f1dcdc7442400de2118fac744240200000080c7442406000000000f011c2481861800c0fef40000000fc3bbfb9f000066baf80cb8600d328bef66bafc0ced", 0x66}], 0x1, 0x0, &(0x7f0000000600), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000040)=0x10) 12:56:39 executing program 1: 12:56:39 executing program 4: 12:56:40 executing program 3: 12:56:40 executing program 5: 12:56:40 executing program 4: 12:56:40 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xff43) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00') syz_execute_func(&(0x7f0000000200)="3666440f9bf56664400f9f3241c3c4e2c9975842c4c27d794e003e0f11581010196f04cd04cd0f2902") 12:56:40 executing program 1: 12:56:40 executing program 5: 12:56:40 executing program 3: 12:56:40 executing program 4: 12:56:40 executing program 1: 12:56:40 executing program 2: 12:56:40 executing program 5: 12:56:40 executing program 3: 12:56:41 executing program 4: 12:56:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xff43) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00') syz_execute_func(&(0x7f0000000200)="3666440f9bf56664400f9f3241c3c4e2c9975842c4c27d794e003e0f11581010196f04cd04cd0f2902") 12:56:41 executing program 3: 12:56:41 executing program 1: 12:56:41 executing program 5: 12:56:41 executing program 2: 12:56:41 executing program 4: 12:56:41 executing program 1: 12:56:41 executing program 3: 12:56:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xff43) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00') syz_execute_func(&(0x7f0000000200)="3666440f9bf56664400f9f3241c3c4e2c9975842c4c27d794e003e0f11581010196f04cd04cd0f2902") 12:56:42 executing program 5: 12:56:42 executing program 2: 12:56:42 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f0000000240)='./file0\x00') 12:56:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000340)={{0x2, 0x0, @dev}, {0x0, @random="5d982d051370"}, 0x0, {0x2, 0x0, @multicast1}, 'veth0_to_bridge\x00'}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x3f8) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x15}) 12:56:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)=0xd) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x7fffffff) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000200)) 12:56:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x2, 0x7, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 12:56:42 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/rt_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:56:42 executing program 4: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0) clone(0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) stat(&(0x7f0000000140)='./file1\x00', &(0x7f0000000200)) 12:56:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000900)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x86100) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) sendfile(r1, r0, &(0x7f0000000180), 0x100000005) 12:56:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xff43) syz_execute_func(&(0x7f0000000200)="3666440f9bf56664400f9f3241c3c4e2c9975842c4c27d794e003e0f11581010196f04cd04cd0f2902") 12:56:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x3, 0x4, 0x3}, 0x2c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0}, 0x10) 12:56:43 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)="6f6f6d5f73636f72655f61646a00f9a1d5028f7543b0a29d8da9abf5b11eb19152d43799fb057afd476975cc7794bdd6a94f0eacad59c06e9ebe44aa59ec910d4d5dde09fa1ab53c12816ecb97bde4e8d597494c3000780a08caad7d3d289a1adee3ae65de8c3ff308aff95863042e0015ee3c27152bca00fc96d3285939e0ddcf018942711e62") pread64(r0, &(0x7f0000000080)=""/111, 0x6f, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bridge0\x00'}, 0x3d8) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000100)={'irlan0\x00'}) 12:56:43 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000000)) r0 = gettid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000013) 12:56:43 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) 12:56:43 executing program 4: clock_getres(0xa6039ae1b2811eca, &(0x7f0000000280)) 12:56:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) r4 = fcntl$getown(r2, 0x9) r5 = syz_open_procfs(r4, &(0x7f00000001c0)="6f6f6d5f73636f72655f61646a00f9a1d5028f7543b0a29d8da9abf5b11eb19152d43799fb057afd476975cc7794bdd6a94f0eacad59c06e9ebe44aa59ec910d4d5dde09fa1ab53c12816ecb97bde4e8d597494c3000780a08caad7d3d289a1adee3ae65de8c3ff308aff95863042e0015ee3c27152bca00fc96d3285939e0ddcf018942711e62") pread64(r5, &(0x7f0000000080)=""/111, 0x6f, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bridge0\x00'}, 0x3d8) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xcfb8) mkdir(&(0x7f0000000100)='./file0\x00', 0x2) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="751f8631fec1c8fb839ec4e581620ff71770f42f8d0feff3d78b0fdff125a2503ff01bce988f41b0b64a8f60fb0f137a00fbcb9afdcbc5033c48ae4a5ace1ea58d4f0cf25bc1588476adc7049512dccc4b28e75056a2486202dd8aa09955c9aaa96e75817ebf50022d36f59bc1a8e9151d33f04f7f92720cd165b9a365d3351994"], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, &(0x7f00000002c0)) ppoll(&(0x7f0000000440)=[{r2, 0x148}, {r2, 0x1}, {r6, 0x2038}, {r0, 0x82a0}, {r1, 0x400}], 0x5, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={0x2}, 0x8) chroot(&(0x7f0000000280)='./file0\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x2) chroot(&(0x7f00000002c0)='./file0\x00') syz_open_procfs(r3, &(0x7f0000000340)='net/ip_vs_stats\x00') openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x1453c0, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELDLCI(r7, 0x8981, &(0x7f0000000100)={'irlan0\x00'}) 12:56:43 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") setsockopt$inet6_opts(r1, 0x29, 0x3a, &(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x1) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000012c0)) r3 = syz_open_procfs(0x0, &(0x7f0000001680)="902368d1593db4e4755e621e2447998f44150b57c8812a8272440d9a18b6134ca3e4a4d0720f292c0964f72526304851e815e97b630f53e65ae48ee106a9d5a805682338351a2439f67ad179fc5498229b50e1c1a87006e6881c50756e7a96e44ae7f0aa3015d165dab3cc00fcdfb4f11b05faf0cbd2d25bb45c2cdefc65e19eb514f2661eef5033a28ad0d47108f180f01125f2c9d3a457a0dc5fa4cbd14c9e40706baad83251c1fa022fdf289fcce92bbe9282c078f7bf2f7895950c47d4828c00acf2954eaac8de8329") inotify_add_watch(0xffffffffffffffff, &(0x7f0000000240)='./bus\x00', 0x0) r4 = accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14, 0xfffffffffffffefc) connect$packet(r4, &(0x7f0000001300)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @random="986a182b9d14"}, 0x14) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000580)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r6, 0x10e, 0x5, &(0x7f0000000000)=0x2, 0x4) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00000042c0), 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001640)='cpu.stat\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f00000002c0)=""/4096) shutdown(r4, 0xffffffffffffffff) ioctl$EVIOCGPROP(r7, 0x80404509, &(0x7f0000001380)=""/244) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) fcntl$F_GET_RW_HINT(r6, 0x40b, &(0x7f0000001580)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000788ffc), 0xfdf6) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f00000000c0)={0x0, @local}, &(0x7f00000012c0)=0xc) bind$inet(r2, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000004}, 0x14) shutdown(r2, 0x1) 12:56:43 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file2\x00') rename(&(0x7f00000004c0)='./file1/file0\x00', &(0x7f00000000c0)='./file2\x00') 12:56:44 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) getsockname(r0, &(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000140)=0xffffffffffffff16) 12:56:44 executing program 5: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) ioctl$sock_ifreq(r0, 0x89ff, &(0x7f0000000140)={'sit0\x00', @ifru_addrs=@xdp}) 12:56:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xff43) syz_execute_func(&(0x7f0000000200)="3666440f9bf56664400f9f3241c3c4e2c9975842c4c27d794e003e0f11581010196f04cd04cd0f2902") 12:56:44 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file2\x00') rename(&(0x7f00000004c0)='./file1/file0\x00', &(0x7f00000000c0)='./file2\x00') 12:56:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") fsetxattr(r0, &(0x7f0000000100)=@random={'user.', 'vboxnet1vmnet1trusted\x00'}, &(0x7f0000000140)="2f0409004bddd9de91be10eebf000ee9a90f798058439ed554af1f02acc7edbcd7a071fb35331ce39c5a0000000000000000080000000000000000000aaad955a3c93f9d248b46a7c99eb35b406bf918ff01739e56187b2db8f1074424745271062042fb3808186e0a837132f9108c583073a4ca94b3e4e58717fe2b659fa3903c7b73bd66b83f5ecc0a7361257896883f1b43ff4ec0a1e336b92f705461af0b60825a7834ffd0a7339d85c51b8db7b4c0e4f40953dd2d9f2110f04c9fdf8489eaa996", 0xc3, 0x0) 12:56:44 executing program 2: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 12:56:44 executing program 5: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) 12:56:44 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00') syz_execute_func(&(0x7f0000000200)="3666440f9bf56664400f9f3241c3c4e2c9975842c4c27d794e003e0f11581010196f04cd04cd0f2902") [ 352.710934] kauditd_printk_skb: 2 callbacks suppressed [ 352.710970] audit: type=1326 audit(1540385804.752:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9238 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:44 executing program 5: r0 = socket$inet(0x2, 0x3, 0x5) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x53) 12:56:45 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00') syz_execute_func(&(0x7f0000000200)="3666440f9bf56664400f9f3241c3c4e2c9975842c4c27d794e003e0f11581010196f04cd04cd0f2902") 12:56:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") fsetxattr(r0, &(0x7f0000000100)=@random={'user.', 'vboxnet1vmnet1trusted\x00'}, &(0x7f0000000140)="2f0409004bddd9de91be10eebf000ee9a90f798058439ed554af1f02acc7edbcd7a071fb35331ce39c5a0000000000000000080000000000000000000aaad955a3c93f9d248b46a7c99eb35b406bf918ff01739e56187b2db8f1074424745271062042fb3808186e0a837132f9108c583073a4ca94b3e4e58717fe2b659fa3903c7b73bd66b83f5ecc0a7361257896883f1b43ff4ec0a1e336b92f705461af0b60825a7834ffd0a7339d85c51b8db7b4c0e4f40953dd2d9f2110f04c9fdf8489eaa996", 0xc3, 0x0) [ 353.482381] audit: type=1326 audit(1540385805.522:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9238 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 12:56:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") fsetxattr(r0, &(0x7f0000000000)=@known='user.syz\x00', &(0x7f0000000040)="2f0409004bddd9de91be10eebf008ee9a90f798058439ed554af1f02acc7edbcd7a071fb35331ce39c5a0000000000000000080000000000000000000aaad9c99eb35b406bf918ff01739e56187b2db8f1074424745271062042fb3808186e0a837132f9108c583073a4ca94b3e4e58717fe2b659fa3903c7b73bd66b83f5ecc0a7361257896883f1b43ff4ec0a1e336b92f705461af0b60825a7834ffd0a733c3c6d163718cd167f4575f6be42a5ceb9d85c51b8db7b4c0e4f40953dd2d9f2110f04c9fdf8489eaa996000000000000000000", 0xd3, 0x0) 12:56:45 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) close(r0) 12:56:45 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00') syz_execute_func(&(0x7f0000000200)="3666440f9bf56664400f9f3241c3c4e2c9975842c4c27d794e003e0f11581010196f04cd04cd0f2902") 12:56:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") fsetxattr(r0, &(0x7f0000000100)=@random={'user.', 'vboxnet1vmnet1trusted\x00'}, &(0x7f0000000140)="2f0409004bddd9de91be10eebf000ee9a90f798058439ed554af1f02acc7edbcd7a071fb35331ce39c5a0000000000000000080000000000000000000aaad955a3c93f9d248b46a7c99eb35b406bf918ff01739e56187b2db8f1074424745271062042fb3808186e0a837132f9108c583073a4ca94b3e4e58717fe2b659fa3903c7b73bd66b83f5ecc0a7361257896883f1b43ff4ec0a1e336b92f705461af0b60825a7834ffd0a7339d85c51b8db7b4c0e4f40953dd2d9f2110f04c9fdf8489eaa996", 0xc3, 0x0) [ 353.772352] Not allocated shadow for addr ffff880194864000 (page ffffea00097b2580) [ 353.780136] Attempted to access 0 bytes [ 353.784175] ------------[ cut here ]------------ [ 353.788954] kernel BUG at mm/kmsan/kmsan.c:1091! [ 353.793762] invalid opcode: 0000 [#1] SMP [ 353.797951] CPU: 1 PID: 9276 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #70 [ 353.805165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.814559] RIP: 0010:kmsan_get_shadow_address+0x2d6/0x3d0 [ 353.820210] Code: e9 89 00 00 00 c7 04 25 20 73 28 8c 01 00 00 00 65 48 8b 04 25 00 fd 02 00 c6 80 7b 09 00 00 01 80 3c 25 38 73 28 8c 00 74 0c <0f> 0b 0f 1f 84 00 00 00 00 00 eb fe 48 c7 c7 1c be 57 8b 31 c0 4c [ 353.839134] RSP: 0018:ffff88011d83f290 EFLAGS: 00010046 [ 353.844526] RAX: 000000000000001b RBX: 0000000000000000 RCX: eeeecfa202e47400 [ 353.851816] RDX: 0000000000000000 RSI: 0000000000001fde RDI: 0000000000001fdf [ 353.859102] RBP: ffff88011d83f2c0 R08: 0000000000000000 R09: ffff88021fd38f50 [ 353.866386] R10: 0000000000000000 R11: ffffffff8625c860 R12: 0000000000000001 [ 353.873681] R13: ffff880194864000 R14: 0000000000000001 R15: ffff880194863f3c [ 353.880976] FS: 00007fd5572d8700(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 353.889236] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 353.895138] CR2: 00000000004ccb68 CR3: 00000001215cf000 CR4: 00000000001426e0 [ 353.902431] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 353.909724] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 353.917021] Call Trace: [ 353.919655] kmsan_memmove_shadow+0x87/0xe0 [ 353.924027] __msan_memmove+0xb6/0x150 [ 353.927947] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 353.933357] ext4_xattr_set_entry+0x3115/0x6830 [ 353.938065] ? mb_cache_entry_delete+0xba7/0xe60 [ 353.942946] ext4_xattr_block_set+0x1275/0x6d30 [ 353.947652] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 353.953122] ext4_xattr_set_handle+0x17d7/0x2e60 [ 353.957973] ext4_xattr_set+0x3fa/0x590 [ 353.962032] ext4_xattr_user_set+0x19e/0x1d0 [ 353.966493] __vfs_setxattr+0x7fa/0x850 [ 353.970541] __vfs_setxattr_noperm+0x2fc/0x980 [ 353.975192] setxattr+0x870/0x9a0 [ 353.978716] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 353.984115] ? __mnt_want_write_file+0x3ea/0x520 [ 353.988921] __se_sys_fsetxattr+0x2b0/0x3a0 [ 353.993301] __x64_sys_fsetxattr+0x62/0x80 [ 353.997571] do_syscall_64+0xbe/0x100 [ 354.001412] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 354.006632] RIP: 0033:0x457569 12:56:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000c95ffd), 0x49b8, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) 12:56:46 executing program 0: read(0xffffffffffffffff, &(0x7f0000000180)=""/11, 0xff43) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00') syz_execute_func(&(0x7f0000000200)="3666440f9bf56664400f9f3241c3c4e2c9975842c4c27d794e003e0f11581010196f04cd04cd0f2902") 12:56:46 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) [ 354.009855] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 354.028926] RSP: 002b:00007fd5572d7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 354.036683] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457569 [ 354.043978] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000003 [ 354.051274] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 354.058567] R10: 00000000000000d3 R11: 0000000000000246 R12: 00007fd5572d86d4 [ 354.065862] R13: 00000000004bddb1 R14: 00000000004ccb68 R15: 00000000ffffffff [ 354.073166] Modules linked in: [ 354.076418] ---[ end trace 42196f9b1b2fe18a ]--- [ 354.081218] RIP: 0010:kmsan_get_shadow_address+0x2d6/0x3d0 [ 354.086877] Code: e9 89 00 00 00 c7 04 25 20 73 28 8c 01 00 00 00 65 48 8b 04 25 00 fd 02 00 c6 80 7b 09 00 00 01 80 3c 25 38 73 28 8c 00 74 0c <0f> 0b 0f 1f 84 00 00 00 00 00 eb fe 48 c7 c7 1c be 57 8b 31 c0 4c [ 354.105809] RSP: 0018:ffff88011d83f290 EFLAGS: 00010046 [ 354.111205] RAX: 000000000000001b RBX: 0000000000000000 RCX: eeeecfa202e47400 [ 354.118499] RDX: 0000000000000000 RSI: 0000000000001fde RDI: 0000000000001fdf [ 354.125948] RBP: ffff88011d83f2c0 R08: 0000000000000000 R09: ffff88021fd38f50 [ 354.133250] R10: 0000000000000000 R11: ffffffff8625c860 R12: 0000000000000001 [ 354.140544] R13: ffff880194864000 R14: 0000000000000001 R15: ffff880194863f3c [ 354.147841] FS: 00007fd5572d8700(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 354.156092] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 354.162008] CR2: 00000000004ccb68 CR3: 00000001215cf000 CR4: 00000000001426e0 [ 354.169298] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 354.176585] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 354.183869] Kernel panic - not syncing: Fatal exception [ 354.190247] Kernel Offset: disabled [ 354.193884] Rebooting in 86400 seconds..