Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 63.724287][ T26] kauditd_printk_skb: 34 callbacks suppressed [ 63.724301][ T26] audit: type=1400 audit(1569264377.343:62): avc: denied { map } for pid=9099 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.117' (ECDSA) to the list of known hosts. 2019/09/23 18:46:24 fuzzer started syzkaller login: [ 71.325811][ T26] audit: type=1400 audit(1569264384.953:63): avc: denied { map } for pid=9108 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16502 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/09/23 18:46:26 dialing manager at 10.128.0.26:39109 2019/09/23 18:46:26 syscalls: 2516 2019/09/23 18:46:26 code coverage: enabled 2019/09/23 18:46:26 comparison tracing: enabled 2019/09/23 18:46:26 extra coverage: extra coverage is not supported by the kernel 2019/09/23 18:46:26 setuid sandbox: enabled 2019/09/23 18:46:26 namespace sandbox: enabled 2019/09/23 18:46:26 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/23 18:46:26 fault injection: enabled 2019/09/23 18:46:26 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/23 18:46:26 net packet injection: enabled 2019/09/23 18:46:26 net device setup: enabled 18:48:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) [ 170.946207][ T26] audit: type=1400 audit(1569264484.573:64): avc: denied { map } for pid=9124 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16499 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 18:48:04 executing program 1: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x5, 0x4031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 171.140635][ T9125] IPVS: ftp: loaded support on port[0] = 21 [ 171.264002][ T9127] IPVS: ftp: loaded support on port[0] = 21 [ 171.327937][ T9125] chnl_net:caif_netlink_parms(): no params data found 18:48:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) [ 171.434073][ T9125] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.444501][ T9125] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.452704][ T9125] device bridge_slave_0 entered promiscuous mode [ 171.481025][ T9125] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.489921][ T9125] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.499414][ T9125] device bridge_slave_1 entered promiscuous mode [ 171.521610][ T9127] chnl_net:caif_netlink_parms(): no params data found [ 171.556561][ T9125] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 171.587646][ T9131] IPVS: ftp: loaded support on port[0] = 21 [ 171.602635][ T9125] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 171.682499][ T9125] team0: Port device team_slave_0 added [ 171.689355][ T9127] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.697476][ T9127] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.706459][ T9127] device bridge_slave_0 entered promiscuous mode [ 171.719020][ T9125] team0: Port device team_slave_1 added 18:48:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r1, 0x15, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) [ 171.733462][ T9127] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.743266][ T9127] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.754880][ T9127] device bridge_slave_1 entered promiscuous mode [ 171.847731][ T9125] device hsr_slave_0 entered promiscuous mode 18:48:05 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, 0x0, 0x10000) r2 = getpgid(0x0) tkill(r2, 0x1000000000016) [ 171.904878][ T9125] device hsr_slave_1 entered promiscuous mode [ 171.969988][ T9127] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 171.999836][ T9134] IPVS: ftp: loaded support on port[0] = 21 [ 172.090854][ T9127] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 172.109157][ T9125] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.116497][ T9125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.124459][ T9125] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.131811][ T9125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.177553][ T9131] chnl_net:caif_netlink_parms(): no params data found [ 172.196040][ T9137] IPVS: ftp: loaded support on port[0] = 21 [ 172.209259][ T9127] team0: Port device team_slave_0 added [ 172.229817][ T9127] team0: Port device team_slave_1 added 18:48:05 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 172.315518][ T9131] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.338049][ T9131] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.347077][ T9131] device bridge_slave_0 entered promiscuous mode [ 172.427463][ T9127] device hsr_slave_0 entered promiscuous mode [ 172.475070][ T9127] device hsr_slave_1 entered promiscuous mode [ 172.544607][ T9127] debugfs: Directory 'hsr0' with parent '/' already present! [ 172.560241][ T2962] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.578939][ T2962] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.590837][ T9131] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.598719][ T9131] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.607022][ T9131] device bridge_slave_1 entered promiscuous mode [ 172.631931][ T9131] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 172.644723][ T9140] IPVS: ftp: loaded support on port[0] = 21 [ 172.662893][ T9131] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 172.702982][ T9131] team0: Port device team_slave_0 added [ 172.710739][ T9131] team0: Port device team_slave_1 added [ 172.730331][ T9125] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.878129][ T9131] device hsr_slave_0 entered promiscuous mode [ 172.944776][ T9131] device hsr_slave_1 entered promiscuous mode [ 173.024563][ T9131] debugfs: Directory 'hsr0' with parent '/' already present! [ 173.043592][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.052756][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.068884][ T9125] 8021q: adding VLAN 0 to HW filter on device team0 [ 173.090373][ T9134] chnl_net:caif_netlink_parms(): no params data found [ 173.149372][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.158593][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.167735][ T9132] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.175897][ T9132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.196261][ T9134] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.203443][ T9134] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.211825][ T9134] device bridge_slave_0 entered promiscuous mode [ 173.222403][ T9134] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.229978][ T9134] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.238029][ T9134] device bridge_slave_1 entered promiscuous mode [ 173.253180][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.263625][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.273077][ T9132] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.280665][ T9132] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.289187][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 173.306903][ T9137] chnl_net:caif_netlink_parms(): no params data found [ 173.342086][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.354029][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.362785][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.371429][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.380329][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.389051][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.419858][ T9134] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 173.433245][ T9134] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 173.451861][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.460950][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.470173][ T9140] chnl_net:caif_netlink_parms(): no params data found [ 173.483342][ T9127] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.513512][ T9134] team0: Port device team_slave_0 added [ 173.524969][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.533480][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.551567][ T9125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 173.562225][ T9134] team0: Port device team_slave_1 added [ 173.636986][ T9134] device hsr_slave_0 entered promiscuous mode [ 173.685161][ T9134] device hsr_slave_1 entered promiscuous mode [ 173.744683][ T9134] debugfs: Directory 'hsr0' with parent '/' already present! [ 173.762417][ T9137] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.770884][ T9137] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.779239][ T9137] device bridge_slave_0 entered promiscuous mode [ 173.790675][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.799946][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.811111][ T9127] 8021q: adding VLAN 0 to HW filter on device team0 [ 173.832815][ T9137] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.840481][ T9137] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.848832][ T9137] device bridge_slave_1 entered promiscuous mode [ 173.882946][ T9140] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.890237][ T9140] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.899425][ T9140] device bridge_slave_0 entered promiscuous mode [ 173.910486][ T9140] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.921991][ T9140] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.930458][ T9140] device bridge_slave_1 entered promiscuous mode [ 173.940773][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.949899][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.961706][ T9138] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.969350][ T9138] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.978146][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.987028][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.995738][ T9138] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.002895][ T9138] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.010914][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.019704][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.037306][ T9137] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 174.063909][ T9125] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 174.088205][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 174.103122][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 174.112095][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 174.123174][ T9137] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 174.155290][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 174.177483][ T9140] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 174.195932][ T9140] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 174.219038][ T9137] team0: Port device team_slave_0 added [ 174.227674][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 174.241003][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 174.250405][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.259079][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.280919][ T9140] team0: Port device team_slave_0 added [ 174.289962][ T9140] team0: Port device team_slave_1 added [ 174.295997][ T26] audit: type=1400 audit(1569264487.913:65): avc: denied { associate } for pid=9125 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 174.325874][ T9137] team0: Port device team_slave_1 added [ 174.333658][ T9131] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.361436][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 174.373993][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.384977][ T9127] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 174.414293][ T9131] 8021q: adding VLAN 0 to HW filter on device team0 [ 174.486758][ T9140] device hsr_slave_0 entered promiscuous mode [ 174.524881][ T9140] device hsr_slave_1 entered promiscuous mode [ 174.564528][ T9140] debugfs: Directory 'hsr0' with parent '/' already present! [ 174.574791][ T9134] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.588373][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.596982][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.657993][ T9137] device hsr_slave_0 entered promiscuous mode [ 174.705229][ T9137] device hsr_slave_1 entered promiscuous mode [ 174.744576][ T9137] debugfs: Directory 'hsr0' with parent '/' already present! [ 174.779801][ T9134] 8021q: adding VLAN 0 to HW filter on device team0 [ 174.787421][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.797630][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.806300][ T2847] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.814179][ T2847] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.822426][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.832201][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.841405][ T2847] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.849370][ T2847] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.858186][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.867398][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.875415][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.883176][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 174.893129][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.905552][ T9127] 8021q: adding VLAN 0 to HW filter on device batadv0 18:48:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) [ 174.955499][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 174.975111][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 174.985776][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 174.997199][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.005877][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.014472][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.023450][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.038953][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.053523][ T9138] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.060674][ T9138] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.069438][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.078836][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.087986][ T9138] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.095200][ T9138] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.102937][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 175.113174][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.121397][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 175.135287][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 18:48:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) [ 175.163100][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.178044][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 175.197314][ T9131] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 175.211057][ T9131] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 18:48:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) [ 175.255190][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.263253][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.294592][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.306637][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.320182][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.354100][ T9134] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 175.379489][ T9134] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 175.400987][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.418672][ T9169] mmap: syz-executor.1 (9169) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 175.420571][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 18:48:09 executing program 1: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x5, 0x4031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 175.452114][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.461615][ T9132] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 18:48:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 175.509374][ T9131] 8021q: adding VLAN 0 to HW filter on device batadv0 18:48:09 executing program 1: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x5, 0x4031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:48:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 175.578049][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.603462][ T9140] 8021q: adding VLAN 0 to HW filter on device bond0 [ 175.686111][ T9134] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.721705][ T9140] 8021q: adding VLAN 0 to HW filter on device team0 18:48:09 executing program 1: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x5, 0x4031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 175.771926][ T9147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.785341][ T9147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.797922][ T9137] 8021q: adding VLAN 0 to HW filter on device bond0 [ 175.853472][ T9137] 8021q: adding VLAN 0 to HW filter on device team0 [ 175.891445][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.913684][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.941800][ T2847] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.948950][ T2847] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.963589][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.972462][ T2847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.029094][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.045734][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.059797][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.083680][ T9138] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.084982][ T26] audit: type=1400 audit(1569264489.703:66): avc: denied { prog_load } for pid=9198 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 176.091084][ T9138] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.141945][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 176.150284][ T26] audit: type=1400 audit(1569264489.753:67): avc: denied { prog_run } for pid=9198 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 176.156633][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 18:48:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 176.189324][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.204283][ T9138] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.211560][ T9138] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.230045][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.247412][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.258229][ T9138] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.266025][ T9138] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.273855][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 176.284006][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.331216][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 176.342216][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 176.352039][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 176.362035][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 176.370911][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 176.380118][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 176.389160][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 176.398322][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 176.411694][ T26] audit: type=1400 audit(1569264490.033:68): avc: denied { create } for pid=9206 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 176.427070][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 176.452869][ T26] audit: type=1400 audit(1569264490.033:69): avc: denied { write } for pid=9206 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 176.455888][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 176.486818][ T26] audit: type=1400 audit(1569264490.033:70): avc: denied { read } for pid=9206 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 176.488357][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.522905][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.531952][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 176.540065][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 176.555323][ T9208] Enabling of bearer rejected, illegal name [ 176.575990][ T9137] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 176.587687][ T9137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 176.597653][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.607098][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.616664][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.625361][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.633619][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.642608][ T2962] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.652205][ T9140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 176.664901][ T9209] Enabling of bearer rejected, illegal name 18:48:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r1, 0x15, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) [ 176.703515][ T9137] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 176.734171][ T9140] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 176.808987][ T9217] Enabling of bearer rejected, illegal name [ 176.981572][ T9224] input: syz1 as /devices/virtual/input/input5 18:48:10 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, 0x0, 0x10000) r2 = getpgid(0x0) tkill(r2, 0x1000000000016) 18:48:10 executing program 2: 18:48:10 executing program 1: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x5, 0x4031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:48:10 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r0}}]}, 0x2c}}, 0x0) 18:48:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r1, 0x15, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:10 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f000091b000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:10 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r0}}]}, 0x2c}}, 0x0) 18:48:10 executing program 2: open(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x87ffe, 0x0) 18:48:10 executing program 1: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x5, 0x4031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 177.247594][ T9238] Enabling of bearer rejected, illegal name [ 177.264320][ T26] audit: type=1400 audit(1569264490.853:71): avc: denied { getopt } for pid=9239 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=socket permissive=1 18:48:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r1, 0x15, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:11 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f000091b000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) [ 177.390379][ T26] audit: type=1800 audit(1569264490.963:72): pid=9245 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name=E91F7189591E9233614B dev="sda1" ino=16551 res=0 18:48:11 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r0}}]}, 0x2c}}, 0x0) [ 177.523920][ T9261] Enabling of bearer rejected, illegal name 18:48:11 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, 0x0, 0x10000) r2 = getpgid(0x0) tkill(r2, 0x1000000000016) 18:48:11 executing program 1: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x5, 0x4031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:48:11 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x10000000004002) ioctl(r0, 0x440000000000127f, &(0x7f0000000140)='<') 18:48:11 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f000091b000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x0, 0x15, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:11 executing program 0: r0 = socket(0x0, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) 18:48:11 executing program 1: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x5, 0x4031, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:48:11 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f000091b000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x0, 0x15, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:11 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) mmap(&(0x7f0000000000/0xeef000)=nil, 0xeef000, 0x4, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, &(0x7f0000000040)) 18:48:11 executing program 0: r0 = socket(0x0, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) 18:48:11 executing program 1: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x5, 0x4031, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:48:11 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, 0x0, 0x10000) r2 = getpgid(0x0) tkill(r2, 0x1000000000016) 18:48:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x0, 0x15, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:11 executing program 5: socket$kcm(0x29, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:11 executing program 0: r0 = socket(0x0, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) 18:48:11 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r0, 0x15, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:12 executing program 1: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x5, 0x4031, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:48:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000c87ff6)='numa_maps\x00') io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) 18:48:12 executing program 5: socket$kcm(0x29, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:12 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r0, 0x15, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:12 executing program 1: remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:48:12 executing program 0: r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) 18:48:12 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'ifb0\x00', {0x2, 0x0, @multicast1}}) getsockopt(r0, 0x400000000000003a, 0x1, 0x0, &(0x7f0000000ffc)) 18:48:12 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, 0x0, 0x10000) getpgid(0x0) 18:48:12 executing program 1: remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:48:12 executing program 5: socket$kcm(0x29, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:12 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r0, 0x15, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:12 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x0) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000), 0x4) close(r1) 18:48:12 executing program 0: r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) 18:48:12 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f000091b000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:12 executing program 1: remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:48:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r1, 0x15, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:12 executing program 0: r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) 18:48:12 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x0) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000), 0x4) close(r1) 18:48:12 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f000091b000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:13 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, 0x0, 0x10000) getpgid(0x0) 18:48:13 executing program 1: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:48:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r1, 0x15, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) 18:48:13 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x0) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000), 0x4) close(r1) 18:48:13 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f000091b000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r1, 0x15, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:13 executing program 5: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f000091b000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) 18:48:13 executing program 1: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:48:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20020003, &(0x7f0000385ff0)={0x2, 0x0, @loopback}, 0x10) shutdown(r0, 0x0) 18:48:13 executing program 5: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f000091b000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:14 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, 0x0, 0x10000) getpgid(0x0) 18:48:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) 18:48:14 executing program 1: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:48:14 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r0, 0x15, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:14 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f000042d000)=@routing={0x0, 0x2, 0x2, 0x0, 0x0, [@mcast1]}, 0x18) 18:48:14 executing program 5: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f000091b000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000000c0)) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 18:48:14 executing program 1: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x5, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:48:14 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r0, 0x15, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:14 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00006f0fc8)={0x0, 0x0, &(0x7f0000e83ff0)={&(0x7f0000bcd000)=@newpolicy={0xb8, 0x13, 0x221, 0x0, 0x0, {{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80}}}, 0xb8}}, 0x0) 18:48:14 executing program 5: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f000091b000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000000c0)) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 18:48:15 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, 0x0, 0x10000) tkill(0x0, 0x1000000000016) 18:48:15 executing program 1: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x5, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:48:15 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r0, 0x15, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:15 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00006f0fc8)={0x0, 0x0, &(0x7f0000e83ff0)={&(0x7f0000bcd000)=@newpolicy={0xb8, 0x13, 0x221, 0x0, 0x0, {{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80}}}, 0xb8}}, 0x0) 18:48:15 executing program 5: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f000091b000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000000c0)) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 18:48:15 executing program 5: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f000091b000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:15 executing program 1: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x5, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:48:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) 18:48:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 18:48:15 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10053, r0, 0x0) 18:48:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) [ 181.938240][ T26] audit: type=1400 audit(1569264495.563:73): avc: denied { map } for pid=9513 comm="syz-executor.2" path="socket:[31442]" dev="sockfs" ino=31442 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dccp_socket permissive=1 18:48:16 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, 0x0, 0x10000) tkill(0x0, 0x1000000000016) 18:48:16 executing program 1: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x5, 0x4031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 18:48:16 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfd74, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @loopback}]}, &(0x7f0000000000)=0x10) 18:48:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 18:48:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) 18:48:16 executing program 1: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x5, 0x4031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 18:48:16 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 18:48:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) 18:48:16 executing program 2: r0 = socket(0x10, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b24ff0)={0x1, &(0x7f00002a4fe8)=[{0x6}]}, 0x10) sendmsg$nl_route(r0, &(0x7f0000cc5000)={0x0, 0x0, &(0x7f00008d5ff0)={&(0x7f0000442fc4)=@dellink={0x20, 0x11, 0x1}, 0x20}}, 0x0) 18:48:16 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:16 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, 0x0, 0x10000) tkill(0x0, 0x1000000000016) 18:48:16 executing program 1: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x5, 0x4031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 18:48:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) 18:48:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 18:48:16 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f000091b000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:16 executing program 2: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x47e) mmap(&(0x7f0000399000/0x1000)=nil, 0x40000, 0x0, 0x12, r0, 0x0) 18:48:17 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f000091b000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f00002a0000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000ed6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d0000e6000200000100000053ad000023f7b7d6ea76afe6330ee739b31904e2635cd58d1443474410e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a5408c1c149b7b83579f6a41c51f7d51933223e82ab867dac761faf"}) 18:48:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) 18:48:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) [ 183.456176][ T26] audit: type=1400 audit(1569264497.083:74): avc: denied { map } for pid=9564 comm="syz-executor.2" path="socket:[31541]" dev="sockfs" ino=31541 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=packet_socket permissive=1 18:48:17 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f000091b000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x119, 0x22, 0x0, &(0x7f0000fa0ffc)) 18:48:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, 0x0, 0x0) 18:48:17 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000) r1 = getpgid(0x0) tkill(r1, 0x1000000000016) 18:48:17 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) clone(0x20900, 0x0, 0x0, 0x0, 0x0) 18:48:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 18:48:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f00002a0000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000ed6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d0000e6000200000100000053ad000023f7b7d6ea76afe6330ee739b31904e2635cd58d1443474410e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a5408c1c149b7b83579f6a41c51f7d51933223e82ab867dac761faf"}) 18:48:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, 0x0, 0x0) 18:48:17 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f000091b000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x119, 0x22, 0x0, 0x0) 18:48:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 18:48:18 executing program 1: r0 = syz_open_dev$loop(&(0x7f00002a0000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000ed6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d0000e6000200000100000053ad000023f7b7d6ea76afe6330ee739b31904e2635cd58d1443474410e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a5408c1c149b7b83579f6a41c51f7d51933223e82ab867dac761faf"}) [ 184.398234][ T9606] capability: warning: `syz-executor.2' uses 32-bit capabilities (legacy support in use) 18:48:18 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f000091b000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x119, 0x22, 0x0, 0x0) 18:48:18 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000) r1 = getpgid(0x0) tkill(r1, 0x1000000000016) 18:48:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, 0x0, 0x0) 18:48:18 executing program 1: r0 = syz_open_dev$loop(&(0x7f00002a0000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000ed6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d0000e6000200000100000053ad000023f7b7d6ea76afe6330ee739b31904e2635cd58d1443474410e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a5408c1c149b7b83579f6a41c51f7d51933223e82ab867dac761faf"}) 18:48:18 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000118ffc)={0x7fffffff}, 0x4) 18:48:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 18:48:18 executing program 1: ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0xc0481273, &(0x7f0000ed6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d0000e6000200000100000053ad000023f7b7d6ea76afe6330ee739b31904e2635cd58d1443474410e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a5408c1c149b7b83579f6a41c51f7d51933223e82ab867dac761faf"}) 18:48:18 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f000091b000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x119, 0x22, 0x0, 0x0) 18:48:18 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000) r1 = getpgid(0x0) tkill(r1, 0x1000000000016) 18:48:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 18:48:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 18:48:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000dedff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000140)='\x00', 0x1, 0x20000005, &(0x7f000098dff0)={0x2, 0x4e20}, 0x10) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 18:48:18 executing program 1: ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0xc0481273, &(0x7f0000ed6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d0000e6000200000100000053ad000023f7b7d6ea76afe6330ee739b31904e2635cd58d1443474410e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a5408c1c149b7b83579f6a41c51f7d51933223e82ab867dac761faf"}) 18:48:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x0, 0x15, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:18 executing program 5: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') umount2(&(0x7f0000000180)='../file0\x00', 0x2) 18:48:18 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, 0x0, 0x10000) r2 = getpgid(0x0) tkill(r2, 0x1000000000016) 18:48:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) [ 185.123651][ T9655] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:48:18 executing program 1: ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0xc0481273, &(0x7f0000ed6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d0000e6000200000100000053ad000023f7b7d6ea76afe6330ee739b31904e2635cd58d1443474410e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a5408c1c149b7b83579f6a41c51f7d51933223e82ab867dac761faf"}) 18:48:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x0, 0x15, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 18:48:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b9bff0)={0x2, 0x4e21, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x40000162) 18:48:19 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', 0x0, 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', 0x0, 0x0, 0x3) 18:48:19 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, 0x0, 0x10000) r2 = getpgid(0x0) tkill(r2, 0x1000000000016) 18:48:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x0, 0x15, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 18:48:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 18:48:19 executing program 1: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000ed6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d0000e6000200000100000053ad000023f7b7d6ea76afe6330ee739b31904e2635cd58d1443474410e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a5408c1c149b7b83579f6a41c51f7d51933223e82ab867dac761faf"}) [ 185.526751][ T26] audit: type=1400 audit(1569264499.153:75): avc: denied { mac_admin } for pid=9685 comm="syz-executor.2" capability=33 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 18:48:19 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', 0x0, 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', 0x0, 0x0, 0x3) 18:48:19 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, 0x0, 0x10000) r2 = getpgid(0x0) tkill(r2, 0x1000000000016) 18:48:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r1, 0x0, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:19 executing program 1: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000ed6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d0000e6000200000100000053ad000023f7b7d6ea76afe6330ee739b31904e2635cd58d1443474410e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a5408c1c149b7b83579f6a41c51f7d51933223e82ab867dac761faf"}) 18:48:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 18:48:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 18:48:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r1, 0x0, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:19 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000d97000)={0x0, 0x1000080200005d, 0x80}) 18:48:19 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ftruncate(0xffffffffffffffff, 0x7fff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000) r1 = getpgid(0x0) tkill(r1, 0x1000000000016) 18:48:19 executing program 1: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000ed6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d0000e6000200000100000053ad000023f7b7d6ea76afe6330ee739b31904e2635cd58d1443474410e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a5408c1c149b7b83579f6a41c51f7d51933223e82ab867dac761faf"}) 18:48:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 18:48:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r1, 0x0, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp\nsyz0\x00'}}}}, 0x34}}, 0x0) 18:48:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 18:48:19 executing program 1: syz_open_dev$loop(&(0x7f00002a0000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0xc0481273, &(0x7f0000ed6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d0000e6000200000100000053ad000023f7b7d6ea76afe6330ee739b31904e2635cd58d1443474410e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a5408c1c149b7b83579f6a41c51f7d51933223e82ab867dac761faf"}) 18:48:19 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) 18:48:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) 18:48:20 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00\xa4\xe2\x89_p\xfb\x9ce7/\x91\xde\b\xcd\xe1\xb7\xadH\x9aL\xc7\x00KD\x8c\'\a=wDY\x99K\xb7\xf0\xe3X\xdf3\xed>Z\x89%\x9c\xc9^ju\xb5\xbf!r\xb4\xb3\x01[G\xfb\xa7*\xc5\xc7\xd6-\xac?\xfd\xbcv\xb1\x01\x19\a\x1ds\xb8\xe2Y\x17\xc5\xb0Mg\n\x827c\x9bj\xda#0\xeb', 0x2, 0x0) pread64(r1, &(0x7f0000000480)=""/197, 0xc5, 0x4) 18:48:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) 18:48:20 executing program 1: syz_open_dev$loop(&(0x7f00002a0000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0xc0481273, &(0x7f0000ed6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d0000e6000200000100000053ad000023f7b7d6ea76afe6330ee739b31904e2635cd58d1443474410e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a5408c1c149b7b83579f6a41c51f7d51933223e82ab867dac761faf"}) 18:48:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 18:48:22 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ftruncate(0xffffffffffffffff, 0x7fff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000) r1 = getpgid(0x0) tkill(r1, 0x1000000000016) 18:48:22 executing program 2: perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000935000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f00007fc000)='nfs\x00', 0x0, &(0x7f000000a000)) 18:48:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) 18:48:22 executing program 1: syz_open_dev$loop(&(0x7f00002a0000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0xc0481273, &(0x7f0000ed6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d0000e6000200000100000053ad000023f7b7d6ea76afe6330ee739b31904e2635cd58d1443474410e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a5408c1c149b7b83579f6a41c51f7d51933223e82ab867dac761faf"}) 18:48:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f00000000c0)=0x73058cdb, 0x4) recvfrom$inet6(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 18:48:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 18:48:22 executing program 1: r0 = syz_open_dev$loop(&(0x7f00002a0000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, 0x0) 18:48:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 18:48:22 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, 0x0, 0x2) socket$kcm(0xa, 0x2, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @broadcast}) 18:48:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 18:48:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) 18:48:23 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ftruncate(0xffffffffffffffff, 0x7fff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000) r1 = getpgid(0x0) tkill(r1, 0x1000000000016) 18:48:23 executing program 1: r0 = syz_open_dev$loop(&(0x7f00002a0000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, 0x0) [ 189.510595][ T9812] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 18:48:23 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) socket$inet(0x2, 0x3, 0x2) 18:48:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) 18:48:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) [ 189.698741][ T9827] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 189.717322][ C0] hrtimer: interrupt took 28058 ns 18:48:23 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, 0x0, 0x10000) r2 = getpgid(0x0) tkill(r2, 0x1000000000016) 18:48:23 executing program 1: r0 = syz_open_dev$loop(&(0x7f00002a0000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, 0x0) [ 189.750968][ T9820] device team0 entered promiscuous mode [ 189.784276][ T9820] device team_slave_0 entered promiscuous mode 18:48:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) [ 189.824837][ T9820] device team_slave_1 entered promiscuous mode 18:48:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 18:48:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r1}, 0x14) 18:48:23 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) socket$inet(0x2, 0x3, 0x2) 18:48:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000c87ff6)='numa_maps\x00') fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, 0x0, 0x0, 0xffffffffffffffff) [ 190.106667][ T9855] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 18:48:23 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) dup2(r1, r2) 18:48:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 18:48:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, 0x20}}, 0x0) 18:48:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) 18:48:23 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f00001e0ffc)=0x3ff, 0x4) connect$inet6(r0, &(0x7f0000f03000)={0xa, 0x0, 0x800, @loopback}, 0x1c) [ 190.514208][ T9378] BUG: assuming atomic context at net/kcm/kcmsock.c:382 [ 190.540029][ T26] audit: type=1400 audit(1569264504.163:76): avc: denied { read } for pid=9868 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=socket permissive=1 [ 190.562688][ T9378] in_atomic(): 0, irqs_disabled(): 0, pid: 9378, name: kworker/u4:7 [ 190.573552][ T9378] 3 locks held by kworker/u4:7/9378: [ 190.588493][ T9378] #0: ffff88809c699968 ((wq_completion)kstrp){+.+.}, at: process_one_work+0x88b/0x1740 [ 190.599109][ T9378] #1: ffff88805f617dc0 ((work_completion)(&strp->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 190.610247][ T9378] #2: ffff8880a0bc2d10 (sk_lock-AF_INET){+.+.}, at: strp_sock_lock+0x2e/0x40 [ 190.619620][ T9378] CPU: 1 PID: 9378 Comm: kworker/u4:7 Not tainted 5.3.0+ #0 [ 190.627002][ T9378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.637252][ T9378] Workqueue: kstrp strp_work [ 190.641942][ T9378] Call Trace: [ 190.645316][ T9378] dump_stack+0x172/0x1f0 [ 190.649659][ T9378] __cant_sleep.cold+0xa4/0xbc [ 190.654646][ T9378] kcm_parse_func_strparser+0x54/0x200 [ 190.654673][ T9378] ? memset+0x32/0x40 [ 190.654687][ T9378] __strp_recv+0x5dc/0x1b20 [ 190.654714][ T9378] strp_recv+0xcf/0x10b [ 190.654736][ T9378] tcp_read_sock+0x285/0xa00 [ 190.654746][ T9378] ? strp_process+0xf0/0xf0 [ 190.654765][ T9378] ? compat_tcp_getsockopt+0x80/0x80 [ 190.666644][ T9378] ? mark_held_locks+0xa4/0xf0 [ 190.666659][ T9378] ? __local_bh_enable_ip+0x15a/0x270 [ 190.666672][ T9378] ? lock_sock_nested+0xe2/0x120 [ 190.666689][ T9378] ? compat_tcp_getsockopt+0x80/0x80 [ 190.666701][ T9378] strp_read_sock+0x14d/0x200 [ 190.666713][ T9378] ? strp_stop+0x40/0x40 [ 190.666732][ T9378] ? lock_sock_nested+0xe2/0x120 [ 190.666749][ T9378] strp_work+0xe3/0x130 [ 190.666769][ T9378] process_one_work+0x9af/0x1740 [ 190.733636][ T9378] ? pwq_dec_nr_in_flight+0x320/0x320 [ 190.739157][ T9378] ? lock_acquire+0x190/0x410 [ 190.743992][ T9378] worker_thread+0x98/0xe40 [ 190.748494][ T9378] ? trace_hardirqs_on+0x67/0x240 [ 190.753687][ T9378] kthread+0x361/0x430 [ 190.757848][ T9378] ? process_one_work+0x1740/0x1740 [ 190.763853][ T9378] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 190.770286][ T9378] ret_from_fork+0x24/0x30 18:48:26 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, 0x0, 0x10000) r2 = getpgid(0x0) tkill(r2, 0x1000000000016) 18:48:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, 0x20}}, 0x0) 18:48:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 18:48:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x19, 0x0, &(0x7f0000000040)) 18:48:26 executing program 1: unshare(0x20000400) r0 = timerfd_create(0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) timerfd_settime(r0, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x5}}, 0x0) timerfd_gettime(r1, &(0x7f0000eb8000)) 18:48:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) 18:48:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, 0x20}}, 0x0) 18:48:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 18:48:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000c26fec)={0x1, 0x84, 0x103, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0, &(0x7f0000000000), &(0x7f0000000000)='^'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000080), &(0x7f00000000c0)=""/231}, 0x18) 18:48:26 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000140)) [ 193.055636][ T9187] BUG: assuming atomic context at net/kcm/kcmsock.c:382 [ 193.074621][ T9187] in_atomic(): 0, irqs_disabled(): 0, pid: 9187, name: kworker/u4:5 [ 193.151149][ T9187] 3 locks held by kworker/u4:5/9187: [ 193.184234][ T9187] #0: ffff88809c699968 ((wq_completion)kstrp){+.+.}, at: process_one_work+0x88b/0x1740 [ 193.221241][ T9187] #1: ffff8880647dfdc0 ((work_completion)(&strp->work)){+.+.}, at: process_one_work+0x8c1/0x1740 18:48:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 193.248715][ T26] audit: type=1400 audit(1569264506.873:77): avc: denied { map_create } for pid=9913 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 18:48:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) [ 193.290290][ T9187] #2: ffff888098fba190 (sk_lock-AF_INET){+.+.}, at: strp_sock_lock+0x2e/0x40 [ 193.333962][ T9187] CPU: 1 PID: 9187 Comm: kworker/u4:5 Tainted: G W 5.3.0+ #0 [ 193.342678][ T9187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.352778][ T9187] Workqueue: kstrp strp_work [ 193.357504][ T9187] Call Trace: [ 193.360830][ T9187] dump_stack+0x172/0x1f0 [ 193.365176][ T9187] __cant_sleep.cold+0xa4/0xbc [ 193.369960][ T9187] kcm_parse_func_strparser+0x54/0x200 [ 193.375427][ T9187] ? memset+0x32/0x40 [ 193.379420][ T9187] __strp_recv+0x5dc/0x1b20 [ 193.383947][ T9187] strp_recv+0xcf/0x10b [ 193.388117][ T9187] tcp_read_sock+0x285/0xa00 [ 193.392715][ T9187] ? strp_process+0xf0/0xf0 [ 193.397235][ T9187] ? compat_tcp_getsockopt+0x80/0x80 [ 193.402539][ T9187] ? mark_held_locks+0xa4/0xf0 [ 193.407406][ T9187] ? __local_bh_enable_ip+0x15a/0x270 [ 193.412788][ T9187] ? lock_sock_nested+0xe2/0x120 [ 193.417744][ T9187] ? compat_tcp_getsockopt+0x80/0x80 [ 193.423352][ T9187] strp_read_sock+0x14d/0x200 [ 193.428239][ T9187] ? strp_stop+0x40/0x40 [ 193.432508][ T9187] ? lock_sock_nested+0xe2/0x120 [ 193.437498][ T9187] strp_work+0xe3/0x130 [ 193.441770][ T9187] process_one_work+0x9af/0x1740 [ 193.446734][ T9187] ? pwq_dec_nr_in_flight+0x320/0x320 [ 193.452208][ T9187] ? lock_acquire+0x190/0x410 [ 193.456922][ T9187] worker_thread+0x98/0xe40 [ 193.461431][ T9187] ? trace_hardirqs_on+0x67/0x240 [ 193.466567][ T9187] kthread+0x361/0x430 [ 193.470647][ T9187] ? process_one_work+0x1740/0x1740 [ 193.475848][ T9187] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 193.482100][ T9187] ret_from_fork+0x24/0x30 [ 193.541778][ T26] audit: type=1400 audit(1569264506.873:78): avc: denied { map_read map_write } for pid=9913 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 18:48:29 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, 0x0, 0x10000) r2 = getpgid(0x0) tkill(r2, 0x1000000000016) 18:48:29 executing program 3: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) readv(r0, &(0x7f0000000380)=[{&(0x7f00000004c0)=""/230, 0xfffffe9f}], 0x1) 18:48:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 18:48:29 executing program 1: perf_event_open(&(0x7f0000877000)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b78f62a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:48:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 18:48:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) 18:48:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 18:48:29 executing program 3: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) 18:48:29 executing program 5: mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) [ 196.103681][ T9187] BUG: assuming atomic context at net/kcm/kcmsock.c:382 [ 196.116281][ T9187] in_atomic(): 0, irqs_disabled(): 0, pid: 9187, name: kworker/u4:5 18:48:29 executing program 1: perf_event_open(&(0x7f0000877000)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b78f62a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 196.204777][ T9187] 3 locks held by kworker/u4:5/9187: [ 196.219271][ T9187] #0: ffff88809c699968 ((wq_completion)kstrp){+.+.}, at: process_one_work+0x88b/0x1740 [ 196.272278][ T9187] #1: ffff8880647dfdc0 ((work_completion)(&strp->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 196.333217][ T9187] #2: ffff888098fba190 (sk_lock-AF_INET){+.+.}, at: strp_sock_lock+0x2e/0x40 [ 196.373807][ T9187] CPU: 1 PID: 9187 Comm: kworker/u4:5 Tainted: G W 5.3.0+ #0 [ 196.382781][ T9187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.393317][ T9187] Workqueue: kstrp strp_work [ 196.393326][ T9187] Call Trace: [ 196.393345][ T9187] dump_stack+0x172/0x1f0 [ 196.393363][ T9187] __cant_sleep.cold+0xa4/0xbc [ 196.393381][ T9187] kcm_parse_func_strparser+0x54/0x200 [ 196.393392][ T9187] ? memset+0x32/0x40 [ 196.393404][ T9187] __strp_recv+0x5dc/0x1b20 [ 196.393431][ T9187] strp_recv+0xcf/0x10b [ 196.393450][ T9187] tcp_read_sock+0x285/0xa00 [ 196.393461][ T9187] ? strp_process+0xf0/0xf0 [ 196.393480][ T9187] ? compat_tcp_getsockopt+0x80/0x80 [ 196.443372][ T9187] ? mark_held_locks+0xa4/0xf0 [ 196.448267][ T9187] ? __local_bh_enable_ip+0x15a/0x270 [ 196.453650][ T9187] ? lock_sock_nested+0xe2/0x120 [ 196.458595][ T9187] ? compat_tcp_getsockopt+0x80/0x80 [ 196.463882][ T9187] strp_read_sock+0x14d/0x200 [ 196.468596][ T9187] ? strp_stop+0x40/0x40 [ 196.468624][ T9187] ? lock_sock_nested+0xe2/0x120 [ 196.468641][ T9187] strp_work+0xe3/0x130 [ 196.468660][ T9187] process_one_work+0x9af/0x1740 [ 196.482387][ T9187] ? pwq_dec_nr_in_flight+0x320/0x320 [ 196.482403][ T9187] ? lock_acquire+0x190/0x410 [ 196.482433][ T9187] worker_thread+0x98/0xe40 [ 196.502254][ T9187] ? trace_hardirqs_on+0x67/0x240 [ 196.507391][ T9187] kthread+0x361/0x430 [ 196.511559][ T9187] ? process_one_work+0x1740/0x1740 [ 196.516876][ T9187] ? kthread_cancel_delayed_work_sync+0x20/0x20 18:48:30 executing program 1: perf_event_open(&(0x7f0000877000)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b78f62a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:48:30 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x187441, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) [ 196.523398][ T9187] ret_from_fork+0x24/0x30 18:48:32 executing program 4: timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, 0x0, 0x10000) r2 = getpgid(0x0) tkill(r2, 0x1000000000016) 18:48:32 executing program 5: mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 18:48:32 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20200, 0x0) 18:48:32 executing program 1: perf_event_open(&(0x7f0000877000)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b78f62a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:48:32 executing program 0: setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enfo\x7fce\x00', 0x1a9a41, 0x0) 18:48:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) 18:48:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20200, 0x0) 18:48:32 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:48:32 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20041, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RSETATTR(r0, &(0x7f00000002c0)={0x7}, 0x7) 18:48:32 executing program 5: mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) [ 199.229124][ T38] BUG: assuming atomic context at net/kcm/kcmsock.c:382 [ 199.248347][ T38] in_atomic(): 0, irqs_disabled(): 0, pid: 38, name: kworker/u4:2 [ 199.304269][ T38] 3 locks held by kworker/u4:2/38: [ 199.326116][ T38] #0: ffff88809c699968 ((wq_completion)kstrp){+.+.}, at: process_one_work+0x88b/0x1740 [ 199.393904][ T38] #1: ffff8880a9b2fdc0 ((work_completion)(&strp->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 199.451002][ T38] #2: ffff8880634b8c90 (sk_lock-AF_INET){+.+.}, at: strp_sock_lock+0x2e/0x40 18:48:33 executing program 3: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20041, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10}, 0xfffffe23) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 199.491571][ T38] CPU: 0 PID: 38 Comm: kworker/u4:2 Tainted: G W 5.3.0+ #0 [ 199.500345][ T38] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.510533][ T38] Workqueue: kstrp strp_work [ 199.515128][ T38] Call Trace: [ 199.518430][ T38] dump_stack+0x172/0x1f0 [ 199.522782][ T38] __cant_sleep.cold+0xa4/0xbc [ 199.527562][ T38] kcm_parse_func_strparser+0x54/0x200 [ 199.533132][ T38] ? memset+0x32/0x40 [ 199.537120][ T38] __strp_recv+0x5dc/0x1b20 [ 199.541631][ T38] strp_recv+0xcf/0x10b [ 199.545831][ T38] tcp_read_sock+0x285/0xa00 [ 199.550551][ T38] ? strp_process+0xf0/0xf0 [ 199.555267][ T38] ? compat_tcp_getsockopt+0x80/0x80 [ 199.560586][ T38] ? mark_held_locks+0xa4/0xf0 [ 199.565425][ T38] ? __local_bh_enable_ip+0x15a/0x270 [ 199.570798][ T38] ? lock_sock_nested+0xe2/0x120 [ 199.575746][ T38] ? compat_tcp_getsockopt+0x80/0x80 [ 199.581036][ T38] strp_read_sock+0x14d/0x200 [ 199.585740][ T38] ? strp_stop+0x40/0x40 [ 199.589997][ T38] ? lock_sock_nested+0xe2/0x120 [ 199.594973][ T38] strp_work+0xe3/0x130 [ 199.599138][ T38] process_one_work+0x9af/0x1740 [ 199.604107][ T38] ? pwq_dec_nr_in_flight+0x320/0x320 [ 199.609482][ T38] ? lock_acquire+0x190/0x410 [ 199.614378][ T38] worker_thread+0x98/0xe40 [ 199.618889][ T38] ? trace_hardirqs_on+0x67/0x240 [ 199.624029][ T38] kthread+0x361/0x430 [ 199.628278][ T38] ? process_one_work+0x1740/0x1740 [ 199.633505][ T38] ? kthread_cancel_delayed_work_sync+0x20/0x20 18:48:33 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 199.639753][ T38] ret_from_fork+0x24/0x30