[ 40.735751] audit: type=1800 audit(1568062801.923:32): pid=7579 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 46.277055] kauditd_printk_skb: 2 callbacks suppressed [ 46.277069] audit: type=1400 audit(1568062807.543:35): avc: denied { map } for pid=7752 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.60' (ECDSA) to the list of known hosts. 2019/09/09 21:00:14 fuzzer started [ 52.782657] audit: type=1400 audit(1568062814.053:36): avc: denied { map } for pid=7761 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/09/09 21:00:15 dialing manager at 10.128.0.105:38733 2019/09/09 21:00:15 syscalls: 2482 2019/09/09 21:00:15 code coverage: enabled 2019/09/09 21:00:15 comparison tracing: enabled 2019/09/09 21:00:15 extra coverage: extra coverage is not supported by the kernel 2019/09/09 21:00:15 setuid sandbox: enabled 2019/09/09 21:00:15 namespace sandbox: enabled 2019/09/09 21:00:15 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/09 21:00:15 fault injection: enabled 2019/09/09 21:00:15 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/09 21:00:15 net packet injection: enabled 2019/09/09 21:00:15 net device setup: enabled 21:02:30 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$netrom(r0, &(0x7f0000000000)={{0x3, @bcast, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}, 0x48) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0xf, 0x1, {{0x81, 0x2, 0x4}, 0x10000}}, 0x18) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x262402, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000100)={0x0, 0x6, 0x80000001}) r2 = request_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='vboxnet0ppp0systemwlan0self\x00', 0x0) keyctl$read(0xb, r2, &(0x7f0000000200)=""/4096, 0x1000) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000001200)={'veth1_to_team\x00', 0x80000000}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001280)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001740)={&(0x7f00000012c0)={0x470, r3, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffff6c38}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA={0xd0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8e38}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0x94, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'rose0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'bcsf0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x651}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}]}, @TIPC_NLA_LINK={0x8c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0xd4, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x82c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4ed61179}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x97f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x57}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0xc8, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd4c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_team\x00'}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffff80000000}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x800}}, {0x14, 0x2, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x22}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xf5}]}]}, 0x470}, 0x1, 0x0, 0x0, 0x4819}, 0x2000000) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000017c0)={0x0, @in6={{0xa, 0x4e21, 0xace, @loopback}}, 0x8, 0x9, 0x3f, 0x101, 0x10}, &(0x7f0000001880)=0x98) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000018c0)={r5, 0x1ff}, 0x8) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001900)='/dev/autofs\x00', 0x80000, 0x0) ioctl$TIOCSLCKTRMIOS(r6, 0x5457, &(0x7f0000001940)) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001980)='/dev/sequencer2\x00', 0x800000, 0x0) r8 = fcntl$dupfd(0xffffffffffffffff, 0x783c9910b8704ed, r4) ioctl$EVIOCGBITSW(r8, 0x80404525, &(0x7f00000019c0)=""/151) r9 = dup2(r7, 0xffffffffffffffff) connect$inet6(r9, &(0x7f0000001a80)={0xa, 0x4e20, 0xffffffff, @rand_addr="ff04f84a8b393df902904c74f07b7adb", 0x3ff}, 0x1c) r10 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/dlm_plock\x00', 0x8000, 0x0) ioctl$VT_GETMODE(r10, 0x5601, &(0x7f0000001b00)) r11 = syz_open_dev$admmidi(&(0x7f0000001b40)='/dev/admmidi#\x00', 0x91, 0xc2c40) socket$inet_sctp(0x2, 0x1, 0x84) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001b80)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$NBD_SET_BLKSIZE(r11, 0xab01, 0x28) r12 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002e80)='/dev/vsock\x00', 0x40040, 0x0) setsockopt$netlink_NETLINK_RX_RING(r12, 0x10e, 0x6, &(0x7f0000002ec0)={0x5, 0x0, 0x7ff, 0x81}, 0x10) accept4$llc(r6, &(0x7f0000002f00)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000002f40)=0x10, 0x180c00) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000002f80)='ppp0\x00') [ 188.808419] audit: type=1400 audit(1568062950.073:37): avc: denied { map } for pid=7779 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 188.896252] IPVS: ftp: loaded support on port[0] = 21 21:02:30 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000040)={0x2, 0x8, 0x100000000, 0x7ff, 0x7ff, 0x1}) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)=0x1, 0x4) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x3, 0x8d3644f45eae66d8) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) setsockopt$rose(r2, 0x104, 0x6, &(0x7f0000000240)=0x2, 0x4) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x248000, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x48, &(0x7f00000002c0)=[@in6={0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, [], 0xc}, 0x2}, @in6={0xa, 0x4e24, 0xfff, @rand_addr="35a2e3d3924d8839e3087912fe8b6dbf", 0x5}, @in={0x2, 0x4e21, @local}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000003c0)={r4, 0x4d, 0x5, [0x8, 0x1ff, 0x9, 0xffff, 0x4]}, 0x12) r5 = syz_open_dev$admmidi(&(0x7f0000000400)='/dev/admmidi#\x00', 0x7, 0x400000) read$eventfd(r5, &(0x7f0000000440), 0x8) pipe(&(0x7f0000000480)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r6, 0x84, 0x21, &(0x7f00000004c0), &(0x7f0000000500)=0x4) fcntl$getown(r3, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000007c0)=0xe8) r8 = getuid() syz_mount_image$f2fs(&(0x7f0000000540)='f2fs\x00', &(0x7f0000000580)='./file0\x00', 0x3ff, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="1764bbbf136d4cca12e8f564584d1cdc79dc5636cfbae43767ea5e56f9e6f40d33f89bff78343c013aef3439b12c3dfba4885ebd6591f72a7887f7eebb8dafd3efd70363609da644b3f21320616a96cb8e06e75f9a4e9503b8f489313e54b1118d070baa33ee666ef1d4c15161c73b7441828d972bab35052c32f41a768674062dc75bbd42116323234c09f0a996949477441c9b86727e98f2f13e86f38c34", 0x9f, 0x7f}], 0x100030, &(0x7f0000000800)={[{@background_gc_sync='background_gc=sync'}, {@usrquota={'usrquota', 0x3d, 'vmnet0,vmnet0GPL/GPLlo'}}, {@disable_roll_forward='disable_roll_forward'}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<', r7}}, {@measure='measure'}, {@smackfsroot={'smackfsroot', 0x3d, 'vmnet1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'keyring'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@euid_gt={'euid>', r8}}, {@subj_user={'subj_user', 0x3d, 'selfem1+trusted\xf4wlan1!em1%:'}}]}) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000001ac0)={0x100, 0x6, 0x1, 0x96, &(0x7f0000000940)=""/150, 0xb2, &(0x7f0000000a00)=""/178, 0x1000, &(0x7f0000000ac0)=""/4096}) socket(0x1, 0x800, 0x4) pipe(&(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETXW(r9, 0x5435, &(0x7f0000001b40)={0x0, 0x3, [0x20, 0x8, 0x8, 0x200, 0x1], 0x9}) syz_open_pts(0xffffffffffffffff, 0x101000) r10 = syz_open_dev$vcsa(&(0x7f0000001b80)='/dev/vcsa#\x00', 0x5, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000001bc0)={0x5, 0xffffffffffffffff}) sendfile(r10, r11, &(0x7f0000001c00), 0x80000001) r12 = openat$null(0xffffffffffffff9c, &(0x7f0000001c40)='/dev/null\x00', 0x8001, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000001c80)={0x5, 0x0, 0x0, 0x100}) ioctl$DRM_IOCTL_SG_ALLOC(r12, 0xc0106438, &(0x7f0000001cc0)={0x2, r13}) [ 189.021167] chnl_net:caif_netlink_parms(): no params data found [ 189.120987] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.127831] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.137012] device bridge_slave_0 entered promiscuous mode [ 189.145534] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.153278] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.161067] device bridge_slave_1 entered promiscuous mode 21:02:30 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x204081) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x1, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f00000000c0)=""/139) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000180)={0x2, 0x7c3a}) readv(r1, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/152, 0x98}], 0x1) r2 = getpgrp(0xffffffffffffffff) ptrace$pokeuser(0x6, r2, 0x4, 0x8) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x9e2a738f52b3637d, 0x0) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000300)={0x4, 0x101, 0x6}) write$P9_RWALK(r1, &(0x7f0000000340)={0x30, 0x6f, 0x1, {0x3, [{0x68, 0x1, 0x1}, {0x80, 0x1, 0x2}, {0x40, 0x0, 0x4}]}}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)={0x0, 0x0}) move_pages(r4, 0x2, &(0x7f00000003c0)=[&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil], 0x0, &(0x7f0000000400)=[0x0, 0x0], 0x6) r5 = syz_open_dev$admmidi(&(0x7f0000000440)='/dev/admmidi#\x00', 0x8, 0x111840) ioctl$SCSI_IOCTL_SYNC(r5, 0x4) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480)='/dev/snapshot\x00', 0x10000, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x1c, &(0x7f00000004c0)={@initdev}, &(0x7f0000000500)=0x14) mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f0000000540)=""/53) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x100, 0x0) write$selinux_user(r7, &(0x7f00000005c0)={'system_u:object_r:netlabel_mgmt_exec_t:s0', 0x20, 'root\x00'}, 0x2f) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x0, 0x2) r8 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$sock_linger(r8, 0x1, 0xd, &(0x7f0000000640)={0x0, 0xff}, 0x8) socket$nl_netfilter(0x10, 0x3, 0xc) r9 = accept4$inet(0xffffffffffffffff, &(0x7f0000000680)={0x2, 0x0, @local}, &(0x7f00000006c0)=0x10, 0x800) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f0000000700)={0x34f, 0x8, 0x1ff, 0x5, 0x0}, &(0x7f0000000740)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r9, 0x84, 0xf, &(0x7f0000000780)={r10, @in={{0x2, 0x4e21, @multicast2}}, 0x7fffffff, 0x5, 0x0, 0x80000000, 0x5}, &(0x7f0000000840)=0x98) r11 = fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(r11, &(0x7f0000000880)='net/protocols\x00') sendto$x25(r3, &(0x7f00000008c0)="11665edf75d64a57a2df81775dcb421e7a8ea874c2681745c7e8ee6ca135b541b8fcb73ec04e95ee201f7976040b1b3df0f5b77f23fc0ec208fa422f7d3f59f407f04f48638f73824182c98a6fee103a2d66eb1f0cd93896b1e4cd59d1f3826e8656b1378ecfc83316e450262e2301dd4b3a7da1116613a686742a637d8229d5d2c9ef207ad9780fe19bc12c4efb682b7b0b03bafa145a96b65924309dbef88809336a74c9108c7f682653c6488a1ee77881162c98f1e8458760a3bbf1dde797942e004b00291b58bc26e74bbacff3ab957189979355", 0xd6, 0x0, 0x0, 0x0) [ 189.193651] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 189.203560] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 189.223710] IPVS: ftp: loaded support on port[0] = 21 [ 189.246196] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 189.255747] team0: Port device team_slave_0 added [ 189.273963] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 189.288380] team0: Port device team_slave_1 added [ 189.295465] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 189.323161] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 189.375322] IPVS: ftp: loaded support on port[0] = 21 21:02:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x54) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x40040, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000100)={{0x3, 0x2, 0x6, 0x0, 0xfffffffffffffffe}, 0xffffffff, 0x7}) getpeername$netrom(r1, &(0x7f0000000180)={{0x3, @null}, [@bcast, @bcast, @null, @rose, @null, @null, @netrom, @null]}, &(0x7f0000000200)=0x48) r2 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x1, 0x2) fsetxattr$security_evm(r2, &(0x7f0000000280)='security.evm\x00', &(0x7f00000002c0)=@v1={0x2, "84b1e0611737ff6a083aac1b7ae577fea4ab"}, 0x13, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x260400, 0x0) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f0000000340)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r4, 0x6) pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x48000) ioctl$EVIOCGID(r5, 0x80084502, &(0x7f00000004c0)=""/93) r6 = syz_open_dev$vbi(&(0x7f0000000540)='/dev/vbi#\x00', 0x1, 0x2) r7 = accept$unix(0xffffffffffffffff, &(0x7f0000000580), &(0x7f0000000600)=0x6e) ioctl$FICLONERANGE(r6, 0x4020940d, &(0x7f0000000640)={r7, 0x0, 0x1, 0x7d29, 0x1f}) r8 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000680)='cgroup.type\x00', 0x2, 0x0) ioctl$int_in(r8, 0x5421, &(0x7f00000006c0)=0x224) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000700)='/dev/btrfs-control\x00', 0x30b000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80)={0x0, 0x0}, &(0x7f0000000bc0)=0xc) syz_mount_image$gfs2(&(0x7f0000000740)='gfs2\x00', &(0x7f0000000780)='./file0\x00', 0x8, 0x4, &(0x7f0000000b00)=[{&(0x7f00000007c0)="f94ab749ab13d961c427a8de7af4d782661b09a962c8f4d435dc6bd6e1df6ac1dd403ac4d1723690d8dcb6f628553451c34f72b450a770d22e140baab0e3a4865289569613f0f2f35e265baf631ae47d4154f6ce91f8512006174dc529dffa0fecfbbff0a07cddb893d6cea0a1c4fa628e8f3597ad470cfcc37bb74fbcaa9e2c041fae2b3475a36ef6de06819774570ea2f0b2a6fa98b92d945086433d16", 0x9e, 0x81}, {&(0x7f0000000880)="1c4cc6ae0e0243d29e93bae05c1b7a34575985b1cd94db2544428490fa6b942052200d2ea13d549f6459c45d6c9172a6ce7a86d5a1a32ce9f35b6ae21c031d9584a9a1ac31ed03177fd8d3ec13df99b2c7b5377e04155edf19f92e08d2529de59ad2be58de09f68fc504477b8ff759243f391ddb54bd5606372ac80d97075d1127df91fd783e97fb06cf7e66104c1609c136ba9016212236cc25f609949bb91317fc5a0f4b5a9039aed75805bcdb74c73961488d6f1e00c9a2ddec8741654484fc7955347c9c6a606206eb9e1effdf896fe47194d976551e1e682755758c89c16b378e35", 0xe4, 0x1}, {&(0x7f0000000980)="8d39b3591ae4018a3378d66f46a15abbe0a6b333130b4f2aef1f2a74edd88ab929a71dc0dd02e47287972a53db221c73d0c4eb590807811d801627493f457c7c5e63105f0882c016f6bf92f75d86bd855764d8c4ea45e4eabe6ceb7aa8c1f285b1b2fbfe3b062320be608e5d3ee9eb430bc86eb8470c99999847239a5e5e4277c45cd3a1ae1f4b2a58ffa5ba0e32f074cd670baddc2f46a1b191dac9907890c76cd1d2ecff18b0a4c8628b02d500bc4ea6433abefe2eb33761390c3646", 0xbd, 0xfffffffffffffffd}, {&(0x7f0000000a40)="34ecbce8862e33f88ea2b1d0b5d68c600a270764f6832fbee796e9095919bad9e42b155b072c3da340af7090356f614c9a67bd2eaaa7e16ddadca61cfc5bf07f4339e5ff5c5fd08c29752cae802c127f769364a517f517c33c70ecb332c7ba4b60d07909e92e1670adc82a35075fb197aca3853781fab8e311b9c9badcc1aed5bf573dc71f422c69ee70b1f102d1063d0e03588b4ecd35e7102db8", 0x9b, 0x100000}], 0x1000000, &(0x7f0000000c00)={[{@hostdata={'hostdata', 0x3d, '/dev/hwrng\x00'}}], [{@subj_role={'subj_role', 0x3d, '/dev/sequencer\x00'}}, {@fowner_lt={'fowner<', r9}}, {@dont_hash='dont_hash'}]}) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000c80)) ioctl$TIOCLINUX2(r6, 0x541c, &(0x7f0000000cc0)={0x2, 0x8001, 0x0, 0xfc1, 0xf6, 0x400}) r10 = syz_open_dev$audion(&(0x7f0000000d00)='/dev/audio#\x00', 0x400, 0x42200) write$smack_current(r10, &(0x7f0000000d40)=']$eth0%#em0em1:%\'\x00', 0x12) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/enforce\x00', 0x8000, 0x0) r11 = syz_open_dev$sndmidi(&(0x7f0000000dc0)='/dev/snd/midiC#D#\x00', 0x7, 0x420843) lseek(r11, 0x0, 0x3) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000e00)='/selinux/enforce\x00', 0x101c00, 0x0) r12 = socket$rds(0x15, 0x5, 0x0) connect$rds(r12, &(0x7f0000000e40)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) [ 189.431996] device hsr_slave_0 entered promiscuous mode [ 189.478487] device hsr_slave_1 entered promiscuous mode [ 189.518794] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 189.525879] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 189.565615] IPVS: ftp: loaded support on port[0] = 21 [ 189.585259] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.591837] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.598847] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.605227] bridge0: port 1(bridge_slave_0) entered forwarding state 21:02:30 executing program 4: r0 = semget(0x2, 0x0, 0x4) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000000)=0x5) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendto$inet6(r1, &(0x7f0000000080)="1af2fe8e638101dcf9b37cfce7494a8309e95894e6aa2673cd9d8e3e61789e30f61acc5f654f8e69c6", 0x29, 0xc00, &(0x7f00000000c0)={0xa, 0x4e24, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x81}, 0x1c) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x4b6, {{0x2, 0x4e23, @local}}, 0x0, 0x6, [{{0x2, 0x4e23, @multicast1}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e20, @rand_addr=0x3}}, {{0x2, 0x4e22, @remote}}, {{0x2, 0x4e21, @local}}, {{0x2, 0x4e22, @loopback}}]}, 0x390) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/status\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000500)={0x2e, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e23, 0x1, 'lc\x00', 0x12, 0x2, 0xd}, 0x2c) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/mls\x00', 0x0, 0x0) io_submit(0x0, 0x4, &(0x7f0000000900)=[&(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x66, r3, &(0x7f0000000540)="cb2de6bea9d418ce91bf570fbc4d4d313386e3e5bf446ebd397e778813c29154ad", 0x21, 0x4, 0x0, 0x2, r4}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x3, 0x6, 0xffffffffffffffff, &(0x7f0000000600)="a64e055494012a32a67b8633df73ce711b8e55d2cdc1dd1c5c1624c199ab6992725dbdffcda0fb1ad8844bbb78348087fd8977c0fa9eb3f151be9662b2e9c84f1924601aaac1cdb324286ddc3cf3794779e72254f653127c63e46cecaab7ded2bbbe0913fcd6c41d6c94258652fe32560d5cb9f6876332849d2817a028617077fd4e01889a275f2e1201c7b526f2b5e2fd9b2ebff37928f2e6e28ba9aff81569f7fe5edb436d358a7f102e8738c5e7e600a312f22ff6f964697097", 0xbb, 0x0, 0x0, 0x1, r5}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffff, &(0x7f0000000740)="631fce60fbaaa62a0973cc422195ad67260878fa9b543f944dbfafa18bf67b79d4f070ef2e8b88edeb616d0a42de7eea49f3f743af07ef5bc06d84c242f5d04d1541d1ceb50b289f66007d557f558f0640fb4c3d2e189a4bce9e171bdd830ef1c4d4af15b8abfce05c4c3f6f165fd58aea352b85b6d208fd9c7a01dba4a595e4094b6b2f1176d769d1185a77c08d718dfe9fac54cdd270e583c2345d7d5f4ebeb7757ea5a4878e03e6774e7e2bed", 0xae, 0x2a4, 0x0, 0x1, r2}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x7, 0xcfcc, 0xffffffffffffffff, &(0x7f0000000840)="32f59a515e5ba6535730b986110a23d4cf5f5f6eaa833d42bee1f68c840e3bcbec77702f1f7add5f7e42dff13cd751d9f658a462ba92e164d847ce725ff98aadfd7b8471e109428dff5ff2e215ce48f581fa929ad14276d87f7c7ed06bd301ee6afddd0d2c9af1018852021885b69bbfc43da9f1a00ba528", 0x78, 0x320, 0x0, 0xbb3cfcbb47ea03bb, r1}]) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000940)) connect$llc(0xffffffffffffffff, &(0x7f0000000980)={0x1a, 0x1, 0x8, 0x5e, 0x7, 0x6, @random="83d05a75a916"}, 0x10) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dsp\x00', 0x100, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000a00)=0x8) getpeername(r6, &(0x7f0000000a40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000ac0)=0x80) ioctl$sock_inet_SIOCDARP(r7, 0x8953, &(0x7f0000000b00)={{0x2, 0x4e21, @broadcast}, {0x303, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x4dd32432754e4533}}, 0x48, {0x2, 0x4e21, @multicast1}, 'bpq0\x00'}) r8 = syz_open_dev$vivid(&(0x7f0000000b80)='/dev/video#\x00', 0x2, 0x2) fcntl$setstatus(r8, 0x4, 0x800) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000bc0)=0x10001) openat$zero(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/zero\x00', 0x6356285d1bb10335, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)='trusted.overlay.origin\x00', &(0x7f0000000cc0)='y\x00', 0x2, 0x3) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000d00)={0x2, 0x5, 0x0, 0x8, 0x3}) r9 = syz_open_dev$media(&(0x7f0000000d40)='/dev/media#\x00', 0x8, 0x400303) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000d80)={0x3, 0x4, 0x1, 0x2}, 0x8) io_setup(0x8, &(0x7f0000000dc0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000e00)={{0x2, 0x4e20, @empty}, {0x306, @local}, 0x30, {0x2, 0xffffffff, @empty}, 'veth0\x00'}) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r9, 0xc040564b, &(0x7f0000000e80)={0x8, 0x0, 0x2018, 0x6, 0x3ff, {0x65d, 0x3}}) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/zero\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000f00)={0x0, @in={{0x2, 0x4e20, @remote}}, 0xe886, 0x1}, &(0x7f0000000fc0)=0x90) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r10, 0x84, 0x7c, &(0x7f0000001000)={r11, 0xeda, 0x9}, 0x8) [ 189.751011] chnl_net:caif_netlink_parms(): no params data found [ 189.787402] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 189.793989] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.835246] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 189.891995] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 189.898121] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.912138] IPVS: ftp: loaded support on port[0] = 21 [ 189.917777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.930424] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.951159] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.960002] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 21:02:31 executing program 5: r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x1) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000040)=0x792e6073, 0x4) r1 = getpgrp(0xffffffffffffffff) ptrace$getregs(0x1c, r1, 0x9, &(0x7f0000000080)=""/218) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000340)={0xc, 0x8, 0xfa00, {&(0x7f00000001c0)}}, 0x10) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0xa200, 0x0) r4 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0xffffffff80000000, 0x40200) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) pwrite64(r4, &(0x7f0000000400)="6a3d1c61094dfcdf452739c44c5982c541d0b3326ed21e6527355a5d8b7379cd6c0f483ad42bde754737a2e946c325ff87a47817a67babf0674624487ce87a3b98f8fafcfd8d434a1d194b8c7f16d34f478c8b543233179e46c9f21e32a9e47ad055283bac8fecadd8e472bbcdd1b1507647d4cf6644eebeb27d30fcd6546472a07affd7fc07", 0x86, 0x0) getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000004c0), &(0x7f0000000500)=0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) ptrace$peek(0x1, r5, &(0x7f00000005c0)) r7 = syz_open_dev$sg(&(0x7f0000000600)='/dev/sg#\x00', 0xfffffffffffffffa, 0x20000) ioctl$SG_SET_RESERVED_SIZE(r7, 0x2275, &(0x7f0000000640)=0x100000001) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@mcast2, @in6=@empty, 0x4e21, 0x100000001, 0x4e22, 0x100, 0xa, 0x60, 0xa0, 0x11, r8, r6}, {0x7ff, 0x6, 0x89c, 0x400, 0x7, 0x0, 0x1, 0x5}, {0x5, 0x5, 0x6, 0x80000000}, 0x8, 0x6e6bb2, 0x1, 0x0, 0x2}, {{@in=@rand_addr=0x1, 0x4d6, 0x2b}, 0xdc686f2fb6761274, @in=@loopback, 0x34ff, 0x2, 0x0, 0x7, 0x662, 0x1, 0x490}}, 0xe8) process_vm_writev(r1, &(0x7f0000004bc0)=[{&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f0000001a00)=""/4096, 0x1000}, {&(0x7f0000002a00)=""/4096, 0x1000}, {&(0x7f0000003a00)=""/33, 0x21}, {&(0x7f0000003a40)=""/208, 0xd0}, {&(0x7f0000003b40)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/116, 0x74}], 0x7, &(0x7f0000004dc0)=[{&(0x7f0000004c40)=""/24, 0x18}, {&(0x7f0000004c80)=""/161, 0xa1}, {&(0x7f0000004d40)=""/11, 0xb}, {&(0x7f0000004d80)=""/27, 0x1b}], 0x4, 0x0) r9 = syz_open_dev$cec(&(0x7f0000004e00)='/dev/cec#\x00', 0x0, 0x2) ioctl$sock_ax25_SIOCDELRT(r9, 0x890c, &(0x7f0000004e40)={@bcast, @default, 0x1, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null]}) r10 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000004ec0)='/dev/ubi_ctrl\x00', 0x408840, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000004f80)={0xa, &(0x7f0000004f00)=[{0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_LOCK(r10, 0x4008642a, &(0x7f0000004fc0)={r11, 0x24}) r12 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005000)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000005100)=0xe8) lstat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200)={r12, r13, r14}, 0xc) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000005240)=0x3) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005280)=0x0) getpgrp(r15) [ 190.034721] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.050618] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.057067] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.085930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.106310] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.112764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.129631] chnl_net:caif_netlink_parms(): no params data found [ 190.163068] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.169766] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.187283] device bridge_slave_0 entered promiscuous mode [ 190.204215] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 190.227800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.252217] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.262235] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.276154] device bridge_slave_1 entered promiscuous mode [ 190.293317] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 190.317952] IPVS: ftp: loaded support on port[0] = 21 [ 190.323656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.334657] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.356696] chnl_net:caif_netlink_parms(): no params data found [ 190.396371] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.427455] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 190.450741] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 190.467819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.476972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.515610] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 190.551700] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.581596] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.589369] device bridge_slave_0 entered promiscuous mode [ 190.599918] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.606280] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.613515] device bridge_slave_1 entered promiscuous mode [ 190.628416] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 190.638316] team0: Port device team_slave_0 added [ 190.644079] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 190.651523] team0: Port device team_slave_1 added [ 190.674984] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 190.687194] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 190.694389] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 190.703230] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.709729] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.716667] device bridge_slave_0 entered promiscuous mode [ 190.725348] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.732087] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.739446] device bridge_slave_1 entered promiscuous mode [ 190.746495] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 190.761661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.769404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.778840] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 190.786628] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 190.799296] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 190.805432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.812775] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 190.856625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.864607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.940214] device hsr_slave_0 entered promiscuous mode [ 190.978753] device hsr_slave_1 entered promiscuous mode [ 191.021296] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 191.028272] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 191.035768] team0: Port device team_slave_0 added [ 191.046038] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 191.055430] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 191.072812] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 191.081247] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 191.089692] team0: Port device team_slave_1 added [ 191.095186] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 191.102890] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 191.125409] chnl_net:caif_netlink_parms(): no params data found [ 191.170362] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 191.177669] team0: Port device team_slave_0 added [ 191.184692] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 191.192086] team0: Port device team_slave_1 added [ 191.230019] device hsr_slave_0 entered promiscuous mode [ 191.278783] device hsr_slave_1 entered promiscuous mode [ 191.322770] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 191.335885] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 191.344107] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 191.352596] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 191.360505] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 191.377400] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.383966] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.391687] device bridge_slave_0 entered promiscuous mode [ 191.398781] chnl_net:caif_netlink_parms(): no params data found [ 191.427382] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.434987] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.442721] device bridge_slave_1 entered promiscuous mode [ 191.462894] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.477385] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 191.540259] device hsr_slave_0 entered promiscuous mode [ 191.578926] device hsr_slave_1 entered promiscuous mode [ 191.618770] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 191.635344] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 191.655585] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 191.664056] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 191.671874] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 191.693773] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.700608] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.708585] device bridge_slave_0 entered promiscuous mode [ 191.715415] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.722595] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.730052] device bridge_slave_1 entered promiscuous mode [ 191.741158] audit: type=1400 audit(1568062953.013:38): avc: denied { associate } for pid=7780 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 191.797660] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 191.811968] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 191.820046] team0: Port device team_slave_0 added [ 191.855785] audit: type=1400 audit(1568062953.123:39): avc: denied { create } for pid=7802 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 191.881013] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 191.892259] audit: type=1400 audit(1568062953.163:40): avc: denied { write } for pid=7802 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 191.898506] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 191.930152] team0: Port device team_slave_1 added [ 191.943513] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 21:02:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000002300)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/114, 0x72}, {&(0x7f0000001400)=""/51, 0x33}, {&(0x7f0000001440)=""/190, 0xbe}], 0x4, &(0x7f0000001540)=""/161, 0xa1}, 0xfff}, {{&(0x7f0000001600)=@nfc, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001680)=""/208, 0xd0}, {&(0x7f0000001780)=""/82, 0x52}, {&(0x7f0000001800)=""/176, 0xb0}, {&(0x7f00000018c0)=""/63, 0x3f}, {&(0x7f0000001900)=""/125, 0x7d}, {&(0x7f0000001980)=""/186, 0xba}], 0x6}, 0x200}, {{&(0x7f0000001ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001b40)=""/224, 0xe0}, {&(0x7f0000001c40)=""/147, 0x93}, {&(0x7f0000001d00)=""/255, 0xff}, {&(0x7f0000001e00)=""/1, 0x1}, {&(0x7f0000001e40)=""/202, 0xca}, {&(0x7f0000001f40)=""/57, 0x39}], 0x6}, 0xfffffffffffffffb}, {{&(0x7f0000002000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000002240)=[{&(0x7f0000002080)=""/45, 0x2d}, {&(0x7f00000020c0)=""/162, 0xa2}, {&(0x7f0000002180)=""/162, 0xa2}], 0x3, &(0x7f0000002280)=""/116, 0x74}, 0x1}], 0x4, 0x40000100, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/create\x00', 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002400)=@newlink={0x58, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x38, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x2c, 0x2, [@IFLA_GRE_LOCAL={0x8, 0x6, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IFLA_GRE_LOCAL={0x8, 0x6, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IFLA_GRE_REMOTE={0x8, 0x7, @remote}, @IFLA_GRE_LOCAL={0x8, 0x6, @dev={0xac, 0x14, 0x14, 0x23}}, @IFLA_GRE_REMOTE={0x8, 0x7, @rand_addr=0x7ff}]}}}]}, 0x58}}, 0x0) [ 191.952065] audit: type=1400 audit(1568062953.163:41): avc: denied { read } for pid=7802 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 191.969790] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.998976] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 192.008706] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.015404] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 192.070421] device hsr_slave_0 entered promiscuous mode [ 192.088516] device hsr_slave_1 entered promiscuous mode [ 192.129256] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 192.149748] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 192.163923] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 21:02:33 executing program 0: syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f00000001c0)=0x8000000) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0x2, 0x81, 0x9, 0x800, 0xffffffffffffffff}) ioctl(r2, 0x1000008912, &(0x7f0000001c00)="11dca5055e0bcfe47bf070") ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x80, &(0x7f0000000800)}) [ 192.176060] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 192.188032] team0: Port device team_slave_0 added [ 192.195070] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 192.215221] team0: Port device team_slave_1 added 21:02:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x80000) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f00000001c0)) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) fstat(r2, &(0x7f0000000100)) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020185ffffff01000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 192.223669] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 192.233097] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 192.249730] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 192.270883] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 192.292192] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.301397] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 192.312094] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 192.322438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.332704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.354093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.365639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.374723] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.381157] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.388294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.397918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.406104] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 192.406822] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 192.422908] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 192.433288] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 192.441696] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 192.450197] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.458918] loop0: p4 size 32768 extends beyond EOD, truncated [ 192.465914] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 192.466103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.481235] loop0: p6 size 32768 extends beyond EOD, truncated [ 192.486840] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.495401] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.501837] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.525056] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.534251] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 192.548596] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 192.554687] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.575805] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 192.584298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 192.623953] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 192.671272] device hsr_slave_0 entered promiscuous mode [ 192.718512] device hsr_slave_1 entered promiscuous mode [ 192.747551] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 192.756971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 21:02:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-aesni\x00'}, 0x58) flistxattr(0xffffffffffffffff, &(0x7f0000000080)=""/199, 0xc7) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f00000001c0)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280-avx2)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x5, 0x0, 0xfffffee7) [ 192.787025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.803817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.815807] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.822269] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.824524] QAT: Invalid ioctl [ 192.831326] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 192.841024] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 192.849461] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 192.858659] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 192.866665] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 21:02:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$sock_int(r0, 0x1, 0x28, 0x0, &(0x7f0000000040)) [ 192.886413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.893812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.901914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 192.910001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.913381] QAT: Invalid ioctl [ 192.917034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.934265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.950954] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.957646] audit: type=1400 audit(1568062954.223:42): avc: denied { create } for pid=7850 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 21:02:34 executing program 0: clock_gettime(0x6, &(0x7f0000000440)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f00000001c0)={r0, r1/1000+30000}, 0x10) setresgid(0x0, 0xee00, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x268000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0x40085112, &(0x7f0000000100)={{}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f00000006c0)=0x1055e) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000100)={r3, 0x0, 0x0, 0x4, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000080)={r3, @in6={{0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x8}}, 0x4, 0xfffffffffffffbff, 0x3, 0x0, 0x6}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r3, 0x800}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000580)={r4, 0xa2, "63aa55921df783ae46697e52f3a2d34034243d9de48b810f25de2c01c27df0f93c2e732594485846a567cb9db930edaeeee0c1e896e6181d816a70558dee8fdae30e5d23b424887f12f94795b1423cd0f3d64740d6e361ae2017c82f466d487183f00ef3e4e3f39e5eefc01bf4c7dc6171d70dd181ce7368acdc3d737814c2e4c87a7bc0cb9bff5da02c1e07f7fac9095838ced0efd71595fc468422d7e8662878a9"}, &(0x7f0000000400)=0xaa) setgroups(0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$VHOST_SET_FEATURES(r5, 0x4008af00, &(0x7f00000001c0)=0x8000000) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r5, 0x40085112, &(0x7f0000000100)={{}, {}, 0x80000, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) setresuid(0x0, 0xfffe, 0xffffffffffffffff) shmget$private(0x300000000000000, 0x4000, 0x1804, &(0x7f0000ffb000/0x4000)=nil) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000000)=0x2, 0x4) [ 192.959813] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.988554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.996013] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.017430] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 193.025753] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.065165] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 193.069391] hugetlbfs: syz-executor.0 (7856): Using mlock ulimits for SHM_HUGETLB is deprecated [ 193.075348] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 193.094033] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 193.105772] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready 21:02:34 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x80) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000140)={&(0x7f0000000200)=""/243, 0x8000, 0x1000}, 0x18) fcntl$setstatus(r1, 0x4, 0x46c00) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e24, @broadcast}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400204) ioctl(r0, 0x1000c1004110, &(0x7f0000000000)="20a88ef1c81af186bdae40f60d") r5 = inotify_init() fsetxattr$security_smack_transmute(r5, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x2) [ 193.116197] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 193.129497] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.137327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.145491] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.151921] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.159567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.172863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.181971] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.188436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.199949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.207711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.215578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.223467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.231460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.241576] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 193.255318] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 193.264009] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 193.271551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.281178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.289211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.306432] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.315864] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 193.330603] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 193.340014] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 193.348713] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 193.358114] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 193.367101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.375443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.383650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.395603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.404906] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.413400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.421859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.429718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.437350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.446081] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.453335] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.464888] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 193.473860] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 193.485633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.493865] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.503194] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 193.509822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.517679] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 193.527599] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 193.538080] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 193.546079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.556340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.564444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.571599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.578856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.586299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.595828] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 193.610301] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 193.616418] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.631014] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 193.638668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.646688] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.654394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.662160] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.673780] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 193.680274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.688544] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 193.695626] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 193.708118] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 193.714845] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.724855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.733240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.741058] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.747387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.754847] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.765080] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 193.785322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.796544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.805888] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.812272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.822452] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 193.832590] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 193.840326] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 193.847129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.855267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.865391] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 193.877563] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.889621] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 193.906330] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.914117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.922954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.931703] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.943494] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 193.962129] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.977480] audit: type=1400 audit(1568062955.243:43): avc: denied { create } for pid=7865 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 193.979210] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.009766] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 194.016411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.025058] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.035581] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 194.050897] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 194.074010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.081958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.089983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.097504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.107305] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 194.114084] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.135284] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 194.160720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.172897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.186008] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 194.206918] gfs2: not a GFS2 filesystem [ 194.226802] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 194.233936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.241381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.252195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.260333] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.266750] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.274946] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.289991] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 194.304713] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 194.315172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.323612] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.331437] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.337819] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.340656] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 194.356194] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.365675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.377941] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 194.394725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.405978] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 194.434045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.450682] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.460701] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 21:02:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x30, r4, 0x805, 0x0, 0x0, {{}, 0x0, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r5 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000000)={0x0, 0x0, 0x4, r5}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x336, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:02:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0xfffffffffffffffd, 0x2) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000300)={0xb36, 0x5, 0x7, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x100000000, 0x4, 0x7ff, 0x0, 0x1ff, 0x2, 0x7f, 0x73, 0x100000001, 0x2a0f}) close(0xffffffffffffffff) close(r0) r2 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x3ff, 0x0) bind$unix(r2, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) r3 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7, 0x400000) sendto$isdn(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="030000007200000005e1e9bec684e870663697caf63387fced55656d78a9f643ac1d6457306aa3"], 0x27, 0x4000000, &(0x7f00000000c0)={0x22, 0x8001, 0x0, 0x80000001, 0x4}, 0x6) syz_open_dev$sndmidi(&(0x7f0000000340)='/dev/snd/midiC#D#\x00', 0x8, 0x0) 21:02:35 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new user:syz 040'], 0x1, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280100, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000000)={0x2}) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x3}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 194.491693] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 194.512332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.532730] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.557066] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 194.580583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.588991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.606353] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 194.614454] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 194.647584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.656108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.656641] hrtimer: interrupt took 55548 ns [ 194.673059] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 194.680670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.710108] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 194.744162] 8021q: adding VLAN 0 to HW filter on device batadv0 21:02:36 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000006c0)={'nr0\x01\x00', 0x802}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000300)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000200)={0x4}) write$cgroup_int(r0, &(0x7f00000000c0), 0xfdef) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x8800, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000000180)={&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000140)=""/10, 0xa}) 21:02:36 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000200)={0x8098f925, 0x0, "9c6ebc48978e357c4b1b409a68962401009a27daa6ab637acc4af6a7a0c8d404"}) 21:02:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) ioctl$sock_TIOCINQ(r1, 0x541b, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mmap$perf(&(0x7f000060b000/0x3000)=nil, 0x3000, 0x4, 0x4010, r1, 0x0) 21:02:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x8, &(0x7f0000000280)={0x0, {}, 0x0, &(0x7f00000000c0)="c4a109dcc8c42230f350ccc4237962960008804100f3410f114d816666f3400f1eebf3430f1ee1c421d9e2cb430f18dcc4412c14878c7300002ef04181a42000000000a42d0000"}, &(0x7f0000000200)={0x0, {}, 0x0, &(0x7f0000000300)="f23ab100000100c40201a8213e642e66420f71f6f23e0f38f9790f0fae8a0200000066470f3808bedd000000f36d64f3440fa6d02e3e3e660f38f58beb000000f3428f1a9af5c0f885"}, 0x8, &(0x7f0000000240)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) 21:02:36 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="11dc080000000000000070") r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x4, 0x400040) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@timestamp, @window={0x3, 0x6, 0x40}, @timestamp, @timestamp, @sack_perm, @window={0x3, 0x6, 0x1ff}], 0x6) keyctl$clear(0x7, 0xfffffffffffffffd) accept4$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e, 0x800) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) fcntl$setstatus(r1, 0x4, 0x46c00) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='\xfcemore\xff#vents\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000080)) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000340)=0xd404fe3b9b640e48) write$cgroup_pid(r5, &(0x7f0000000000), 0xfffffea6) 21:02:36 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x4e24, @empty}, {0x6, @broadcast}, 0x0, {0x2, 0x4, @remote}, 'veth0_to_bridge\x00'}) r0 = socket$inet(0x2, 0x80003, 0x80000000002) ioctl$BINDER_THREAD_EXIT(0xffffffffffffffff, 0x40046208, 0x0) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x80000, 0x4) setsockopt$inet_int(r0, 0x0, 0x100000000c8, 0x0, 0x4) 21:02:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000000)="11dca50d6c0bcfe47bf070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae93, &(0x7f0000000180)=ANY=[@ANYRES64]) r5 = dup2(r1, r4) ioctl$PPPOEIOCSFWD(r5, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0xd2, @empty, 'veth0_to_hsr\x00'}}) 21:02:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f0000000080), 0x1000) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000100)={0xaa39, 0xcf, 0x2, 0x0, 0x0, [{r3, 0x0, 0x400}, {r1}]}) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x40a40, 0x0, 0xffffffffffffff67) 21:02:36 executing program 5: shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280100, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f00000000c0)={{0xffffffffffff0001, 0xb0e}, 'port0\x00', 0x40, 0x12, 0x0, 0xfff, 0x7, 0xc7, 0x7, 0x0, 0x2, 0x9}) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40001, 0x0) r2 = getpid() sched_setattr(r2, 0x0, 0x0) waitid(0x2, r2, &(0x7f00000001c0), 0x20000000, 0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000080)={0x0, r2}) [ 195.040308] audit: type=1400 audit(1568062956.313:44): avc: denied { map } for pid=7915 comm="syz-executor.3" path="socket:[28450]" dev="sockfs" ino=28450 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tcp_socket permissive=1 21:02:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000000)={0x0, 0xd000, 0x3, 0x9, 0x6}) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) 21:02:36 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280100, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f00000001c0)=0x8000000) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000040)={0x800, 0x200}) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0x9, 0x2, @name="0a7144cced7cfe999a485435ec3d8b12c930b379553d53d4f35deeb4ecd936cd"}) clone(0x1000000000011, &(0x7f0000000140), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) waitid(0x2, 0x0, 0x0, 0xc, 0x0) 21:02:36 executing program 4: sendmmsg$alg(0xffffffffffffffff, &(0x7f00000010c0)=[{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000580)="5624500e105e8e9a7d8410af2505f59546f34ab11d38", 0x16}], 0x1, &(0x7f0000000b00)=[@assoc={0x18, 0x117, 0x4, 0x101}], 0x18, 0x10}], 0x1, 0x20008000) r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) preadv(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000400)={0x0, 0x0, 0x200000000001d, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) request_key(&(0x7f0000000340)='asymmetric\x00', 0x0, 0x0, 0xfffffffffffffffd) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000480)='ceph\x00', &(0x7f00000004c0)={'syz', 0x2}, &(0x7f0000000500)='/dev/dri/card#\x00', 0x0) write$uinput_user_dev(r0, &(0x7f00000005c0)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc], [0xffffffff]}, 0x45c) 21:02:36 executing program 1: r0 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x0, 0x8404, 0x3, 0x0, 0x0}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000140)=ANY=[@ANYRES32=r2, @ANYBLOB="0200ad00918dbde4dc8b37d3793ddd1edd71da5e0bf6f983ea66cfa8e87b9edbb5b30d2a4653ae60a07949dc2a8e60583130e9b70444bf9ed1b6eec78ff886be1f562e98d92892abf8d6f6e3c4b9952e460b408d54693ee4746486aa4393d0fadcf618c45d5b6a1c605c3ec3564221a48cf9e4ae33ade68e2ecf1ed03f55e7faa13dd6d644fc011490ce63f4c1207bcb4a44606b9ce748d0094e9ae1a31c70497da65be4a76567c54db240f11e2b2e8b52"], 0xb5) r3 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r3, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) setsockopt$inet6_group_source_req(r3, 0x29, 0x3e, &(0x7f0000000200)={0xc4e, {{0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}, {{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x14}, 0x3f}}}, 0x108) sendto$inet6(r3, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r3, &(0x7f00000000c0)="dd", 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 195.282984] audit: type=1400 audit(1568062956.553:45): avc: denied { ioctl } for pid=7931 comm="syz-executor.2" path="socket:[29381]" dev="sockfs" ino=29381 ioctlcmd=0xb100 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 21:02:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x1e, 0x4, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r1, &(0x7f00000030c0), 0x0, 0x0) recvfrom$netrom(r2, &(0x7f00000001c0)=""/195, 0x2bb, 0x0, 0x0, 0xfffffe5e) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000040)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x14) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f00000000c0)="2400000018005f0014f9f4070009040002000088a8ffff02000000000800050000000000", 0x24) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r4, 0x10e, 0x4, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$VHOST_SET_FEATURES(r5, 0x4008af00, &(0x7f00000001c0)=0x8000000) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) setsockopt$inet6_mreq(r4, 0x29, 0x1c, &(0x7f0000000140)={@local, r6}, 0x14) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f00000002c0)={{0x2, 0x7f}, 'port1\x00', 0x7, 0x60820, 0x5, 0x7fff, 0x40, 0xfff, 0xead, 0x0, 0x1}) 21:02:36 executing program 2: prctl$PR_MCE_KILL(0x35, 0x0, 0x4) clone(0x20007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ACQUIRE(0xffffffffffffffff, 0x6430) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='status\x00') pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read$FUSE(r0, 0x0, 0xfffffffffffffdd3) 21:02:36 executing program 4: pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000001c0)=0x8000000) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe050400080008001e000400ff7e", 0x24}], 0x1}, 0x0) socketpair$tipc(0x1e, 0x91c364a4f0052f58, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000740)={0x2, &(0x7f0000000200)=[{0x8, 0x81, 0x81, 0x9}, {0x7f, 0x3, 0xfffffffffffffffe, 0x7}]}, 0x10) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000100)={0x8, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x3f}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x8c6, 0x4, [0x4, 0x100000001, 0x0, 0xffffffffffffff01]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r4 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f00000000c0)={0x1, 0x0, [0x0]}) 21:02:36 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280100, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000000)={0x0, 0x80}) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x1d, &(0x7f0000000380), 0x4) 21:02:36 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003480)=[{{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000001240)=""/75, 0x4b}], 0x1}}], 0x1e3, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'eql\x00', {0x2, 0x4e20, @multicast1}}) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r3, 0x4020565b, &(0x7f00000000c0)={0x1, 0x100000000}) shutdown(r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$sock_int(r4, 0x1, 0x7, &(0x7f0000000300)=0x2, 0x1) 21:02:36 executing program 5: r0 = socket(0x40000000015, 0x33e02a7abc24bc7e, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000000), 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280100, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000040)={'lapb0\x00', {0x2, 0x4e21, @multicast1}}) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x22880, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x0, 0x4) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280100, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f00000001c0)=0x8000000) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r4, 0x111, 0x4, 0x2, 0xfffffdc1) ioctl$SG_GET_RESERVED_SIZE(r3, 0x2272, &(0x7f0000000140)) 21:02:36 executing program 1: syz_emit_ethernet(0x7e, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@source_quench={0x4, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @multicast2, @local, {[@ssrr={0x89, 0x13, 0x0, [@multicast1, @multicast2, @dev, @remote]}, @generic={0x0, 0xc, "2be36901600a062efebf"}, @ssrr={0x89, 0xb, 0x0, [@loopback, @multicast2]}, @rr={0x7, 0x13, 0x0, [@loopback, @local, @dev, @rand_addr]}]}}}}}}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) splice(r0, &(0x7f00000000c0), r1, &(0x7f0000000140), 0x6, 0x3) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f00000001c0)=0x8000000) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000080)) 21:02:37 executing program 1: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="06000000f80200000880000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00590a200100000004000040080200006b9c7d89b8c8bcdd"], 0x48}, 0x1, 0x0, 0x0, 0x4008041}, 0x40000) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) getsockname$inet(r1, &(0x7f0000000240)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c8004ff", 0x2e}], 0x1}, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_VRING_NUM(r2, 0x4008af10, &(0x7f00000001c0)={0x0, 0x5}) 21:02:37 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") setsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280100, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x0, 0x4) write$P9_RCREATE(r2, &(0x7f00000000c0)={0x18, 0x73, 0x1, {{0x100, 0x4, 0xfff}, 0x80}}, 0x18) r3 = dup(0xffffffffffffffff) openat$dsp(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dsp\x00', 0x202841, 0x0) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f0000000640)={0x9, 0x101}) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") preadv(r4, &(0x7f0000000600)=[{&(0x7f00000003c0)=""/193, 0xc1}, {&(0x7f00000004c0)=""/206, 0xce}, {&(0x7f0000000140)=""/118, 0x76}, {&(0x7f00000005c0)=""/43, 0x2b}], 0x4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vga_arbiter\x00', 0x2480, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r6, 0x0, 0x1, &(0x7f00000006c0)=0x1f, 0x4) r7 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x240201) ioctl$FS_IOC_SETFSLABEL(r7, 0x41009432, &(0x7f00000002c0)="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") r8 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$VHOST_SET_FEATURES(r9, 0x4008af00, &(0x7f00000001c0)=0x8000000) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000740)={0x7ffffffffffffffc, 0x7c, 0x7, 0x1}, 0x6) r10 = socket(0x2, 0x803, 0xff) connect$inet(r10, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$userio(0xffffffffffffff9c, &(0x7f0000000780)='/dev/userio\x00', 0x20304, 0x0) sendfile(r10, r8, 0x0, 0x72439a6b) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendto$inet(r0, &(0x7f00000001c0)="03268a927f1f6587b967480b41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x4d, 0x800, 0x0, 0x0) 21:02:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'team_slave_1\x00', &(0x7f0000000000)=@ethtool_gfeatures={0x3a, 0x3, [{0x2, 0xd42, 0x4, 0x80}, {0x0, 0x5, 0xa, 0x650b}, {0x80000001, 0x6, 0x800, 0x3f}]}}) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='illinois\x00', 0x9) r2 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:02:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.', 'net/tcp6\x00\xcfM\x84\x81\xdb\x1f\x03\xa2\xdb\xcc\x139\x86R\xaa\x96|Y\x8e\x00\xcd#\x1c]\x97<@\n\x04\x1f\x8b0 0b 4c 89 ff e8 07 13 e9 ff e9 d3 fd ff ff e8 fd 12 e9 ff e9 5b [ 196.350560] RSP: 0018:ffff888052ec75c0 EFLAGS: 00010246 [ 196.355910] RAX: 0000000000040000 RBX: ffff8880775f1000 RCX: ffffc9000e8b4000 [ 196.363174] RDX: 0000000000040000 RSI: ffffffff81b8e6ff RDI: ffff888077768ee0 [ 196.370445] RBP: ffff888052ec7600 R08: ffff888079c6a4c0 R09: ffffed1015d24733 [ 196.377727] R10: ffffed1015d24732 R11: ffff8880ae923993 R12: ffff888077768d80 [ 196.384506] kobject: 'loop0' (0000000087ee8ae5): kobject_uevent_env [ 196.385021] R13: 0000000000000000 R14: ffff88807744ba98 R15: ffff8880533d5040 [ 196.385034] FS: 00007f16bd5a8700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 196.385043] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 21:02:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x8000000000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x80005, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000900), 0x0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000040)={0x82, 0xae1, "f2b7bc92852531e6d5668a79a052bff0b0247d0966dfac8fe3b30c71d144bea5d3110c89ad946c017d5cab1993c1ab193a5972f4643603a85d3f2d6aa97853afb8d2a37edef7d84159006ffe2042cc9841be8cc8b9cc75cc85219004abc98e49c7c9b314086a46f2d47be4d9fd9e5dfa328b8c014c53ccae2273"}, 0x82800) 21:02:37 executing program 1: io_setup(0xda84, &(0x7f0000000000)=0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xfffffffffffffff7, 0x101020) io_cancel(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, r1, &(0x7f00000000c0)="078c27ccab254af8fb1153a2c09b3085c081ea47985708421ed13757fec8bde478e32a21abe09ac480098b62e07163b8074597541ffd36de41359d745daf3ddfb9f2b8c626a83b3db3d10aee6b6c0b6422b0aa955d5a99318a4fe8", 0x5b, 0x8000, 0x0, 0x1, r2}, &(0x7f00000001c0)) r3 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r3, 0x107, 0x16, 0x0, 0x4) 21:02:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x7, 0x0) close(0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x18, &(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ftruncate(r0, 0x200004) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0), &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x7ff, 0x3, 0x0, 0x0, 0xffff}, &(0x7f0000000200)=0x14) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) 21:02:37 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x394a, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = inotify_init1(0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000000)=0x2000, 0x4) r2 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280100, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x0, 0x4) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) r5 = dup2(r1, r2) dup2(r5, r0) [ 196.385050] CR2: 0000000000000000 CR3: 00000000978e9000 CR4: 00000000001406e0 [ 196.385061] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 196.393797] kobject: 'loop0' (0000000087ee8ae5): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 196.398719] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 196.398725] Call Trace: [ 196.398744] ? fat_collect_bhs+0x193/0x2e0 [ 196.398760] fat16_ent_put+0xd2/0x110 [ 196.398778] fat_free_clusters+0x3de/0x990 [ 196.444729] kobject: 'loop2' (000000003283b891): kobject_uevent_env [ 196.446691] ? fat_ent_read+0xb40/0xb40 [ 196.469293] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.474839] ? timespec64_trunc+0xf0/0x180 [ 196.479104] ? rcu_read_lock_sched_held+0x110/0x130 [ 196.484115] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 196.489123] ? __mark_inode_dirty+0x241/0x1280 [ 196.493698] fat_truncate_blocks+0x763/0xc10 [ 196.498100] ? fat_file_release+0x150/0x150 [ 196.502426] ? unmap_mapping_range+0x48/0x60 [ 196.506852] ? truncate_pagecache+0x7b/0x90 [ 196.511167] fat_setattr+0x806/0xc80 [ 196.514884] ? fat_truncate_blocks+0xc10/0xc10 [ 196.519455] notify_change+0xad7/0xfb0 [ 196.523342] do_truncate+0x158/0x220 [ 196.527046] ? file_open_root+0x3c0/0x3c0 [ 196.531196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.536737] path_openat+0x2c27/0x45e0 [ 196.540616] ? __lock_acquire+0x6ee/0x49c0 [ 196.544842] ? getname_flags+0xd6/0x5b0 [ 196.548807] ? getname+0x1a/0x20 [ 196.552183] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 196.556849] ? __lock_is_held+0xb6/0x140 [ 196.560912] do_filp_open+0x1a1/0x280 [ 196.564703] ? __alloc_fd+0x44d/0x560 [ 196.568495] ? may_open_dev+0x100/0x100 [ 196.572469] ? kasan_check_read+0x11/0x20 [ 196.576605] ? do_raw_spin_unlock+0x57/0x270 [ 196.581018] do_sys_open+0x3fe/0x550 [ 196.584734] ? filp_open+0x80/0x80 [ 196.588272] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 196.593031] ? do_syscall_64+0x26/0x620 [ 196.596997] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.602348] ? do_syscall_64+0x26/0x620 [ 196.606326] ? lockdep_hardirqs_on+0x415/0x5d0 [ 196.610904] __x64_sys_creat+0x61/0x80 [ 196.614785] do_syscall_64+0xfd/0x620 [ 196.618582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.623762] RIP: 0033:0x4598e9 [ 196.626955] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 196.645846] RSP: 002b:00007f16bd5a7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 196.653547] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00000000004598e9 [ 196.660808] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 196.668077] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 196.675335] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16bd5a86d4 [ 196.682597] R13: 00000000004bff1d R14: 00000000004d1e60 R15: 00000000ffffffff [ 196.689871] Modules linked in: [ 196.702812] kobject: 'loop2' (000000003283b891): fill_kobj_path: path = '/devices/virtual/block/loop2' 21:02:38 executing program 3: r0 = socket$inet6(0xa, 0x800, 0x6) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000040)=@generic={0x2, "debd2ad31713f03af46945432528952a30ecdd96b2279407dd2c4eb14280854b8baf35aedce0f3b8026ce81db56743d29cf052ce6a9da930cd4d79d1a19fa40edc7e81fe48dce640735323c8d8c944cbd94df2e52c89709c3e12285acc4adf00e65716b22f1137c0585a926e5f9437d6a2bf0a689abe3620188e7e289fee"}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="d142136982a6ea2fc8cb20d5477f20691188b21d8893264626d737843f3bd59aac7cffd6104c6fa68ae3819e86dab2dca2ee4d7cd7f5041141e2664b3a8d99624c3b7a8ed95d11206b7c9359023b109147a877c7de9aaad62544cddd317d1cb141feecf15570e02a3c0347885b93bd9195b3fa73213ea0373e8932cccbb5b25de56ec1f530a052f38a3500e71bcc0ca2b6b162dc163b7553952cdf1e5ff2bfec489bd34a7809eea9f46c94e06c1ea6e6c1ba729b90dbe15956e8782b6be98ec977e94fba108a9058433af75437d0f99d0d22302eee49ab5b3bfc9c09929173981da2f6f33eeb4c559cac3ad5ad23f23738b0c53a44ccbf", 0xf7}], 0x1}, 0x8180) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f00000002c0)) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000000)=[{0x18, 0x84}], 0x1f}, 0xfc) [ 196.715586] ---[ end trace 34d718768526cc06 ]--- [ 196.735600] RIP: 0010:mark_buffer_dirty_inode+0x30f/0x410 [ 196.745049] Code: 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 75 4d 4c 89 63 58 4c 89 ef e8 7b 05 3b 05 e9 ee fd ff ff e8 91 7f b2 ff <0f> 0b 4c 89 ff e8 07 13 e9 ff e9 d3 fd ff ff e8 fd 12 e9 ff e9 5b [ 196.755199] kobject: 'loop3' (00000000acc4b078): kobject_uevent_env [ 196.766758] RSP: 0018:ffff888052ec75c0 EFLAGS: 00010246 [ 196.783885] kobject: 'loop3' (00000000acc4b078): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 196.786514] RAX: 0000000000040000 RBX: ffff8880775f1000 RCX: ffffc9000e8b4000 21:02:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x7, 0x0) close(0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x18, &(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ftruncate(r0, 0x200004) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0), &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x7ff, 0x3, 0x0, 0x0, 0xffff}, &(0x7f0000000200)=0x14) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) [ 196.801604] audit: type=1800 audit(1568062958.073:47): pid=8046 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=16555 res=0 [ 196.835150] RDX: 0000000000040000 RSI: ffffffff81b8e6ff RDI: ffff888077768ee0 [ 196.847742] kobject: 'loop5' (000000003c0552b3): kobject_uevent_env [ 196.848474] RBP: ffff888052ec7600 R08: ffff888079c6a4c0 R09: ffffed1015d24733 21:02:38 executing program 1: io_setup(0xda84, &(0x7f0000000000)=0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xfffffffffffffff7, 0x101020) io_cancel(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, r1, &(0x7f00000000c0)="078c27ccab254af8fb1153a2c09b3085c081ea47985708421ed13757fec8bde478e32a21abe09ac480098b62e07163b8074597541ffd36de41359d745daf3ddfb9f2b8c626a83b3db3d10aee6b6c0b6422b0aa955d5a99318a4fe8", 0x5b, 0x8000, 0x0, 0x1, r2}, &(0x7f00000001c0)) r3 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r3, 0x107, 0x16, 0x0, 0x4) [ 196.860310] kobject: 'loop5' (000000003c0552b3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 196.863330] R10: ffffed1015d24732 R11: ffff8880ae923993 R12: ffff888077768d80 [ 196.880973] R13: 0000000000000000 R14: ffff88807744ba98 R15: ffff8880533d5040 [ 196.889093] FS: 00007f16bd5a8700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 196.903112] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 21:02:38 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x394a, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = inotify_init1(0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000000)=0x2000, 0x4) r2 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280100, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x0, 0x4) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) r5 = dup2(r1, r2) dup2(r5, r0) 21:02:38 executing program 3: r0 = socket$inet6(0xa, 0x800, 0x6) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000040)=@generic={0x2, "debd2ad31713f03af46945432528952a30ecdd96b2279407dd2c4eb14280854b8baf35aedce0f3b8026ce81db56743d29cf052ce6a9da930cd4d79d1a19fa40edc7e81fe48dce640735323c8d8c944cbd94df2e52c89709c3e12285acc4adf00e65716b22f1137c0585a926e5f9437d6a2bf0a689abe3620188e7e289fee"}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="d142136982a6ea2fc8cb20d5477f20691188b21d8893264626d737843f3bd59aac7cffd6104c6fa68ae3819e86dab2dca2ee4d7cd7f5041141e2664b3a8d99624c3b7a8ed95d11206b7c9359023b109147a877c7de9aaad62544cddd317d1cb141feecf15570e02a3c0347885b93bd9195b3fa73213ea0373e8932cccbb5b25de56ec1f530a052f38a3500e71bcc0ca2b6b162dc163b7553952cdf1e5ff2bfec489bd34a7809eea9f46c94e06c1ea6e6c1ba729b90dbe15956e8782b6be98ec977e94fba108a9058433af75437d0f99d0d22302eee49ab5b3bfc9c09929173981da2f6f33eeb4c559cac3ad5ad23f23738b0c53a44ccbf", 0xf7}], 0x1}, 0x8180) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f00000002c0)) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000000)=[{0x18, 0x84}], 0x1f}, 0xfc) [ 196.930147] CR2: 00007ffddf804c20 CR3: 00000000978e9000 CR4: 00000000001406f0 [ 196.941640] kobject: 'loop1' (000000000594d278): kobject_uevent_env [ 196.964830] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 21:02:38 executing program 5: r0 = socket$inet6(0xa, 0x800, 0x6) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000040)=@generic={0x2, "debd2ad31713f03af46945432528952a30ecdd96b2279407dd2c4eb14280854b8baf35aedce0f3b8026ce81db56743d29cf052ce6a9da930cd4d79d1a19fa40edc7e81fe48dce640735323c8d8c944cbd94df2e52c89709c3e12285acc4adf00e65716b22f1137c0585a926e5f9437d6a2bf0a689abe3620188e7e289fee"}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="d142136982a6ea2fc8cb20d5477f20691188b21d8893264626d737843f3bd59aac7cffd6104c6fa68ae3819e86dab2dca2ee4d7cd7f5041141e2664b3a8d99624c3b7a8ed95d11206b7c9359023b109147a877c7de9aaad62544cddd317d1cb141feecf15570e02a3c0347885b93bd9195b3fa73213ea0373e8932cccbb5b25de56ec1f530a052f38a3500e71bcc0ca2b6b162dc163b7553952cdf1e5ff2bfec489bd34a7809eea9f46c94e06c1ea6e6c1ba729b90dbe15956e8782b6be98ec977e94fba108a9058433af75437d0f99d0d22302eee49ab5b3bfc9c09929173981da2f6f33eeb4c559cac3ad5ad23f23738b0c53a44ccbf", 0xf7}], 0x1}, 0x8180) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f00000002c0)) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000000)=[{0x18, 0x84}], 0x1f}, 0xfc) 21:02:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x8000000000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x80005, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000900), 0x0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000040)={0x82, 0xae1, "f2b7bc92852531e6d5668a79a052bff0b0247d0966dfac8fe3b30c71d144bea5d3110c89ad946c017d5cab1993c1ab193a5972f4643603a85d3f2d6aa97853afb8d2a37edef7d84159006ffe2042cc9841be8cc8b9cc75cc85219004abc98e49c7c9b314086a46f2d47be4d9fd9e5dfa328b8c014c53ccae2273"}, 0x82800) [ 196.974930] kobject: 'loop1' (000000000594d278): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 196.988936] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 197.006271] kobject: 'loop2' (000000003283b891): kobject_uevent_env [ 197.024876] Kernel panic - not syncing: Fatal exception [ 197.031595] Kernel Offset: disabled [ 197.035233] Rebooting in 86400 seconds..