Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 37.923231] audit: type=1800 audit(1568614471.790:33): pid=7393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 37.944564] audit: type=1800 audit(1568614471.800:34): pid=7393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 41.771456] audit: type=1400 audit(1568614475.640:35): avc: denied { map } for pid=7570 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.1.18' (ECDSA) to the list of known hosts. 2019/09/16 06:14:42 fuzzer started [ 48.209433] audit: type=1400 audit(1568614482.080:36): avc: denied { map } for pid=7579 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/09/16 06:14:42 dialing manager at 10.128.0.105:41983 2019/09/16 06:14:43 syscalls: 2482 2019/09/16 06:14:43 code coverage: enabled 2019/09/16 06:14:43 comparison tracing: enabled 2019/09/16 06:14:43 extra coverage: extra coverage is not supported by the kernel 2019/09/16 06:14:43 setuid sandbox: enabled 2019/09/16 06:14:43 namespace sandbox: enabled 2019/09/16 06:14:43 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/16 06:14:43 fault injection: enabled 2019/09/16 06:14:43 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/16 06:14:43 net packet injection: enabled 2019/09/16 06:14:43 net device setup: enabled [ 187.597957] audit: type=1400 audit(1568614621.470:37): avc: denied { map } for pid=7599 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:17:23 executing program 0: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) sendmsg$nl_crypto(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@del={0xf8, 0x11, 0x501, 0x70bd29, 0x25dfdbfc, {{'drbg_pr_hmac_sha256\x00'}, [], [], 0x2000, 0x3000}, [{0x8, 0x1, 0x6}, {0x8, 0x1, 0x4}, {0x8, 0x1, 0x86a1}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) r1 = socket$netlink(0x10, 0x3, 0x5) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f0000000480)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f00000004c0)={0x4, 0x8, r3, 0x0, r4, 0x0, 0x7, 0x40}) syz_open_dev$adsp(&(0x7f0000000500)='/dev/adsp#\x00', 0xf, 0x101280) pipe2(&(0x7f0000000540)={0xffffffffffffffff}, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f0000000580)) r6 = accept$netrom(0xffffffffffffffff, &(0x7f00000005c0)={{0x3, @default}, [@remote, @rose, @default, @netrom, @netrom, @bcast, @bcast, @netrom]}, &(0x7f0000000640)=0x48) ioctl$sock_inet_SIOCGIFDSTADDR(r6, 0x8917, &(0x7f0000000680)={'\x00', {0x2, 0x4e24, @local}}) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vsock\x00', 0x10002, 0x0) accept4$packet(r7, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000740)=0x14, 0x80000) getsockopt$IP_VS_SO_GET_DAEMON(r7, 0x0, 0x487, &(0x7f0000000780), &(0x7f00000007c0)=0x30) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001bc0)='/dev/btrfs-control\x00', 0x4440, 0x0) ioctl$sock_ax25_SIOCDELRT(r8, 0x890c, &(0x7f0000001c00)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, 0x6, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @bcast, @default, @default]}) fcntl$setsig(0xffffffffffffffff, 0xa, 0x18) r9 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001c80)='/proc/capi/capi20\x00', 0x200, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r9, 0x6, 0x3, &(0x7f0000001cc0)=0x5, 0x4) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001d00)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000001d40)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x4) r10 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001d80)='/proc/capi/capi20ncci\x00', 0x2, 0x0) r11 = syz_genetlink_get_family_id$tipc(&(0x7f0000001e00)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r10, &(0x7f0000001ec0)={&(0x7f0000001dc0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001e80)={&(0x7f0000001e40)={0x24, r11, 0x200, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x2cb3}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x20048040) sched_rr_get_interval(r3, &(0x7f0000001f00)) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000001f40)={0x80, "f200d0e3fd606720b8b4e17b4f47a02ca76b1377582bf9dc223c5cff08bda604", 0x1, 0x1}) r12 = socket$netlink(0x10, 0x3, 0x9) r13 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001f80)='/proc/capi/capi20\x00', 0xc0040, 0x0) r14 = openat$random(0xffffffffffffff9c, &(0x7f0000001fc0)='/dev/urandom\x00', 0x800, 0x0) r15 = syz_open_dev$vivid(&(0x7f0000002000)='/dev/video#\x00', 0x3, 0x2) r16 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002040)='/dev/vsock\x00', 0x10000, 0x0) r17 = accept4$netrom(0xffffffffffffffff, &(0x7f0000002080)={{0x3, @bcast}, [@remote, @rose, @netrom, @bcast, @default, @bcast, @default, @default]}, &(0x7f0000002100)=0x48, 0x0) ioctl$FIDEDUPERANGE(r12, 0xc0189436, &(0x7f0000002140)={0xc000000000000000, 0x3, 0x9, 0x0, 0x0, [{r1, 0x0, 0x7}, {r13, 0x0, 0x95}, {r7, 0x0, 0x4000000000000000}, {r10}, {r14, 0x0, 0x9}, {r15, 0x0, 0xffffffffffffff4c}, {r16, 0x0, 0x21}, {r17, 0x0, 0x6}, {r8, 0x0, 0x6}]}) [ 209.664368] audit: type=1400 audit(1568614643.530:38): avc: denied { map } for pid=7601 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14970 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 209.780091] IPVS: ftp: loaded support on port[0] = 21 06:17:23 executing program 1: r0 = gettid() tkill(r0, 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2140, 0x80) getdents64(r1, &(0x7f0000000040)=""/62, 0x3e) gettid() r2 = socket$inet_smc(0x2b, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) fcntl$setown(r2, 0x8, r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r4, 0x4008700e, 0x0) r5 = fcntl$getown(0xffffffffffffffff, 0x9) sched_setscheduler(r5, 0x3, &(0x7f0000000140)=0xfffffffffffeffff) r6 = socket$caif_stream(0x25, 0x1, 0x5) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000000, 0x110, r6, 0x0) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x400000, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r7, 0x8919, &(0x7f00000001c0)={'lo\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000200)=""/242) getsockopt$inet_mreqn(r7, 0x0, 0x24, &(0x7f0000000780)={@empty, @multicast1, 0x0}, &(0x7f00000007c0)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000800)={@ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, r8}, 0x14) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000840)) r9 = syz_open_dev$dspn(&(0x7f0000000880)='/dev/dsp#\x00', 0x5511, 0x1412c0) sendmsg$unix(r9, &(0x7f0000000b80)={&(0x7f00000008c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000b40)=[{&(0x7f0000000940)="5c56de6d5d7e365fdd5b06a64b7449", 0xf}, {&(0x7f0000000980)="7d503fcec132a10bdc653e8b6d339d67a050410adbd54f415df9e8c86f8f8a0dfc3938452c66b30eebfc46cfd11b5e8fc65df0cf73596a0f604fe2a303ba75909d1b0f9eae7677d8734411544212f0b70a30e9c5a7cc2234db3cefa19df896f63c211d460d7b80685965c521849ae4ae094c4f3e2c59ee1ce4324b188053626f0d463bb5170122a8168ba7bceb31cac8acb7700405c3f66172dd7b5dbf632dd445be11a411bc25d184d4541cd1979b5ea87f", 0xb2}, {&(0x7f0000000a40)="594c52aae7d5421686cc4582e709b8b1642ed176e07cee69d14481560948ddb3f63e6146c63d21701bf2bf539cb9a28cbf7cad54b4b9e6d7e2e6169fa6207998cf16f408178c2b2320c5290d4f44d6a9f8622c8b2b4bfa0056ae3d7e6daf9558c5d86411e0587d7058d4e03ab2e5b0b38750027dc4be18f6f8646a90d1b81be3244a92ca3e1fea2e086104fffebb5161334817a4bd4437c08e4120695bc6b20b9e9ecd5b4910", 0xa6}, {&(0x7f0000000b00)}], 0x4, 0x0, 0x0, 0x48000}, 0x800) connect$rose(r4, &(0x7f0000000bc0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) shutdown(r7, 0x1) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x0, 0x4) openat$vfio(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/vfio/vfio\x00', 0x2000, 0x0) bind$netrom(r7, &(0x7f0000000c40)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast]}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r10 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r10, 0x4018620d, &(0x7f0000000d00)={0x73622a85, 0x1, 0x3}) [ 209.915536] chnl_net:caif_netlink_parms(): no params data found [ 209.950675] IPVS: ftp: loaded support on port[0] = 21 [ 210.017881] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.024825] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.033778] device bridge_slave_0 entered promiscuous mode [ 210.044170] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.051291] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.058972] device bridge_slave_1 entered promiscuous mode 06:17:23 executing program 2: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000040)) msgget$private(0x0, 0x210) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r1, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000180)=@v3={0x3000000, [{0x1f, 0xd98}, {0x4, 0x8}], r2}, 0x18, 0x2) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x19, 0x12, 0xffffffffffffffff, 0x4) openat$cgroup_ro(r1, &(0x7f00000001c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) sync_file_range(r1, 0x7, 0x1, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x5400e639a2fb942f, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r3, 0x80044326, &(0x7f0000000280)=0x7f) r4 = signalfd(0xffffffffffffffff, &(0x7f00000002c0)={0x5}, 0x8) fallocate(r4, 0x60, 0x8, 0x0) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000380)={0x9, &(0x7f0000000300)=[{0x6790934c, 0x9, 0x11b, 0x2}, {0x2ad, 0xfffffffffffffe01, 0xf7, 0x6}, {0x1, 0x0, 0x1, 0x2cf}, {0xff, 0x4, 0xfffffffffffffffc, 0x10000}, {0x9, 0x5, 0x0, 0x8}, {0x1f, 0x1, 0x401, 0x84e2}, {0x302, 0x8001, 0x4, 0x400}, {0x4, 0xc027, 0x4, 0xd068}, {0x2, 0xfffffffffffffff9, 0x7, 0x401}]}) r5 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r5, 0x8935, &(0x7f00000003c0)={'bond_slave_1\x00', 0x4}) ioctl$VFIO_GET_API_VERSION(r3, 0x3b64) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video0\x00', 0x2, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ubi_ctrl\x00', 0x80, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000004c0)={r6, 0x1f, 0x1, 0x800, &(0x7f0000000480)=[0x0, 0x0, 0x0], 0x3}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) r8 = request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={'syz', 0x0}, &(0x7f00000005c0)='/dev/video0\x00', 0x0) keyctl$get_security(0x11, r8, &(0x7f0000000600)=""/221, 0xdd) r9 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x668002, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r9, 0xc018643a, &(0x7f0000000740)={0x1, 0xffff, 0x2c}) ioctl$sock_inet_udp_SIOCINQ(r6, 0x541b, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r6, 0x84, 0x7, &(0x7f00000007c0), &(0x7f0000000800)=0x4) r10 = syz_init_net_socket$x25(0x9, 0x5, 0x0) splice(r10, &(0x7f0000000840), r7, &(0x7f0000000880), 0x3, 0x0) [ 210.095191] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 210.130753] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 210.173647] chnl_net:caif_netlink_parms(): no params data found [ 210.184096] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 210.193178] team0: Port device team_slave_0 added [ 210.214087] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 210.223015] team0: Port device team_slave_1 added [ 210.241985] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 210.258259] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 210.265359] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.277098] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.284491] device bridge_slave_0 entered promiscuous mode 06:17:24 executing program 3: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000080)=0x7ff, 0x4) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000100)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f00000001c0)={r2, 0x55, 0x54}, 0x8) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000200)={0x5, 0xf, [{0x3, 0x0, 0x100000001}, {0x1000, 0x0, 0x2}, {0x88a00000000, 0x0, 0xffffffffffffff7f}, {0x0, 0x0, 0x2}, {0x5b72, 0x0, 0x6}]}) creat(&(0x7f0000000280)='./file0\x00', 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x820200, 0x0) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f0000000300)) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-control\x00', 0x200000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000380)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@initdev}}, &(0x7f0000000480)=0xe8) pipe(&(0x7f00000004c0)={0xffffffffffffffff}) ioctl$TIOCSIG(r6, 0x40045436, 0x41) syz_open_dev$sndpcmp(&(0x7f0000000500)='/dev/snd/pcmC#D#p\x00', 0x7f, 0x40001) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000000700)='./file1\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)=0x0) setxattr$system_posix_acl(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='system.posix_acl_access\x00', &(0x7f0000000880)={{}, {0x1, 0x1}, [{0x2, 0x2, r5}, {0x2, 0x0, r5}, {0x2, 0x4, r5}, {0x2, 0x0, r7}], {0x4, 0x5}, [{0x8, 0x1, r8}, {0x8, 0x0, r9}, {0x8, 0x6, r10}, {}]}, 0x64, 0x1) r11 = socket$caif_seqpacket(0x25, 0x5, 0x1) fcntl$setpipe(r11, 0x407, 0x120000000000) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000900), 0x8) r12 = socket$pptp(0x18, 0x1, 0x2) ioctl$void(r12, 0x5450) r13 = syz_open_dev$sndpcmp(&(0x7f0000000940)='/dev/snd/pcmC#D#p\x00', 0x80000001, 0x80000) ioctl$KVM_GET_DEBUGREGS(r13, 0x8080aea1, &(0x7f0000000980)) r14 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/dlm-control\x00', 0x10600, 0x0) r15 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x97fc6299b01c49b3) ioctl$VHOST_SET_VRING_KICK(r14, 0x4008af20, &(0x7f0000000a40)={0x1, r15}) [ 210.311734] IPVS: ftp: loaded support on port[0] = 21 [ 210.320656] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.335036] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.342678] device bridge_slave_1 entered promiscuous mode [ 210.399105] device hsr_slave_0 entered promiscuous mode [ 210.428196] device hsr_slave_1 entered promiscuous mode [ 210.468436] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 210.475493] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 06:17:24 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x35, 0x100080) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000040)={0x1, {}, 0xfffffffffffffffa, 0x3cd4203b}) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000100)={0xfffffffffffffb80, 0xff, 0x70, &(0x7f0000000080)="fba157679d5733b1de9d924da3a3efa93a88e3083b97f120acad9ae7f02bd3cc14baeb6fe5c7f8a03fefedcddf0e2a87c7da26b3ebb1e675cc7ad4eb59ff5e2104e142ee58c5b2a1d2b86019bb64e967a3deac1f4f976bcaf7c82acea13517e677473c5d2fd4274653ad28aaea0dd582"}) r1 = dup2(r0, 0xffffffffffffffff) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000140)={0x0, @initdev, @empty}, &(0x7f0000000180)=0xc) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SIOCX25GSUBSCRIP(r2, 0x89e0, &(0x7f0000000200)={'veth1_to_bond\x00', 0x9, 0x1}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000300)=0x6) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000380)={0x0, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e20, @remote}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}, 0x50, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000340), 0x2, 0x1f, 0xfffffffffffffffc}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f0000000440)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000480)) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/qat_adf_ctl\x00', 0xb05000, 0x0) ioctl$VIDIOC_G_FREQUENCY(r5, 0xc02c5638, &(0x7f0000000500)={0x3f, 0x1}) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000540)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r6, 0xc08c5334, &(0x7f0000000580)={0x81, 0x0, 0x0, 'queue0\x00', 0x7fff}) r7 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhci\x00', 0xb19222) pread64(r7, &(0x7f0000000680)=""/88, 0x58, 0x0) r8 = syz_open_dev$swradio(&(0x7f0000000700)='/dev/swradio#\x00', 0x1, 0x2) write$selinux_create(r8, &(0x7f0000000740)=@access={'system_u:object_r:audisp_remote_exec_t:s0', 0x20, '/sbin/dhclient', 0x20, 0x80000000}, 0x4e) r9 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r9, 0x4c00, 0xffffffffffffffff) sendmmsg$inet6(r6, &(0x7f0000000a80)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000800)="0d37f5f42cccfd55fdc8f723495cdd5051ecce0da6be27ab2368287929f7d6309dea9c78d9f8060b12d76069d1ce35e3d6180f995614adabe896", 0x3a}, {&(0x7f0000000840)="0b4554871fac67614514fadb020de1278e5633703fe98f2a136a5115d2cb8914a68cf19c7b54555ed4cfd0876ba715bcd97697cdc600eae0b6b905ed06425711b6e2d956122f567814dfa6dceedaeaa7b21c8184bbaa0b6625a1e7b53855f8c891164c893c66854c6c2cb326a557451c942882a6658c8a4340a1f63c6d933c6638ceb3413192827c2502331b0930d46d4f786f1769614a1d69df3892d2ca6b539dc71869b1204fc22cbe04ed51f73b0d45e1baf7d3efe6e29068a5a828a8b00079520fb253799cce7be798d8dbd87bc41822dfdb33209b8f5d6ec9", 0xdb}], 0x2, &(0x7f0000000980)=[@hopopts_2292={{0x28, 0x29, 0x36, {0x13, 0x1, [], [@jumbo={0xc2, 0x4, 0x3}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}}}, @tclass={{0x14, 0x29, 0x43, 0xd}}, @hoplimit={{0x14, 0x29, 0x34, 0x101}}, @rthdr={{0x48, 0x29, 0x39, {0x3b, 0x6, 0x3, 0x0, 0x0, [@local, @mcast2, @loopback]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0xea6b}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x5}}], 0xd0}}], 0x1, 0x1a644a40fda8f663) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000ac0)) pwrite64(r9, &(0x7f0000000b00)="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", 0xfd, 0x0) r10 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000c00)='/proc/capi/capi20ncci\x00', 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r10, 0x541b, &(0x7f0000000c40)) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r11, 0xc008ae09, &(0x7f0000000cc0)=""/152) [ 210.539277] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 210.550721] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 210.560332] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.566868] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.573845] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.580249] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.642111] IPVS: ftp: loaded support on port[0] = 21 [ 210.657283] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 210.676626] team0: Port device team_slave_0 added [ 210.682522] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 210.706842] team0: Port device team_slave_1 added [ 210.712364] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 210.738679] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 06:17:24 executing program 5: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x400000, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast1, @broadcast}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@initdev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @remote}, &(0x7f00000003c0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000440)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000840)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000dc0)={0x0, @initdev, @multicast1}, &(0x7f0000000e00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000f00)={@rand_addr, 0x0}, &(0x7f0000000f40)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000000f80)=@can={0x1d, 0x0}, &(0x7f0000001000)=0x80) r10 = accept$packet(0xffffffffffffffff, &(0x7f0000001040)={0x11, 0x0, 0x0}, &(0x7f0000001080)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002880)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002980)={{{@in6=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000002a80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ac0)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f0000002bc0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002cc0)={{{@in6=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000002dc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000002e00)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000031c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000003b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000003ac0)={&(0x7f0000003200)={0x8ac, r0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r1}, {0x258, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xb1}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8000}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4d}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}, {0x8, 0x6, r3}}}]}}, {{0x8}, {0xb0, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xd98}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x7ff, 0x0, 0x22b5b97d, 0x4}]}}}]}}, {{0x8}, {0xbc, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r5}, {0xb8, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0xf7, 0x3f, 0xe79, 0x5}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x40}}}]}}, {{0x8, 0x1, r7}, {0x164, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x90, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x6, 0x6, 0x2, 0x56c4}, {0x6, 0x9, 0x4, 0x1ff}, {0x6, 0x401, 0x6, 0x3}]}}}]}}, {{0x8, 0x1, r12}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r13}, {0x160, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r15}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1f}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r17}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}}]}}, {{0x8, 0x1, r19}, {0x44, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}]}, 0x8ac}, 0x1, 0x0, 0x0, 0x4000}, 0x40080) r20 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003b40)='/selinux/checkreqprot\x00', 0x1380, 0x0) ioctl$VHOST_SET_VRING_ERR(r20, 0x4008af22, &(0x7f0000003b80)={0x1}) getsockname$packet(r20, &(0x7f0000003bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003c00)=0x14) ioctl$IMDELTIMER(0xffffffffffffffff, 0x80044941, &(0x7f0000003c40)=0x3) setxattr$trusted_overlay_redirect(&(0x7f0000003c80)='./file0\x00', &(0x7f0000003cc0)='trusted.overlay.redirect\x00', &(0x7f0000003d00)='./file0\x00', 0x8, 0x3) r21 = openat$vsock(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/vsock\x00', 0x202140, 0x0) ioctl$PIO_FONT(r21, 0x4b61, &(0x7f0000003d80)="b77d41a494f187acf333eec85182c2c814c023c729ddde077582e17445258e6530d9422a597fa826c400ca6d06b7049174df385745f818aad1ebb39d142992c1800a12a81aaa56f272e9") ioctl$SIOCGIFMTU(r20, 0x8921, &(0x7f0000003e00)) r22 = accept(r10, &(0x7f0000003e40)=@caif=@rfm, &(0x7f0000003ec0)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000053c0)={@remote, 0x0}, &(0x7f0000005400)=0x14) getsockopt$inet6_mreq(r21, 0x29, 0x1b, &(0x7f0000005440)={@empty, 0x0}, &(0x7f0000005480)=0x14) sendmsg$nl_xfrm(r22, &(0x7f0000005800)={&(0x7f0000003f00)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000057c0)={&(0x7f00000054c0)=@updpolicy={0x2d0, 0x19, 0x100, 0x70bd25, 0x25dfdbfe, {{@in6=@dev={0xfe, 0x80, [], 0x1d}, @in6=@rand_addr="af6e0d84c9b25cc08718af121161d4ca", 0x4e20, 0x7f, 0x4e24, 0x4, 0x2, 0x80, 0x20, 0x73, r23, r16}, {0x3, 0x7, 0x33a2, 0x9, 0x0, 0xa7d, 0x7af, 0x8}, {0x80, 0x3, 0x6, 0x9}, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x2, 0x2}, [@algo_comp={0x100, 0x3, {{'lzs\x00'}, 0x5b0, "5986a0a42e2b06f09462da4b334e2591ec3ec857eaf5f1c536fc87c8c6e063da6383fb985ce2d64608d26d2cd059cd3f578719811f687a878d9f186132c7d1836319c85eac1c78fdbbbfea388b1dd89acbe3ce5d81c2bb9132f3df1b06c740944655a3e8a4207e2c0d1915a5fb67868b55886880d9c6c6d0f90eeec14d985eac49dda6d2168dffec1a053ea912cd7fc4d0301dbc44e780580f0321be19a773ea29c68316b04b82fd4ccd4719bf0d587ba6df4991c315"}}, @policy_type={0xc, 0x10, {0x1}}, @policy={0xac, 0x7, {{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in=@rand_addr=0xf03, 0x4e23, 0x0, 0x4e21, 0x1000, 0x0, 0x20, 0x20, 0x73, r24, r14}, {0x5, 0x5, 0x4, 0x1c0000, 0x9, 0xfffffffffffffff7, 0x7, 0x9}, {0x8, 0xab8, 0x1000000000000000, 0x9}, 0x3, 0x6e6bb3, 0x3, 0x0, 0xb35f5ec86f494ca, 0x1}}, @replay_val={0x10, 0xa, {0x70bd2d, 0x70bd2b, 0x7fff}}, @replay_val={0x10, 0xa, {0x70bd2b, 0x70bd29, 0x8}}, @tfcpad={0x8, 0x16, 0x3}, @migrate={0x30, 0x11, [{@in=@dev={0xac, 0x14, 0x14, 0xd}, @in6=@mcast2, 0x2b, 0x0, 0x0, 0x3501, 0x2, 0x2}]}, @output_mark={0x8, 0x1d, 0x7}]}, 0x2d0}, 0x1, 0x0, 0x0, 0x4000031}, 0x4008000) [ 210.828964] device hsr_slave_0 entered promiscuous mode [ 210.871159] device hsr_slave_1 entered promiscuous mode [ 210.925757] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 210.933066] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 210.948565] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 210.954639] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.999222] chnl_net:caif_netlink_parms(): no params data found [ 211.011551] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 211.014191] IPVS: ftp: loaded support on port[0] = 21 [ 211.023492] IPVS: ftp: loaded support on port[0] = 21 [ 211.029741] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.037978] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.045248] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 211.081131] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 211.095060] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 211.102773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.109795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.122530] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 211.129879] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.163563] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.170317] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.177586] device bridge_slave_0 entered promiscuous mode [ 211.184449] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.190940] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.198401] device bridge_slave_1 entered promiscuous mode [ 211.226727] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 211.242566] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 211.253688] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 211.262307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.271138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.278992] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.285339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.341289] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 211.364860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.373113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.380726] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.387110] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.398869] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 211.411845] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 211.419303] team0: Port device team_slave_0 added [ 211.440973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.451138] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 211.464504] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 211.472944] team0: Port device team_slave_1 added [ 211.478582] chnl_net:caif_netlink_parms(): no params data found [ 211.489910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 211.520284] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 211.527509] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 211.536969] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 211.574004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.582455] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.590454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.598397] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.606980] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 211.614569] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 211.626862] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 211.638673] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 211.662995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 211.670817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.678759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 211.686581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.708050] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 211.714091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 211.767715] device hsr_slave_0 entered promiscuous mode [ 211.806317] device hsr_slave_1 entered promiscuous mode [ 211.887780] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.904386] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.911567] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.919098] device bridge_slave_0 entered promiscuous mode [ 211.925570] chnl_net:caif_netlink_parms(): no params data found [ 211.936153] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 211.954356] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.961719] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.969437] device bridge_slave_1 entered promiscuous mode [ 211.975665] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 212.011475] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 212.023983] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 212.034167] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 212.054841] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 212.064447] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 212.073469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.080685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.089543] chnl_net:caif_netlink_parms(): no params data found [ 212.099406] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.105765] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.113172] device bridge_slave_0 entered promiscuous mode [ 212.122281] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.128706] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.135597] device bridge_slave_1 entered promiscuous mode [ 212.149799] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 212.155883] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.185562] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 212.196557] team0: Port device team_slave_0 added [ 212.202128] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 212.209642] team0: Port device team_slave_1 added [ 212.215384] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 212.229032] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 212.237943] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 212.247643] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 212.260479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.268217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.275722] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.282098] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.294806] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 212.305280] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 212.317352] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 212.329032] audit: type=1400 audit(1568614646.200:39): avc: denied { associate } for pid=7602 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 212.351811] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.359821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.368309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.375943] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.382335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.394966] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 212.432524] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.449146] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.467694] device bridge_slave_0 entered promiscuous mode [ 212.488613] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 212.500962] audit: type=1400 audit(1568614646.370:40): avc: denied { create } for pid=7625 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:17:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000040)='\x00', 0x4) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0)=0xf18001, 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r3, &(0x7f00000053c0)=[{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000023c0)=[{&(0x7f00000000c0)=')', 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000001084000000000000000000000000000075bbcfbaa5cbdd769819617200110000000000000084000000080000000000000066aea7e04fcbca3e14859275be5b2c271c943274a07ef65b41f70ab8da26c691af0839cf54b1794cf4463b63cc4f3c3a15ff25e232f8568041c138"], 0x38}], 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000180)=0x1) openat(0xffffffffffffffff, 0x0, 0x0, 0x10) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r5, &(0x7f00000053c0)=[{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000023c0)}], 0x1, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x12cd) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) [ 212.525056] audit: type=1400 audit(1568614646.370:41): avc: denied { write } for pid=7625 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 212.554276] device hsr_slave_0 entered promiscuous mode [ 212.561000] audit: type=1400 audit(1568614646.370:42): avc: denied { read } for pid=7625 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 212.596363] device hsr_slave_1 entered promiscuous mode [ 212.636722] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 212.644437] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 212.652188] team0: Port device team_slave_0 added [ 212.657426] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.664356] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.672965] device bridge_slave_1 entered promiscuous mode [ 212.683042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 212.693166] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 212.704907] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 212.712287] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 212.720779] team0: Port device team_slave_1 added 06:17:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000, 0x0, 0x93dd79}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) r1 = socket$can_bcm(0x1d, 0x2, 0x2) accept4(r1, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80, 0xb8fe9b67d7c95c60) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) [ 212.743964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 212.756852] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 212.772025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 212.780210] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.795117] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 212.809488] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 212.835458] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 212.845540] hrtimer: interrupt took 47108 ns [ 212.849784] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 212.863746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 212.872489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.884833] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 212.894740] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.916146] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 212.928821] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 212.938998] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 212.947853] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 212.997870] device hsr_slave_0 entered promiscuous mode [ 213.036334] device hsr_slave_1 entered promiscuous mode [ 213.076740] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 213.084152] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 213.093323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.100875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.119133] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 213.127309] team0: Port device team_slave_0 added [ 213.133321] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 213.142110] team0: Port device team_slave_1 added [ 213.148975] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 213.157057] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 213.164703] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 06:17:27 executing program 0: syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x4, 0x600000) openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x80000, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x4e20, 0x3, @remote, 0x3}, 0x1c) write(r2, &(0x7f0000000340), 0x41395527) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cachefiles\x00', 0x2, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x7ff, 0x880) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001100)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000200), 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 213.181581] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 213.190716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.209740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.221855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.235265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.252910] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 213.260485] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.268179] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 213.274193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.329394] device hsr_slave_0 entered promiscuous mode [ 213.386370] device hsr_slave_1 entered promiscuous mode [ 213.427100] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 213.434529] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 213.443891] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 213.460846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.468988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.476983] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.483364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.491210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.505413] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 213.515258] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 213.524465] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 213.547841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.555777] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.563853] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.570264] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.582830] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 213.594019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.605285] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 213.618000] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 213.638406] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 213.647611] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.659050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.675496] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 213.699322] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 213.714740] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 213.729226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.737330] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.744832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.752016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.759378] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.773311] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 213.782671] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 213.789742] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.800894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.809161] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.819972] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 213.832849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.840590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.851038] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.859623] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 213.875317] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 213.882931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.891592] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.899452] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.905833] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.913024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.920822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.930400] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 213.941265] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 213.949276] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 213.955471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.962840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.971093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.978803] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.985141] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.992520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.002534] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.012992] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 214.020956] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 214.027170] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.036442] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 214.045215] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready 06:17:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept(r0, 0x0, 0x0) recvmsg(r1, &(0x7f000000b680)={0x0, 0xe7, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/73, 0x49}], 0x1, 0x0, 0x100000000}, 0x40) [ 214.052005] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.064478] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 214.078741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.085635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 06:17:28 executing program 0: stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) msgget$private(0x0, 0x20) fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000040)='\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x10000, &(0x7f0000000300)={'trans=xen,', {[{@access_client='access=client'}, {@posixacl='posixacl'}, {@access_client='access=client'}, {@dfltgid={'dfltgid', 0x3d, r0}}, {@access_any='access=any'}, {@aname={'aname'}}, {@access_uid={'access', 0x3d, r1}}, {@cache_fscache='cache=fscache'}, {@debug={'debug', 0x3d, 0x5}}, {@fscache='fscache'}], [{@obj_role={'obj_role'}}, {@permit_directio='permit_directio'}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="0000096dee254e0000000000023d41"], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='minix\x00', 0x0, 0x0) [ 214.104424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.117694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.132670] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 214.144314] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 214.152288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.167809] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.175155] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 214.191513] 8021q: adding VLAN 0 to HW filter on device team0 06:17:28 executing program 0: r0 = gettid() tkill(r0, 0x1000000000015) ptrace$poke(0xffffffffffffffff, r0, &(0x7f0000000280), 0x0) syz_open_procfs$namespace(0x0, 0x0) close(0xffffffffffffffff) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="f9bf0000"], 0x48}}, 0x0) socket$can_raw(0x1d, 0x3, 0x1) prctl$PR_SVE_GET_VL(0x33, 0x18c35) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000004f40), 0x10) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x25dfdbfe, {0x0, r5, {}, {0xb, 0xfffc}}}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000002a0001efe335bc0162268a0000000000", @ANYRES32=r5, @ANYBLOB='\x00'/12], 0x24}}, 0x0) [ 214.200895] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 214.211241] 9pnet: Could not find request transport: xen [ 214.216275] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 214.224486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.238859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.252361] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.258787] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.272118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.279965] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.294620] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 214.304347] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 214.315775] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 214.326653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.333842] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.342008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.362853] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.373220] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.379650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.387398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.395480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.403504] bridge0: port 2(bridge_slave_1) entered blocking state 06:17:28 executing program 2: creat(&(0x7f0000000180)='./bus\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f00000001c0)=ANY=[], 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) [ 214.409931] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.420987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.430617] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 214.444352] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 214.457287] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 214.464936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.474696] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.485736] audit: type=1804 audit(1568614648.350:43): pid=7671 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir853761423/syzkaller.LNvijP/1/bus" dev="sda1" ino=16530 res=1 [ 214.515402] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.523432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.531542] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.539698] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.546287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.553125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.564040] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 214.573665] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 214.585462] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 214.593418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.604667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.612567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.620674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.628798] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.637311] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.648793] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 214.657831] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 214.665643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.673689] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.681636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.690690] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 214.699756] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 214.708650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.716723] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.724102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.731731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.741911] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 214.751115] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 214.759555] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 214.765713] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.772735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.781117] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.789323] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.797045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.804550] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.813890] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 214.823665] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 214.830175] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.838074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.845846] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.856275] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 214.867944] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 214.875791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.883897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.892475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.900329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.911489] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 214.925447] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 214.931702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.942113] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 214.953792] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.970380] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 214.988403] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.010315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.132380] audit: type=1400 audit(1568614649.000:44): avc: denied { create } for pid=7680 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 215.148532] QAT: Invalid ioctl [ 215.201833] audit: type=1400 audit(1568614649.030:45): avc: denied { setattr } for pid=7680 comm="syz-executor.4" path="socket:[28428]" dev="sockfs" ino=28428 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 215.328448] QAT: Invalid ioctl 06:17:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0xb, &(0x7f00000000c0)={&(0x7f0000000280)=@newqdisc={0x60, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x34, 0x2, [@TCA_FQ_RATE_ENABLE={0x8, 0x5, 0xa}, @TCA_FQ_FLOW_DEFAULT_RATE={0x8}, @TCA_FQ_FLOW_PLIMIT={0x8}, @TCA_FQ_BUCKETS_LOG={0x8}, @TCA_FQ_PLIMIT={0x8}, @TCA_FQ_INITIAL_QUANTUM={0x8}]}}]}, 0x60}}, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x48900) ioctl$SNDRV_TIMER_IOCTL_STATUS(r3, 0x80605414, &(0x7f0000000640)=""/4096) 06:17:30 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f00000000c0)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000078ba221f00000000000000000a0000000000000000000000000000000000000000000000000000000100000000000000000000000000000000f50e00"/136], 0x88) 06:17:30 executing program 4: ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000600)={0x53, 0xfffffffffffffff6, 0x98, 0x100000001, @scatter={0x2, 0x0, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/17, 0x11}, {&(0x7f0000000300)=""/114, 0x72}]}, &(0x7f00000003c0)="8140949a57b02438769f65544d7e854d9b9865cb26cbb8d23b0c58bbb4f25c0d3233b24620057411eb0fe22a9cac9ebb9bdc99aaaab52ec4d0efb7b4b31cb4a9cc819e9a2c2fd2bfb586de998f88f8ae6128414c97415c7f2e8e2718f5435cc82be208fe40e8eaff9a4568616cdefa92e32f4f4bac826b8694db2ce4785fa7502c33dc4d88f0a36e039559a79905422db376a5d670e140d3", &(0x7f0000000580)=""/112, 0x401, 0x2, 0x2, &(0x7f0000000480)}) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000140)={0x1ff, 0x9, 0x1}) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000280)=@buf={0xe6, &(0x7f0000000180)="7d9d695825f0031ed937ae5b96323a06ed7a9be7fb484867fda995720b0bb4d667421a801a7bbd8142738ab69988e1fa704976333ba750e536f065de060642cd015c5030f0e807e20d0634c115d032b1e8be42e876509bea403f809fc5755d6d8c924256c60974ab1c212c89f271e502a2547391c0241eeabbcc5c7fd31eb14e3f42af2f2cb63ebe6f037ced5126ed7462e26b2e98b04deeaaf7a3f15136005eadfb4ed286f58efdec8ed5ad103d68d43cced50c0e1feaf792ed7b0281f68110ace07ab98ea0e90c37512a6c603b0a2b4910de898209a933719f8123f510228b8bfa4f23e762"}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000540)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r2, 0xc0345642, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x10, 0xffffffffffffffff, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'morus640\x00'}, 0x58) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, &(0x7f00000004c0)={0x8, 0x7}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x800, 0x0) ioctl$FS_IOC_GETVERSION(r3, 0x80087601, &(0x7f00000000c0)) 06:17:30 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaa64472786ebaaaaaaaaaaaaaaaaaa0800450002ce00fd475eacf5d906bb000000e0000001080090"], &(0x7f0000000040)={0x0, 0x3, [0x0, 0x2d9, 0x8e2]}) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) [ 216.765215] sch_fq: defrate 0 ignored. [ 216.781280] sch_fq: defrate 0 ignored. 06:17:30 executing program 3: pipe(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="a6a7e912ed66c23829c62c832d7f95e52182affdba1a3d0aa934f2003584d5aceaf4f430c7ebdb802056"]) 06:17:30 executing program 5: syz_open_procfs(0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@empty}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x5, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x2d4f, 0xc}, 0xc) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) ioctl$TCSETX(r4, 0x5433, &(0x7f0000000200)={0x2, 0x3, [0xffff, 0x100000001, 0x6, 0x81, 0x1f], 0x3}) r5 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @null}, [@bcast, @null, @default, @null, @bcast, @netrom, @default, @null]}, &(0x7f0000000080)=0x48, 0x80000) dup2(r3, r5) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x1) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) 06:17:30 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000240)="04df000088c37d14a527e558c20e7b5fda9f62e63ef044ae1a4154dd4535984a334b14caf4be0489bec852bab44ecc3dc2a23ff2e241ddc284bdab49949b520b5bfbaeba4439a10606425ed152654d8d910d4050ecc27126e417e9b65df29938f014dd8742cba937341caae1629128bf126b197a09e931e5e36fbe2c") syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socketpair(0x5, 0x4, 0x8, &(0x7f0000000000)={0xffffffffffffffff}) sendto$rxrpc(r0, &(0x7f0000000300)="4cd8f429d5058d4db8ff69ad2d084efbd1f53b7ce7ddaff10ddc2e5b2bc90d8904a4726786aac7a4fc989330f5329bd267a3974936b2aa36c234fd761ab651d9754567c932d9203f149254366e08f98a5e3f715d7cf1b03f8e4fbeef318e343240bf70a92987e4acaa7b339ad47d1e582d31ba631413056ae0cc96ff78a228ad691f1f434a2b78698773458a51a4a9860dd07a36a91784251e", 0x99, 0x5, &(0x7f0000000040)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e21, 0x8137, @mcast2, 0x3}}, 0x24) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'\x06\x03\x1d', 0x1}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r3, r3, r4}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000000)={'sha512-ssse3\x00'}}) r5 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'\x06\x03\x1d', 0x1}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r5, r5, r6}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000000)={'sha512-ssse3\x00'}}) r7 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'\x06\x03\x1d', 0x1}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r7, r7, r8}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000000)={'sha512-ssse3\x00'}}) r9 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'\x06\x03\x1d', 0x1}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r9, r9, r10}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000000)={'sha512-ssse3\x00'}}) r11 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'\x06\x03\x1d', 0x1}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r12 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r11, r11, r12}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000000)={'sha512-ssse3\x00'}}) r13 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'\x06\x03\x1d', 0x1}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r14 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r13, r13, r14}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000000)={'sha512-ssse3\x00'}}) r15 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'\x06\x03\x1d', 0x1}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r16 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r15, r15, r16}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000000)={'sha512-ssse3\x00'}}) r17 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'\x06\x03\x1d', 0x1}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r18 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r17, r17, r18}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000000)={'sha512-ssse3\x00'}}) r19 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'\x06\x03\x1d', 0x1}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r20 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r19, r19, r20}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000000)={'sha512-ssse3\x00'}}) r21 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'\x06\x03\x1d', 0x1}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r22 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r21, r21, r22}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000000)={'sha512-ssse3\x00'}}) r23 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'\x06\x03\x1d', 0x1}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r24 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r23, r23, r24}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000000)={'sha512-ssse3\x00'}}) r25 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'\x06\x03\x1d', 0x1}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r26 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r25, r25, r26}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000000)={'sha512-ssse3\x00'}}) r27 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'\x06\x03\x1d', 0x1}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r28 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r27, r27, r28}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000000)={'sha512-ssse3\x00'}}) r29 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'\x06\x03\x1d', 0x1}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r30 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r29, r29, r30}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000000)={'sha512-ssse3\x00'}}) r31 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'\x06\x03\x1d', 0x1}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r32 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r31, r31, r32}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000000)={'sha512-ssse3\x00'}}) r33 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'\x06\x03\x1d', 0x1}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r34 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r33, r33, r34}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000000)={'sha512-ssse3\x00'}}) write$binfmt_aout(r2, &(0x7f00000013c0)=ANY=[@ANYRESHEX=r3, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f00000014c0)=ANY=[@ANYRESHEX=r7, @ANYRES64, @ANYRES32=0x0, @ANYPTR64=&(0x7f0000001900)=ANY=[@ANYRESDEC=r1, @ANYPTR=&(0x7f0000001700)=ANY=[@ANYRESDEC, @ANYRESOCT=0x0, @ANYRESOCT=r1, @ANYRES64=r11, @ANYPTR64=&(0x7f0000001540)=ANY=[@ANYRESDEC=r13, @ANYRESHEX, @ANYRES32, @ANYPTR, @ANYRESDEC=0x0, @ANYRES64=r15, @ANYPTR64, @ANYRESOCT, @ANYRESHEX=0x0], @ANYRES16, @ANYRESOCT=r17, @ANYRES64=0x0, @ANYPTR=&(0x7f00000015c0)=ANY=[@ANYBLOB="e27ae4be71193de255ca2f80d1ebb40e35f7623a4f0e3eaad47eb4d43b4a4d27a58d8eb64c0ccafe603e2ea7c4d34167657c301b242b3b6b55b7987cc4afe59c234cee61485149cc213bbf7b3072846b492a534e789b577bfe5cc049fef60e3b40aa45bf6e1684380e152f6c3e57ff5587e38b83b9791f01e50ae6ddef279ec24939ce68f6f2aabe5e728fd7346251cf3910ab5c6083b119e35e8ea7feb851fdff5b0576350cebbad2a6acb9803a9d6edfa9eaa1336376a18b2c8499dedcc1520002b74bf3059a64b367b8f540917537a4399e9c04dbf52bc42a13b6225b0a5708", @ANYRESOCT=r0, @ANYBLOB="fb26826925f6c2fa0fdea0d6134f942be1c798ef682f36648071c69508bed1777bf83af62f2014993f11ca", @ANYRES32=0x0]], @ANYPTR64=&(0x7f00000017c0)=ANY=[@ANYPTR64, @ANYRES16=r11, @ANYPTR64=&(0x7f0000001780)=ANY=[@ANYPTR64], @ANYRES32], @ANYPTR=&(0x7f00000018c0)=ANY=[@ANYPTR=&(0x7f0000001800)=ANY=[@ANYRESOCT=r19, @ANYPTR, @ANYRESOCT=r17], @ANYPTR=&(0x7f0000001840)=ANY=[], @ANYRES16=r26, @ANYRES32, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB="8622025341be4b6b669b73ff609afb8c2033304f58df3ecf49990f1294a7ceef78ae0e65ef41da201ead907a97", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYRES64, @ANYRESHEX=r16, @ANYPTR, @ANYPTR, @ANYRESDEC=r28, @ANYPTR, @ANYRES16=r29, @ANYRESOCT, @ANYRESOCT=r31, @ANYRES16=0x0], @ANYPTR64=&(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES16=r33, @ANYRES16=r4, @ANYRES16=0x0], @ANYRES32, @ANYBLOB="7a1efbafa4eb7b93661e377a045971fd38bd1d62d2514a63f7d9cc3a86e41a90868cf034137d907cad51d7259bb4c13b6435c19c69e644917890d6022e4d23cebd16981f41e1fe7aa40986d524974c39b88e6a692c568def8abc", @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYPTR, @ANYRESHEX]]]], @ANYRESHEX=0x0, @ANYRESHEX=0x0, @ANYRES32=r2, @ANYRESHEX=r10]], @ANYBLOB="02c50fce901d630c36b37a94ac06c1bf895e97f49075d3b3ed14a14d15f63a912d501b5353178d8733bcaf8955ad615117790fe675caafb865f30808760e2b4583027bfc4161c7018fb603f47d47869301d361c0e67386f437139fa5834fbf63ed6e38dbe5c0e496fa0a16204b2691650ef97491517e0fe2b61ac92a7d8d", @ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESHEX, @ANYRESHEX=r5, @ANYBLOB="db05e710f832591e0bd8e669183fc7c02ffeb1c4b2a71807000000000000004a605eb3913e9a9ca3ba48237e9cb7401f3742d358c59d79b92833bc2f1bcd5e5eeadcf237d67d02d5ca"]], 0xb2) truncate(&(0x7f0000000180)='./bus\x00', 0x9) 06:17:30 executing program 2: syz_emit_ethernet(0x32, &(0x7f00000000c0)={@link_local, @random="27c2de128914", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=0x400, @empty}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) syz_emit_ethernet(0xe1, &(0x7f0000000100)={@dev={[], 0x1a}, @broadcast, [{[{0x9100, 0x240000000, 0x6, 0x2}], {0x8100, 0x2, 0x6, 0x2}}], {@llc={0x4, {@llc={0xf8, 0x42, 'ld', "b02ef822350e7dfad5f72c05c9950bcdb74c545fb192288ca46d8e758b487c63c64da862702e1cefda35c3908888d2e4c0d71ea6d9628bdb449883c145137a976c67cc4d74642b23d66440815f416776a0d3b389e672bb9e6cd326af12e0d132d6f03800e6f14f65e43271aa6e58926471b64df8b98241bc5b5bdf743e3868206e6b0318223fa7fce5498ba988eaa963439ce5f4c5066414021715da965741f148f5defdffad7943076202333bc954c6589f0e89517a7fe43aae6988cd527778c3effd33f066ef"}}}}}, &(0x7f0000000000)={0x1, 0x4, [0x6ff, 0x992, 0x657, 0x8b2]}) [ 216.928753] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 217.072207] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 06:17:31 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1f, &(0x7f0000000080)=""/116, &(0x7f0000000100)=0x74) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0xf8) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0485619, &(0x7f0000000400)={0x0, 0x0, 0x0, [], 0x0}) socket(0x10, 0x6, 0xa49c) socket(0x2, 0x3, 0x10001) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000000)={0x3, 0x5, 0x0, 0x712, 'syz0\x00', 0x9}) socket$inet6(0xa, 0x6, 0x200) 06:17:31 executing program 4: r0 = socket$inet6(0xa, 0x100000003, 0x3a) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r2], 0x1c}}, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f00000000c0)={'bcsh0\x00', 0x3}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r3, 0x0, 0x0) getsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f0000000100)=0x100000000, &(0x7f0000000140)=0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VHOST_SET_LOG_BASE(r4, 0x4008af04, &(0x7f0000000200)=&(0x7f00000001c0)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r5, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x8000, 0x0, 0x0, 0x401}, 0x3}, 0x7) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x81, {{0xa, 0x4e24, 0x10000, @ipv4={[], [], @multicast1}, 0x5}}}, 0x88) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) 06:17:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) dup3(r2, r1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0x1) socket$kcm(0x29, 0x2, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) 06:17:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb00240000c9020000000000ff00010000a100000000000000000200000000ce4fd566009e42e6650c50e3737524000000ad77dde6ae0000001345c6b74f36d2ef7cd23aded78ff9dd0000"], &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x1}, 0x20) [ 217.289969] audit: type=1400 audit(1568614651.160:46): avc: denied { ioctl } for pid=7737 comm="syz-executor.4" path="socket:[28886]" dev="sockfs" ino=28886 ioctlcmd=0x8980 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:17:31 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000680)=0x4, &(0x7f00000006c0)=0x2) setresuid(0x0, r1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x2d, 0x3, &(0x7f0000000080)=[{&(0x7f0000000280)="0fd64c2b889f7046a76768dee310ded00b3b8efac5947f47d77ddd6e7bb53d564fe0b95b49cd44cb71ea0458cd617353d46f4b5052832dc8522bc6c1b9ae9ea1366dd85c6e77b45b5dcee827dc1b1fc9dfaa798627315584fdafb6dd93965e972ab88fe539dc4b54b2b64f9b3232f04a4f31440e2b3c97fc48cb822b3f54992d92c6d78ee24687a1875eeeb3a7c94861e0b1d29f32bda74a9a967d83f7ee37de729f08ec72b6ed6a7a7e5900882953dcf2069901a38af2d3078116e541f64c08f9c8", 0xc2, 0x9e}, {&(0x7f0000000380)="dc10bda57ad229a70b7fb813312a6387c382c0b6fe2f0bfc961b29023f5071359caa2c100b9f27192972778c8efe92067468e3412e233254544a01e030821845526fed98607163da42df728e689733a4a476ea0350d2f0d369f139e1584c52c4b700fe9e1fa93f74a527371bcd66f642785729275d7c5a234ab0baf8a1372d78bc0a334ef3a5a9287105a345d3bb368147a6e5dda58dc629e61dd02519f314fe051a814aa6ef037c67ea21db2ddf6772f1ba222dfefa0d157e7a05c6be365aae38a7f2e01e8de5710e3467e78cf9f4735a4fb25a3146730bc9f9e92a771a2c62a57a9e35998cdc1296a7a8eda0fe5306ea7c1e83a3dd", 0xf6, 0x180000}, {&(0x7f0000000140)="652c56d0c6d16d3206c20f78a20ba59a947201ad9e52f1af0f55a21791380f7d20b50d0ac1467b93a0ce2c1448a599eba15c56728a0c08f3365ed22f16ce75639e5658cf596534d4ecc60d0e7c47735549e96adcd908b264f88d53aec264cf31e52ea425fe49168a400a3ce0b5b3932a2a54b0dddaed9c766482cdc8a477f0a17f5d159575d051b761b6c71bf3db9f1268ef5fcd4224", 0x96, 0xdf}], 0x0, &(0x7f0000000480)={[{@tails_off='tails=off'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fowner_lt={'fowner<', r1}}, {@pcr={'pcr', 0x3d, 0xa}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevvboxnet0eth0\'^ppp1em1\xdd'}}]}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000540)={{{@in=@initdev, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000640)=0xe8) 06:17:31 executing program 1: sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x0, 0x0, 0x38b}, 0x10) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) write(r3, &(0x7f0000000a40)="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", 0xffffffbd) shutdown(r2, 0x0) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000140)={@rand_addr, @multicast1, r4}, 0xc) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$unlink(0x6, r7, 0x0) r8 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001980)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000380)='encrypted\x00', &(0x7f0000000280)={'\xdc\x93\x01', 0x3}, &(0x7f0000000200)='\xe6?\xf3\xd7v\xebH\xd0\x8d\x93}:\xdf/i\xf4\xe9\xb7cO1\"\x1b\x99\xbb\xda\xcb6\x9b\xda\x1d\xd5\x8c\xfa\xc1\x00\xcbe\x91s\x0e\x80\x9eq\xab\x0e\xbe\xb4\x00\xeb\xd5\xc9\xb7\x8a\xbe\xd5\x06\x9b\xfa\xa2\x1c\xba\x96\xad\x89\x9d\xa0\xddOB:$\xb5+\xa7%\xbaE\x9a\x84\xbc\xd3d\x8f\xe5I\xf1\xae\xa9\xd9\xf8\xdbkQ\xf5s\xf6\x10\xa2w\xfeZP\xcb\xdf\x9e<_\x85F\x00', r8) r9 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$revoke(0x3, r9) keyctl$unlink(0x6, r9, 0x0) r10 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001980)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000380)='encrypted\x00', &(0x7f0000000280)={'\xdc\x93\x01', 0x3}, &(0x7f0000000200)='\xe6?\xf3\xd7v\xebH\xd0\x8d\x93}:\xdf/i\xf4\xe9\xb7cO1\"\x1b\x99\xbb\xda\xcb6\x9b\xda\x1d\xd5\x8c\xfa\xc1\x00\xcbe\x91s\x0e\x80\x9eq\xab\x0e\xbe\xb4\x00\xeb\xd5\xc9\xb7\x8a\xbe\xd5\x06\x9b\xfa\xa2\x1c\xba\x96\xad\x89\x9d\xa0\xddOB:$\xb5+\xa7%\xbaE\x9a\x84\xbc\xd3d\x8f\xe5I\xf1\xae\xa9\xd9\xf8\xdbkQ\xf5s\xf6\x10\xa2w\xfeZP\xcb\xdf\x9e<_\x85F\x00', r10) add_key(&(0x7f0000000680)='syzkaller\x00', &(0x7f00000006c0)={'\x00', 0x1}, &(0x7f0000000700)="4819372d75a432aa6e435272096fa35b86f6849211a58b4321e1afda25fa70ba63ff7ca0d83b", 0xffffffffffffffde, r10) dup(r6) listen(r5, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$reiserfs(&(0x7f00000004c0)='reiserfs\x00', &(0x7f00000001c0)='./file0\x00', 0x7, 0x5, &(0x7f0000000540)=[{&(0x7f0000000240)="91d5e0b739229c8a13f5280b08fbd4b3979669d6a26449f982742f4568d0952d0e5f0a4516282f74ca54fcbc74a236e51a4d741b8ad67316e48ff3d0cd9f68b03d61a4f91171a6583991d111a9c6113f31c30d5c5128ea8f6c2b9ffc3aca25b19812dd99a1b1d1914866d1ff25988bb064d0282acd00b332c97e7acffa6cd084b95733bffd95ea628dde4ea784", 0x8d, 0x1}, {&(0x7f0000000300)="9f1b7e496f0c0fda829e35aa85b34f", 0xf, 0xe8e}, {&(0x7f0000000340)="d866f234d1845a129f80cc6783d89c691f3845050013ca229fa4c0387167d058dbde1c9de66539d4405cc9f6ef7f34bdf56a1bad86e3383c1c75d200d4a3d8031da49e28b33c736bcbef05e3dffcb1599571be4b2ad8f9751595d9b739397dc63b891e81f301594c7c2a58504cef09bb1982b20fa8d01abc2901df67a5850866df4d8ae41e7d76083d1dbd2e29116296dd7f83323260563498c429543af3e2a9c4fd1a356d20302223be1a460d2dd3924dc95323c510c6b8e15e559efaf48b9ed0fa0f721caacbf2a0b165bf7b6020a763fd381f04104e504e223ce157f96845bc4aadde28c74a183f29e7f8", 0xec, 0x61ae}, {&(0x7f00000004c0), 0x0, 0x1}, {&(0x7f0000000500)="74282e71bbac57c4ba56", 0xa, 0x100000000}], 0xdaa76f9daba99f2a, &(0x7f0000000840)=ANY=[@ANYBLOB="6a6465763d2e2f66696c65302c7569643c0d9b3f29f076417fa75bb12ba3770e09046f898988e5b0241a2db15c4d4cb27daa4207b2f538862c2acaed7509cbf8df13079f19eef1a2efd743779ca187fc1404eb8f03a9a90256de21d5aa8660f9a7b62f0feeff1994d99f74d8cf13995c90775f72851e301b0f4cb4bde48833825395c7d7d3d04131fdb89ac5475d", @ANYRESDEC=r12, @ANYBLOB="4a484bf409d2fe3d0dd3bcd9e893b577295200005aa05a12f341dcef211a0ea4f37b538f684f6364ba9c1c63b06954", @ANYRESDEC, @ANYRESDEC=0x0]) sendto$inet6(r11, 0x0, 0x9c27f8819ac3a180, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r13 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) sendto$inet6(r13, &(0x7f00000000c0), 0xffffffffffffff74, 0x0, 0x0, 0x0) [ 217.376970] audit: type=1400 audit(1568614651.230:47): avc: denied { ioctl } for pid=7745 comm="syz-executor.0" path="socket:[28899]" dev="sockfs" ino=28899 ioctlcmd=0x89e2 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=sock_file permissive=1 06:17:31 executing program 0: pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000001c0)={@local, r1}, 0x14) r2 = socket$inet(0xa, 0x801, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000140)={0x1, 0x3}, 0x2) setsockopt$inet_mreq(r2, 0x0, 0x21, 0x0, 0x0) r4 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'\x06\x03\x1d', 0x1}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r4, r4, r5}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000000)={'sha512-ssse3\x00'}}) r6 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001980)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000380)='encrypted\x00', &(0x7f0000000280)={'\xdc\x93\x01', 0x3}, &(0x7f0000000200)='\xe6?\xf3\xd7v\xebH\xd0\x8d\x93}:\xdf/i\xf4\xe9\xb7cO1\"\x1b\x99\xbb\xda\xcb6\x9b\xda\x1d\xd5\x8c\xfa\xc1\x00\xcbe\x91s\x0e\x80\x9eq\xab\x0e\xbe\xb4\x00\xeb\xd5\xc9\xb7\x8a\xbe\xd5\x06\x9b\xfa\xa2\x1c\xba\x96\xad\x89\x9d\xa0\xddOB:$\xb5+\xa7%\xbaE\x9a\x84\xbc\xd3d\x8f\xe5I\xf1\xae\xa9\xd9\xf8\xdbkQ\xf5s\xf6\x10\xa2w\xfeZP\xcb\xdf\x9e<_\x85F\x00', r6) keyctl$unlink(0x9, r4, r6) 06:17:31 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000040)) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000180)={{0xb000, 0x5000, 0xf, 0x1, 0x56a, 0x6, 0x4, 0xfffffffffffffffe, 0x1, 0x7, 0x100, 0x8}, {0x2, 0x3000, 0x13, 0x1f1, 0x3, 0x2, 0x0, 0x1, 0x0, 0x28000000, 0x72c4, 0x8}, {0x4, 0x2, 0xb, 0x0, 0x8, 0x9a04, 0x5, 0x2, 0x10001, 0xce9c, 0x3, 0xc3a}, {0x10000, 0x100000, 0x10, 0x5, 0x0, 0x81, 0x100000000, 0xffff, 0x200, 0xffff, 0x3, 0x1000}, {0x1, 0x2, 0x6, 0x590, 0x309, 0xa2f, 0x12d15810, 0x6, 0x1, 0x4, 0x7fff, 0x6}, {0xd000, 0x1000, 0xf, 0x1f, 0x8, 0x8, 0x8bcb, 0x8, 0x2, 0x2, 0x6, 0x401}, {0x4000, 0x6000, 0xf, 0x80000000, 0x7, 0x80000003, 0x3, 0x9, 0x6, 0x3, 0xb8, 0xa00000000}, {0x5000, 0x0, 0x0, 0x0, 0x100000001, 0x8000, 0x9, 0x7, 0x0, 0x7ff, 0x8, 0x7}, {0x3000}, {0xa1ed2aed81344319}, 0x60040020, 0x0, 0x0, 0x20000, 0x9, 0x0, 0x1000, [0x1, 0x3756, 0x0, 0x9]}) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x800, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x18, 0x6, 0x0, @dev, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x94}]}}}}}}}}, 0x0) [ 217.566927] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 217.680183] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 217.699102] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 217.729288] syz-executor.3 (7763) used greatest stack depth: 22624 bytes left 06:17:31 executing program 5: mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x0, 0x64031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000002c0)={0x0, 0xf0ffff, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r3, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0xf00, @link='broadcast-link\x00'}}}}, 0x3b2}}, 0x0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1c, r3, 0x1, 0x0, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x1) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r3, 0x20, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x101}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x810) 06:17:31 executing program 3: r0 = socket(0x2, 0x3, 0x69) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x52c) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) fdatasync(r1) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0000e0}, 0x6e) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) [ 217.860689] protocol 88fb is buggy, dev hsr_slave_0 [ 217.867409] protocol 88fb is buggy, dev hsr_slave_1 [ 217.909484] audit: type=1400 audit(1568614651.780:48): avc: denied { map } for pid=7773 comm="syz-executor.5" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=28965 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 06:17:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) flock(r1, 0xa) bind$alg(r0, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x3, 0x0, 0x0) [ 218.097086] raw_sendmsg: syz-executor.3 forgot to set AF_INET. Fix it! 06:17:32 executing program 5: pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f, 0x8b04, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd, 0x401, 0x0, 0x6, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8bbd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x4}, 0xf) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000000)) r2 = socket$key(0xf, 0x3, 0x2) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x40) sendmsg$key(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000000340)=ANY=[@ANYBLOB="0202200313000000000000ffff00ff1005000600571866720a000068c3f2b5359eed8104200000005500000000000000000000000000000005000900df0000002a00002000000000fe8000000000000007000000000000ff00000000000000000200010000ffff000000050d0000000005000500eb0000000a00000000000000ff020000000000000000000008f500010000000000000000"], 0x98}}, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000080)) 06:17:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/der\xca\xb3w\xb0\x00', 0x400, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000300)={0x7b, 0x5, [0x40000073], [0xc1]}) 06:17:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = memfd_create(&(0x7f0000000100)='system.sockprotoname\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = gettid() tkill(r2, 0x1000000000015) r3 = syz_open_procfs(r2, &(0x7f0000000540)='coredump_filter\x00') fcntl$notify(r3, 0x402, 0x13) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, &(0x7f0000000280)={0xe000000a}) write$binfmt_misc(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="34c775ccefbbc44b0a03086c11d14ef1be01fa8dff6aa640797ea9ed80a4f8fdeaef6078dfbe9319841a3c4ecad3c66c93ced0fc6bbbc58165ebea25878b8a8da2560890b8f323579e28943ebc6c05f446ec8ab4912545e6e3d021fdf6b8ff2137a52dc71c80e2c56001709c67a1ec8cb09597ca220c3fc368fea27771af7a8c"], 0x80) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') r4 = open(&(0x7f0000000200)='./file0\x00', 0x212000, 0x80) write$UHID_INPUT2(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="0c0000007a005ef15649518e1a13a07ebc20f5a8ad3f9df9e5abbfdf896b6e0185ced63c7bdc4c6b7f2148e938d2d8d999d2e2d7f1261e46897fa99eaae5cec56dfbd5d730f2ec6e15b6e2192bbd741fe3d14d82ae17d35e2ec4dad3213f55ade63bfa40cbb9cef153fa3f79c6203305136c707506050ed9133254a50376f5c19b20d48ad7ee117c1028946cf1b595f7a1d784f7c241430662dcb1a17db2e31ac76578f091b1022cd8c6c7d96a5f471470bff843da9eb8ed0f01e1529574f3450b8e62dc7dffebeb0f8aae2c8fdf521de5ba7595cb9ceb6cb1290bd1e850dbc3dd60c7dbb07277183e141b298d4ad6af4b6baa9bbec264f55f020654b52de24d8c164fcb64d52230643d138bf3a7a5eec5cd415038ab4dadb8d5f7fd0c916f669dbc9965cdd4c25a46a21564ef71def3ade1260978d0695e844df5eed225153c9a3740bf66a983881af8ce613d"], 0x80) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000380)={0x38e, 0x840b, 0x96, &(0x7f0000000600)="78c3beee5fc250c5988eb8d22b4e8845af11a4ba9c3107e4746d0185408ab9ec2c69905bb7a28dd0abf8ae4bedcdaa963e17afb152e3efd8d43c367e878fbf2976dbce7dafc90365bc290551e8e7e126418d333cf22c7af90c57a8bf9443afce76225b664c3185196034462b3e23ee7ad30a290eba22e1456df531e0b969a17755c24eb4156463e38e2f44af04acd05d75af937c146b"}) r7 = gettid() tkill(r7, 0x1000000000015) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000740)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r8, &(0x7f00000008c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000880)={&(0x7f0000000980)=ANY=[@ANYBLOB="c80000000780de430a291ec5bf503943f69a57ee6a9fd2e36e6fb7dfc0b367a3bcdbc8e96cc983c5736b302a2a6b509f68987af35f6c60eeaaf7ae6a58f665f5b5172d0bcbce4b81ab1946979dca991841f580438a997e1174212d79cfeacb5d86278483593dde8b68406cfe0aaf2116198b8001860de462eee9b9ebba4a9c91c0f016a83f77cecefdc2b75fc21c2aca75e8d5399c779315c2bee22a75c27ccd07ae93d8a0c16f7a82b4ff8e71eacf3cde66cefc9d517096ff47", @ANYRES16=r9, @ANYBLOB="000b2dbd7000fcdbdf2502000000380004001400010062726f6164636173742d6c696e6b000014000700080003000008000008000300650c00000c00010073797a31000000007c0005003c000200080003000900000008000400030e000008000400040000000800040003000000080003000100000008000200050000000800030007000000340002000800040049060000080002000800000008000300080000000800040002000000080002008ca2000008000400020000000800010069620000"], 0xc8}, 0x1, 0x0, 0x0, 0x4000000}, 0x24) ioctl$TIOCSPGRP(r5, 0x5410, &(0x7f00000001c0)=r7) creat(&(0x7f0000000140)='./file0\x00', 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) r10 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x3f, 0x8000) ioctl$TIOCSISO7816(r10, 0xc0285443, &(0x7f0000000340)={0x7, 0x5, 0x2, 0x6, 0x3}) [ 218.235186] audit: type=1400 audit(1568614652.100:49): avc: denied { map } for pid=7798 comm="syz-executor.4" path=2F6D656D66643A73797374656D2E736F636B70726F746F6E616D65202864656C6574656429 dev="tmpfs" ino=28568 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 06:17:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000037c0)='/dev/autofs\x00', 0x40000, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000003800)={0x370, 0x208, 0x5, 0x7, r4}, 0x10) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r6 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYPTR64, @ANYPTR], 0x10) recvmmsg(r6, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 06:17:32 executing program 1: pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x4e23, 0x100000000, @local, 0x3f}, {0xa, 0x4e20, 0x1, @remote, 0x5}, 0xffffffffffffffff, [0x20, 0x0, 0xe33c, 0x3, 0x674, 0x3f, 0x400, 0x5]}, 0x5c) write(r0, &(0x7f0000000340), 0x41395527) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000080)=""/161) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x28}, [@ldst={0x5}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 06:17:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x80003, 0x1) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet(0xa, 0x801, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0), &(0x7f0000000180)=0x98) 06:17:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'\x06\x03\x1d', 0x1}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r3, r3, r4}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000000)={'sha512-ssse3\x00'}}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000001c0)=ANY=[@ANYRES16=r4]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x2, [{0x38f, 0x0, 0x19d1a4e9}]}) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$llc_int(r5, 0x10c, 0x5, &(0x7f0000000080), &(0x7f0000000140)=0x4) [ 218.458880] audit: type=1400 audit(1568614652.330:50): avc: denied { prog_load } for pid=7822 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 218.526591] audit: type=1400 audit(1568614652.400:51): avc: denied { prog_run } for pid=7822 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 06:17:32 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f00000001c0)) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080)={r4, 0x3ac}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000140)={0x8}, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) 06:17:32 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x42002, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e22, @remote}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0xd) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000140)=0x1, 0x4) r3 = socket(0x11, 0x800000003, 0x8) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm-monitor\x00', 0x100, 0x0) setsockopt$IP_VS_SO_SET_DEL(r4, 0x0, 0x484, &(0x7f0000000a00)={0x35, @remote, 0x4e20, 0x4, 'ovf\x00', 0x63accb441c97515, 0x2, 0x32}, 0x2c) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) recvmsg(r5, &(0x7f00000006c0)={&(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000280)=""/118, 0x76}, {&(0x7f0000000200)}, {&(0x7f0000000300)=""/213, 0xd5}, {&(0x7f0000000400)=""/142, 0x8e}, {&(0x7f00000004c0)=""/241, 0xf1}, {&(0x7f00000005c0)=""/56, 0x38}, {&(0x7f0000000600)=""/151, 0x97}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/151, 0x97}], 0x9, &(0x7f0000001080)=""/4096, 0x1000}, 0x100) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) ioperm(0x8000, 0x4, 0xfffffffffffffffc) shutdown(r1, 0x1) r6 = socket$isdn_base(0x22, 0x3, 0x0) fcntl$F_GET_FILE_RW_HINT(r6, 0x40d, &(0x7f0000000200)) 06:17:33 executing program 2: sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x6c, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9e}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x66000009}, 0x4) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000040)=""/1, 0x1) 06:17:33 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x40, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.evm\x00', 0x0, 0x0, 0x0) [ 219.195060] audit: type=1400 audit(1568614653.060:52): avc: denied { syslog } for pid=7853 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 06:17:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20401, 0x22) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x3b, @ipv4={[], [], @broadcast}}}, 0x0, 0x5, 0x0, "4877bb1f56d48eb1fa5fac76a792a929a57f6062b013ec6b7a9ee231ea85a1c7f5c8fdf3bcaf6c5bb203dab4011d7c6096609012d3e979295204ae936681b23832f302a5020f3f6af0b1d2fb5a00eb09"}, 0xd8) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}, 0x0, 0x0, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cd44d9dc5c06ee3e04cd4eb90000444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) 06:17:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcf767bf070") syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x604, 0x80000) pipe2(&(0x7f0000000040), 0x800) syz_init_net_socket$x25(0x9, 0x5, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$sock_x25_SIOCDELRT(r1, 0x89ea, 0x0) 06:17:33 executing program 0: pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) r1 = dup3(r0, 0xffffffffffffffff, 0x40000) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, 0x0) r3 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) getegid() syz_open_dev$loop(0x0, 0x0, 0x0) getresuid(0x0, 0x0, &(0x7f0000000180)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r5 = open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, r5, 0x0) socket(0x1, 0x8000e, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000740)=ANY=[@ANYBLOB="85000000000000004e6045ff818ac86446e829825a9f9a905d48809ea7c7c2521c062e2d939f4d1e997f2404368b02963da2bdaddce0226b990ff61aacfd7e71a300208e0be4a9b5c7a7f624aeab78f38774a628efc53131b5ffcd76ded477e71e5634cbef63f0f981033d169260fbbdc1e012147104000000000002003cf0a0755f26bfb93a95001cfb3660fbfd8a06f4eb9f3b3f7beaff3d18079fd5a4546ecefaaca0b33a106c83799967f6b9609f29951f06d7146c98f26252a7043cf145b0d6e283de78784cb5ce14963a018d96668ca4b1c6dced064ff6174e368ecb74e91508c531a5c2919af54cfe707c39c31f2dc07b8fa417b5fc8584b8ba925c53fba4e43efeaac5a0d11fa1d54f11d079a81c8d9e4464ebc2fda606e9d6005ba81cdf0443c07f8386333060373807cee0a5889136abeeb4ae50188681857c09d1200bcb88ed52532e2d37286440f7af6a0027732b95d82e5f0a8ea5db1363c6fd1751798bfe6c8b2e52ad680460f58ba978086e528537b668843a85d02d39a8be7cc0921df36f6e60af1de4ebeec210c43294ed15e0cfadb0dc11da9a378dbb92506b90daa75bdbeb8b331858b63d295ae3d8c32babaa74403d4d288791de3458ae28b81ca88a155df561eb2332ffe5b400f44f10d41d9e876f2e002d55bc5241b7dc46695f7b26e671c26bd07eddbc2a6f08593f3e9eda"], 0x0, 0xd0, 0x68, &(0x7f0000000400)=""/104, 0x41100, 0x0, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000040)={@remote, 0x0}, &(0x7f00000000c0)=0x14) bind$xdp(r6, &(0x7f0000000100)={0x2c, 0x2, r7, 0x0, r1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000180)) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) getsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000140), 0x10) syz_genetlink_get_family_id$tipc(0x0) 06:17:35 executing program 4: r0 = socket(0x40000000015, 0x800, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x1) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x1, @loopback}, 0x10) 06:17:35 executing program 5: r0 = syz_open_dev$rtc(0x0, 0x7fff, 0x200000) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffdd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) lseek(r2, 0x20400000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000001c0)={0x4, 0x70, 0x0, 0x7, 0x0, 0x81, 0x0, 0x0, 0x802, 0x1, 0x8, 0x3, 0x0, 0x1f, 0x0, 0xa13e, 0x5, 0x100000000, 0x9, 0x6, 0x0, 0x80000000, 0x0, 0x3, 0xb18, 0x0, 0x20efcabc, 0x200, 0x2, 0x9, 0x0, 0x1, 0x0, 0xfffffffffffffc00, 0x80000001, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x104, 0x0, 0x0, 0x5}) r3 = socket(0x2000000000000021, 0x2, 0x1000000000000a) connect$rxrpc(r3, &(0x7f00000001c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001780)={0x0, @in={{0x2, 0x0, @empty}}}, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000003600)={0x0, 0x7a, "0fdf5913a80494979dd2823d8897658dd6314be670ba193c9e5946eb05402b72ee84a912d6cbeaae02f362f712badc5e33e3673e12fa524992e3a2487650b1729a2a740943494b1c3a1b8e7024543e9c050911b2b79d77d256e0c1e5cade7bec9424aa06775600d2115b7c1a3edc081b158b3718fb38dc114288"}, &(0x7f00000036c0)=0x82) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x71, 0x0, &(0x7f0000001840)) sendmmsg$inet_sctp(r3, &(0x7f0000003780)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000380)="1ce2a43146d593b83c0f9d9c3298f0873322cb9e3f463b8548126b9a6eb73856a1b63af6b56e660c845787ec0b88d7d429be2f73929ce5a7df79b23a9a1fc07a71da03540e0eb7a869b18a6d13", 0x4d}], 0x1, 0x0, 0x0, 0x81}, {&(0x7f0000000440)=@in6={0xa, 0x4e21, 0x29, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffff}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x24044014}], 0x2, 0x20000915) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00\x96C\xc2:\xf4>~Uph\x9aq\x85\xac\xdaLi\xe4J\x94\xe6\x81d\xc9g+\xba\x03\x00\x00\x00\x00\x00\x00\x00\xbb\xff\xef+\x96>\xadX\x89t\x1d\xf4\xd2\xf9\xb5YS\x05\xdd*id\xb91/\x04\x13\xe4\xdeI\xbd\xc0\xef]\xd8m\xa9\xc7(~\x93F\x89\xb1\x8b#]\x8d\xd7\xca\xca\xab\\\xebo\x17c\x91R\x18\x8fz\x93Y\xa0\x9cP\xef!p\x1d\x12\xfc\xee\xbb\x96\xf5#Ki]>\xf1J\xecS\x14\x15T\xa4\x8b\b\xa6\x1a\xa9P\xc2\x81\xe9Y\xc3\x12Ggr0d\xe9\xbbK.\x9b') getpgid(0xffffffffffffffff) capset(&(0x7f0000000240), &(0x7f0000000280)={0x3600, 0x8, 0xfffffffffffffff7, 0x3, 0x0, 0x8}) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') 06:17:35 executing program 2: pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000014001639f810663f162cf7f0452000100001000c0009000000000000"], 0x3c}}, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) 06:17:35 executing program 1: socket$inet6(0xa, 0x2, 0x0) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x7996df46) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) write$P9_RFLUSH(r0, 0x0, 0x0) r1 = creat(0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000540)) msgsnd(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="a4"], 0x1, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r2, 0x0) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) 06:17:35 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x280000, 0x20) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000240)={0x9, 0x0, [{0x60000005, 0x3, 0x1, 0x7433, 0x2, 0xc88, 0x5}, {0xc0000001, 0xfffffffffffffbff, 0x4, 0x2, 0xca4f, 0xfff, 0x1}, {0xd, 0x2, 0x4, 0x81, 0x10001, 0x7, 0x5}, {0x100000005, 0x4, 0x4, 0x9, 0x2a9e3abf, 0x2, 0x9}, {0x0, 0x3, 0x1, 0x7, 0x3, 0x7, 0x1ff}, {0x2, 0x7ff, 0x0, 0x2000000000, 0x1, 0x1, 0x200}, {0x7, 0x3, 0x0, 0xdc2, 0x200, 0x4, 0x200}, {0xd, 0xffffffffffffff00, 0x2, 0xa, 0xffffffffffff0001, 0x1, 0x7ff}, {0x80000019, 0x4, 0x5, 0xc9c2, 0x6, 0x80000001}]}) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000140)=0x20, 0x4) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000080)={{0x6, 0x7f8}, 0x2}, 0x10) write$P9_RVERSION(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="6030346dea7893702eaf93f8408e5bfebbfb6e4b64831c0deadaca85305ba8ae9fc38c4154b3f3f6fb6013f4e00c089815a56f7a0f5c6923024f5e2db55ec9e2004c355f128dc703af8c9850d8271d81b9a7240d4e4db37b96d4e1ed89aaf19240b958cf68bb522aea"], 0x13) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f00000000c0)={0x72}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r2, &(0x7f0000000180)="1ea7e2212c454e5d51507c25df1aaa7e4476e2f8217a118d29ac927a9f747e3315a4474b1a2104af8287b1b6d0bdee443109e437a49bdc31439915a824d43d006c259b506f02b43188adab11b48cd72eb1c4", &(0x7f0000000080)}, 0x18) prctl$PR_SET_KEEPCAPS(0x8, 0x1) 06:17:35 executing program 0: r0 = socket$inet(0x10, 0x4, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 06:17:35 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000040)=0x100000000, &(0x7f0000000080)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = epoll_create(0x7) fstat(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r0, 0x400454ce, r3) setgroups(0x2, &(0x7f00000000c0)=[0xee00, 0x0]) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x84680, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) 06:17:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000008200)=[{{0x0, 0x0, &(0x7f0000005f80)=[{&(0x7f0000005a80)=""/232, 0xe8}], 0x1}}], 0x1, 0x0, 0x0) [ 221.313725] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:17:35 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000100)={0x3, 0x98f90a}) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000000)="d0320f6b12baf80c66b84dbbe28866efbafc0cec2e0fc77a00b87d008ec06726650fd5af0a00000066b9301001c00f3266d9e0b830018ed066b8010000000f01d9", 0x41}], 0x1, 0x10, &(0x7f0000000140)=[@cr0={0x0, 0x40000}, @cstype3={0x5, 0xd}], 0x2) socket$packet(0x11, 0x3, 0x300) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000180)={0x8001009}) 06:17:35 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0xaa2b02, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x10801, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="789ce98b", @ANYRES16=r3, @ANYBLOB="010000000000fcdbde2501000000654e0100", @ANYRES32=r4, @ANYBLOB="400002003c00010037ff0100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5], 0xffffffffffffff5d}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0xfff0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x40, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}, {0x0, 0xffe2}}, [@qdisc_kind_options=@q_pfifo_head_drop={{0x14, 0x1, 'pfifo_head_drop\x00'}, {0x8}}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000000080)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)={@loopback}, &(0x7f0000000300)=0x14) getsockname$packet(r1, 0x0, &(0x7f0000008680)) socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x804, 0x0) sendmsg$nl_route(r8, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000086c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000008780)={@rand_addr, @initdev}, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000008840), 0x180000) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) sendmsg$nl_route(r10, 0x0, 0x0) r11 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x40) sendmsg$nl_route_sched(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) 06:17:35 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x6, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000140)='-,@-selfeth1\x00') [ 221.606096] protocol 88fb is buggy, dev hsr_slave_0 [ 221.611268] protocol 88fb is buggy, dev hsr_slave_1 06:17:35 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = socket(0x9, 0x2, 0x7) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000)=0x1, &(0x7f0000000040)=0x4) bind$bt_l2cap(r0, &(0x7f0000000100), 0xe) listen(r0, 0x0) bind$isdn_base(r1, &(0x7f00000000c0)={0x22, 0x200, 0x40, 0x1, 0x9}, 0x6) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000080)=0xffffffffffffff80, 0x4) unshare(0x10000000) close(r0) [ 222.006074] protocol 88fb is buggy, dev hsr_slave_0 [ 222.011276] protocol 88fb is buggy, dev hsr_slave_1 06:17:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) write$nbd(0xffffffffffffffff, &(0x7f00000005c0)={0x67446698, 0x0, 0x1}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000001340)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000140)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 06:17:36 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl(r0, 0x20, &(0x7f0000000340)="11dc83055e0bcfe47b4bd012ad97fc8fab7c5ce87ef070b8a6676b66f96335cd276c77009f77e5967a201427844e962a8679a5c333508f4cd929c2d2b24deed884f735ae1e03f3675f82a337320c8b7a849a29f383c57705e55ebf63599cf953299352527b778330189ad92a258ad601c7687a2e141402299357b28360208c7a05b9539d5a80be231e53367b2aa03563ad432b97ec12370abb9884b267e56bd523122449a90300a644f7ac8351e1ba064f6bcd7a6ed7d7") r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/protocols\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000180)=""/234, 0xea}, {&(0x7f0000000280)=""/143, 0x8f}], 0x2, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff}) r3 = shmat(0x0, &(0x7f0000feb000/0x12000)=nil, 0x1000) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000400)={@in={{0x2, 0x4e22, @multicast1}}, 0x0, 0x2, 0x0, "67de5095cbadef9d8d417001a555b7d75ef54b16d1a6e567e6591ce3d96c0130d64a820871fef40ec2af475d84280f8bd0010bcbc87082923257120332016c3e2774a155df7557106901bce261093077"}, 0xd8) shmdt(r3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fstat(r2, &(0x7f0000000040)) 06:17:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x5, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x82000) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000040)="f62fc123c478d88d8b7a17fbda073902ce2717b42430e891c7ac9f435b72c82be6f6083f6cde0c58c15161223778a5687017d6d7791d370bb74f63959549f2f3aaebb098f456bd07f4a03294bd51b11893baba43bf76282bb5d5afde3b332d56976b90bf7d66a31212f636c639534e5f3cf58ef87123f9b90c70201bec6c391229e31c6274bf0346e6b4b7effb0a6ff3da58ec67ae972c34d5dbb15e385bbc61b573be728856fd6f201fcf6c4399f8363cd046b55602e915874c93f32001e05739afa2b441d366b6684a405c3f5341633079977497bf0dac0a1c361cda773c07080cc2a05546200af7e43e6f0c5ca2245bd45fb82003b405b933436c45089d2b") bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0, 0x2}, 0x2c) 06:17:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) write$nbd(0xffffffffffffffff, &(0x7f00000005c0)={0x67446698, 0x0, 0x1}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000001340)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000140)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 06:17:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000015c0)='rdmi.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)={0x0, 0x2, [@remote, @empty]}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000000c0)) [ 222.325533] audit: type=1400 audit(1568614656.190:53): avc: denied { map_create } for pid=7951 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 06:17:36 executing program 5: r0 = memfd_create(&(0x7f000003affa)='/dev/snd/pcmC#D#c\x00', 0x0) lseek(r0, 0x7ffffffffffffffc, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x403ff) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f0000000140)) pipe2(&(0x7f00000000c0), 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x1, 0x4000) ioctl$VIDIOC_TRY_DECODER_CMD(r2, 0xc0485661, &(0x7f0000000040)={0x3, 0x2, @start={0x5, 0x2}}) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) write$P9_RVERSION(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="13ffff000000800600395032303030"], 0x13) 06:17:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b6558", 0x0, 0x100, 0xf2ffffff}, 0x28) [ 222.379839] device nr0 entered promiscuous mode [ 222.394005] audit: type=1400 audit(1568614656.190:54): avc: denied { map_read map_write } for pid=7951 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 06:17:36 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r2, 0x208200) fcntl$setstatus(r2, 0x4, 0x46c00) io_setup(0x463, &(0x7f0000000200)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000170a07031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 222.550286] mmap: syz-executor.5 (7973) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 06:17:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_int(r0, 0x1, 0x30, &(0x7f0000000000), &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r2, 0x406, r2) sendto$inet(r5, &(0x7f0000001600)="d96e5401c4538a6e952055ad58e70c6ae63b2b42158aa062aee47761cde23c5ba2590be00aa913e6d00b219c67313f120e75c6b9c69bcff522b5b8115118e7cd90ba7d396737737a6cd3c1b169d4e66b32324426fc4141382206531a38042aed88236a60038a1c66e5d769cbae67a906599aded92af9875d11fc6348c44931d5636534372f59b0", 0x87, 0x4000000, &(0x7f00000016c0)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r6 = signalfd4(r3, &(0x7f00000003c0)={0x3f}, 0x8, 0x800) ioctl$sock_inet_udp_SIOCINQ(r5, 0x541b, &(0x7f0000000340)) r7 = dup2(r4, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x82) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000180)=0x0) r9 = syz_open_procfs(r8, &(0x7f0000001540)='net/udp\x00') ioctl$TIOCOUTQ(r9, 0x5411, &(0x7f0000001700)) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) getgroups(0x8, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff]) r12 = getgid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xfffffffffffffef2) lsetxattr$system_posix_acl(&(0x7f0000000140)='.\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="0a000000010000000000000004000000002e0000e3ea0300", @ANYRES32=r11, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r12, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r13, @ANYBLOB="1010155bee440000bd5067d100000000"], 0x3c, 0x0) ioctl$sock_netdev_private(r9, 0x89fe, &(0x7f0000000000)="f7b9439bde73440b7fd3e0ebb3c346925919cb2d97ffd57f07fe1d3bee277b2371ed06440f290ca7337d478f6bd3fbfcfcaaf9c8f520a570485a4f2e38dca33a3832c629073643de077137befee8692168bbbd4fd289039e95dc56e886") bind$inet(r10, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0xef}, 0x10) ioctl$LOOP_SET_FD(r7, 0x4c00, r0) getpeername$packet(r7, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000015c0)=0x14) fsetxattr$trusted_overlay_opaque(r3, &(0x7f0000000400)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) sendto$inet(r10, 0x0, 0x0, 0x200007fd, &(0x7f00000001c0)={0x2, 0x4000000004e23}, 0x10) clone(0x2000000, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x804, 0x80000000) shutdown(r10, 0x40000000000001) ioctl$sock_inet_udp_SIOCINQ(r10, 0x541b, &(0x7f0000000100)) 06:17:36 executing program 1: pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x0, 0x6, 0x9, 0x6f3a, 0x8, 0x100, 0xfffffffffffffff7, 0x8, 0x5, 0x7, 0x10001, 0x7fffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) ioctl$TIOCSETD(r1, 0x540b, 0x0) [ 222.706425] audit: type=1400 audit(1568614656.580:55): avc: denied { write } for pid=7976 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 06:17:36 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7ff, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a1100008f2cd6cc62e13f10a5f31a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0fafa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x8000, 0x2) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:17:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0xcc) listen(r0, 0x800000fff) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, &(0x7f0000000240)={0x0, 0x0}) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0xf455b2b3b86ca7, 0x0) write$selinux_user(r1, &(0x7f0000000080)={'system_u:object_r:hald_var_run_t:s0', 0x20, 'sysadm_u\x00'}, 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) pipe(0x0) syz_open_procfs(0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_INFO(r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000001000"/20, @ANYRES32=0x0, @ANYBLOB="0000063e3b400000"]}}, 0x0) 06:17:36 executing program 3: r0 = socket(0x9, 0xa, 0xfffbfffffffffffd) write(r0, &(0x7f0000000200)="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", 0x59f) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) preadv(r2, &(0x7f0000000400)=[{&(0x7f0000000080)=""/96, 0x60}, {&(0x7f0000000100)=""/244, 0xf4}, {&(0x7f0000000300)=""/196, 0xc4}], 0x3, 0x2c) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1e, 0x0) setsockopt$sock_void(r1, 0x1, 0x29, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0xf85929ff39f3fae2, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) 06:17:36 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f00000000c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x2) lseek(r2, 0x0, 0x1) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000140)=0x1e) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 06:17:37 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @empty, 'bridge0\x00'}}, 0x1e) syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000040)={0x8001, 0x615, 0x1, 0x81}) ioctl$PPPOEIOCSFWD(r0, 0x40047452, &(0x7f00000000c0)={0x18, 0x0, {0x0, @broadcast, 'yam0\x00'}}) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:17:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r1}) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f00000000c0)=0x1, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0xe, 0x0, &(0x7f0000000080)="000000000000ffffffff00001000", 0x0, 0xdc}, 0x21) 06:17:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) writev(r0, &(0x7f0000000840)=[{&(0x7f0000000200)="d2594b6f848c6b11eb9b27fa7cef46f6c6978ed9dabd727968b533b9d80b5a34527f86b232653d734249ee31a96f7618b48def01e3e06e4ccc3eeed7afed5c3aab13f46e9c7e4babc490b44fcb2610273814a91645682d20a30c1659d34f88da154c1c952bf13efe723e04c15b7d323f377241d68c92460574a08adf683e178c5759536fabc4618cdc32865f", 0x8c}, {&(0x7f00000002c0)="8fea16203c03f9abf8df18b44fbb77fcb64e50fe7e725d59c21c2ba542831af5954997f8bfc0a39b3263963ae0972d381c0e87e343fb6c7fb0e3e9133da4f04f197ba5e2be6a9a54ecfc7344c133f3acf4c25a84625818a7698027c6ac60c6aecac130a90922e14c25a9ed94c6cf724099494e9effb6b6607a33b4d746fe9f48a4858039cfde45ee69db0328688c5f3169df3a26a82deee8c7f47cd598833cb8e8878ce6a1aad387da78d8c54d3e3efb1155ecd46ec001e5576a05d4a18fe4845c321e52ecfbdace1f6ddc47d42014", 0xcf}, {&(0x7f00000003c0)="7857d515b3ea3a235ad31def7738299b589fe778176a1049f882da13af5de03838196a002f84b2e6fa20be9ae444b0a06d5933c447364d8ae1328adeac51a4569ae542274571046ea8a75a58dcaf33d7b3932d16049eddb0eb0a6c79948171aa2e06a353d78c5bb78f7855b04d60f881ae44da9601b14183cfe5f5b9d6993156571ad2e17fffddec000442979e9267066797f41fc3090bbcc8816bee2462859e1e3b28c900f5129550134f1544088682466d6913ade23d2409be4db21b96985d8fe7bb75f306060716", 0xc9}, {&(0x7f0000000140)}, {&(0x7f0000000700)="4f2e65960c4ac46943625e38728e26df225d13044103365ca9d46183956aa8cbdf299fed78922b08c8832a91ae297056b57d8dd77967ecbabb94d6c4c4660aa92858523192882d53f05713ac284aac8ba8220bd24c", 0x55}, {&(0x7f0000001640)="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", 0x1000}, {&(0x7f0000002640)="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", 0x1000}, {&(0x7f0000000780)="40d3e0ceb0d64d21ce1d1797d4ffaec6fd2f1d5a684e4aacc090f3f65c7a9741519afbe666af6e2b35a1b5d9648ec07f9d35deeb7cd7b87d7a678381309408d9010a46572648a1259e5bb1372cad08c2beef2cee4bbc614781204a3946f4dcc233e991ce427a5c5dee6e8ec2a0a9bcfdf950d512b1573c801ce3218b077dd45b855993912494e2f21b5b2a2df6a068260c61564cecf9bd852d179e3d0b9d7157176f4a78b003718662e7d35dcf", 0xad}], 0x8) syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000001600)=[{&(0x7f0000000500)="418587fad094b3d184d9737d313bb01d2258dfdc367e47339876a6edd2212b334ea130e1b18fadd3015535b71b3c4b25856fc1319950e6b962aeead547a50d167a2530e47271b7ecbca536d21cb084a9c2aaf41b5680fd701d7a7465cef1ffa320de5324ef52d5549e041b9b9c4c5e2c20f95ddaf2e453243307d10ddf17a1a00e593c861d0674fb4a0be74e5fb5da62f136817521cff89f65f5e9b5c85d045af118c9c163d4379e796d0a467fb4f3e76c8a0aca62638506a84024f056703b78ca3282fca9e8a991dd5b9b794bb90a6c0642129c08cd4c0ff496c241b4918cbc5df4f55b1fb311470d4f1c3dbd7a8c0d767641f49a162f8e7c4f4fad37954f9b969f96e97006fa39d23c057a628293b468294f9eaf514690919fa5f3afb8f74ece3f1b9211e9af8c04a0c70f9e56097b3e9c1e7b4c3cacb9ef328d8f0ec853ad425d75a89379335095a8cc0d75e8b39536dd1aa2e1092c4d35660e1b896a68614b39179a4f86ecb3aeedd4b6a8f768bf025cbb6c2c2d3525cd02178692725a4ba61b4e6a4d446eaac81311721bba56894ab87583439afba7ebe8c8df3f71226c781f0ea3dfc163a177af03f217004e5e69bd8092086bf72f11350369302fde990ed32713fa1ab267afbcf74f7f8c18c25d244db08513ed4b31495158f5655ca990e8d81c0e256cb216f0a344f591113c1aecd2f99f02ecd0517d", 0x1fa, 0x6}], 0x8604, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x99040, 0x0) write$P9_RCREATE(r1, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0xe2e24dbffe194ad3, 0x0, 0x1}, 0xfffffffffffffffd}}, 0x18) [ 223.200214] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=35972 sclass=netlink_xfrm_socket pig=8015 comm=syz-executor.4 06:17:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200000, 0x0) ioctl$VIDIOC_S_CROP(r3, 0x4014563c, &(0x7f00000000c0)={0x5, {0x10000, 0x5, 0x7, 0x8}}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000040)={0x7b, 0x5, [0x6e0], [0xc1]}) r4 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x1ff, 0x20000) ioctl$VIDIOC_S_CROP(r4, 0x4014563c, &(0x7f0000000180)={0x2, {0xffffffff, 0xb635, 0x10000, 0x100}}) [ 223.282234] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=35972 sclass=netlink_xfrm_socket pig=8015 comm=syz-executor.4 06:17:37 executing program 4: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() capget(&(0x7f0000000080)={0x20080522, r1}, &(0x7f00000000c0)={0x3, 0x7f, 0x6, 0x3, 0x200, 0x7}) keyctl$search(0xa, r0, &(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0) 06:17:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000001c0)='./file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) unlink(&(0x7f0000000180)='./file0\x00') r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$CAPI_SET_FLAGS(0xffffffffffffffff, 0x80044324, &(0x7f0000000080)=0x1) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x12}, 0x2000000007}, 0x1c) sendmmsg(r1, &(0x7f0000006d00), 0x400000000000132, 0x10010) r2 = socket(0x40000000015, 0x5, 0x0) bind$rds(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) bind$inet(r2, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x8, 0x48400) setxattr$security_ima(&(0x7f0000000500)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040e6a9a9c7cb97f5910551f34a52e5e7b70b159555b06c7438276b6f86862340cd4c7ae829f8311d72df461944014b37de127309421a7bcf0c4f5ccdf369d23ac368f3969666897f456f362407761b9106042b11a9edbd9d03ab3620df20e794584d2818ea475c40d668f9dce75aa99903d8fda8ae8f55f"], 0x16, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) syz_open_procfs(0x0, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r4 = socket(0x40000000015, 0x5, 0x0) bind$rds(r4, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) bind$inet(r4, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) r5 = socket$inet(0xa, 0x801, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="01000004ea29b458178289025e087fad8c23438524aa17443b1178e5d787a024bba345b7156cd650102ecf017b8c09c5718b4d2cab109b385f62d1d357df40b0f15da4b339f3ba77632b19aca8c04c55b3bdf78066069eb2e280dfe2e513517297aa04eedc5d1ce46bc3a7e65fc49c72e9ca141451d901f59b48f38c62ab679aa9ae6dd2e8386edd6b6f03b6e65c14eff49a40ade29e1ad3c87c310002160e96c2d837504d101466353ea4bf900123365a9d72f86f0a90e088713449", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in=@local}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={r6, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) 06:17:37 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept(r0, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7a20, 0x4000) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGRS485(r2, 0x542e, &(0x7f0000000200)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r4, 0x701, 0x0, 0x0, {0xb, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xc4, r4, 0x8, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x64}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800}]}, @TIPC_NLA_BEARER={0x88, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xfffffffffffffff9, @rand_addr="a942a45c7ffe7039f9b8fa4963b01814", 0x5}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffff801}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffff81}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x40}, 0x64002040) 06:17:37 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4482, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4) write(r0, &(0x7f0000000340), 0x41395527) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0xfffffffffffffe47) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x9, 0x200300) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000140)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f00000002c0)=0xffffffffffffff0d) getresgid(&(0x7f0000000280), &(0x7f0000000300)=0x0, &(0x7f0000000340)) chown(&(0x7f00000000c0)='./file0\x00', r5, r6) chown(&(0x7f0000000100)='./file0\x00', r3, r6) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = accept$inet6(r7, 0x0, &(0x7f0000000480)) write(r7, &(0x7f0000000340), 0x41395527) r9 = socket(0x10, 0x2, 0x0) dup3(r8, r7, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r10, 0x0) geteuid() r11 = gettid() tkill(r11, 0x1000000000015) sendmsg$nl_generic(r7, &(0x7f0000000440)={&(0x7f0000000040), 0xc, &(0x7f0000000400)={&(0x7f0000000740)=ANY=[@ANYBLOB="3c0300001600000427bd7000fedbdf250a000000621b065bcf1c87028cd19bbd1fb2d6df1dd8e4e9408bf0661c467ffdcaa4133e39c72dbed2f79118b55c0f9e5342a2894faf786b13a7984657f9a10da2ba6e3acf065c53d985a07610d8555fcab79cc468e78785b7d04dab247dc4b370febc1e0f4fb1efacd6c47af8683987d30c72d12f2b47112de2ffa556ea7b10293319f7df120e7de77abe5df931893ef438064ee4954c3e7203d989c4880ee3079cabb992007689b9403c49c02325d36e1d980924ecb5fe4a706a0326feff7f0b68e99ae0f57ebdc00f1650a4a58744aa0021bbf9e25dbf1c3579f86dd9e5041cb3b305e8ec199083007e000b4cd113601f37d4f94d3c0095bd0c8b082f2a600a00000008005400040065000400370000001c00cd311f151559b2ceb06ef7cd3d2253a3ab5093aceb9cb09d3f150e25f6cbe2c377507289365c42edca3832ece7606aad03a63d38277918e7d6f646e4a1c5cedd16640150000400260014042800ff0200"/384], 0xfffffffffffffff8}, 0x1, 0x0, 0x0, 0x141}, 0x10000081) 06:17:37 executing program 3: pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f00000000c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0xf47624d8809d2d51, 0x1, 0x60}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0xfffffffffffffffc}, 0x10}, 0x70) 06:17:37 executing program 5: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) io_setup(0x30, &(0x7f0000000180)) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b653295096", 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r4, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 06:17:37 executing program 2: fchmod(0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x800, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000002c0)=ANY=[@ANYBLOB="870a04057f40010400000000000000000000000000000001fe800000003d939c39bc1348d10000aafe8000000000000000000000000000bbfe880000000000000000000000000101fe8000000000000000000000000000bb64628c8ce0dbdc050f229ff67ef111b6a2c080bbd3513c0378b4ee"], 0x58) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000080)=0x3) 06:17:37 executing program 0: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x58, &(0x7f0000000340)=[@in, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x0, 0x0, @local, 0x1e}]}, 0x0) r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) epoll_create1(0x80000) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f00000000c0)={0x20, 0x80, 0x1}) ioctl$NBD_DISCONNECT(r3, 0xab08) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000001600)={"f381b3cd7777fd6ef342ed71a88a8b6cb507caef8f06a3596ea41822f6c40a69bc1c8eb818cb2cdb19f7ba9f02948588cd9869dadd28db58d1f1fa7a662650ac355e5795e2a9e982b3b480d84148f9c337d94ebb7399d0cccf1dce3c7f7a887c9c9f03fd8c1ccc3fc79411ea292f1635dccb53fa127e175ba9c8f8153b5dbb3a6e57d37a30a4000a52ea863dc5466e915a68327aadd4a669fbf82d539101cb130512c85a12d22777b7fce9e91853906e5331e513607b891669269ee55ae2dc02e20911578a9e3bfc0b92d82a264f397c2add60dcb78a79e225b79269ef580835385ee74415656ff11c17a525e8cfab6e0ca3e2351004438e1bb2f939046362247223d9061e8a8a066cc023faea4491823f672b02ae02566968188b6bbe25aa3bcd1f728a90276600a5e7e0794ae17cbdd18893d494d4b0e687cf0a87ef7117d89a713ac4cc9f2469fffca1f461eb419de643afc38998140d6a79419e9f886654a0ca59f2a2d007bbd2940a5d2192ee02963792e1a825cd22da1359651acab9652abf1f030379a2b526615878d19cf73fd0c57d0008904cbe7bac84c4594667d4546ef677e7ca3980c8ed03c885150c02486c023fc4993687326132632209ce8c31cc6d7b6a28fe755599ac725b8b3e22b7281fa440fdaea8ee57ae1a149e5ddd0e2f1a1883d5da2bd1375d0c5a01927314dc4e6c51cdd768172aca374679fa80a697a8e445bc3539901d560fffe7587549d030b11558ac39c90ed5a65f3a5b96d2953654a3f7bc97a66c25cc4200ff6c8bc798742bd19aaac19266438956f49d4886516a7d9031df5171204c857a2d2efdf568645e8d5bf0000e7b3eb5acb5341f9a11263b8606074f57eaea282af41b5b6bb9e9f94629765febb600222cfcaa1e24efabacd501e71994b25bf9a05387fe9499fc2cded274a621dcbf9e22492d9e275a5fa9f2120073fc84c50c520a9eaea32a6a10b897099d962982420e91a9a24b6a8e5c90d8fd1b444b5c92393fab5885c77ffa8183a83d4eaee8cf17c5ad798ba24f4941070092749473618330b74640aac7ed293ed624fe8bee0e25159886dd36603f79458f640114e38ad7e84db28caa0960ced39e602f03b1f1dcea3b7f5b27ba505154b8cca239fcf599b786743371edde1dd9e14e39d515244b3637cb720cadda9ac2b6c166b84f1335c401402bbc616fc11f4c914bab25afe79fa051d6fc86efe993c7b124086583462ff49b4b9cc02991f06f1fdbc2a90fd366c23bcdf54a106046cf5d406400e19feacd32b1f9847f5dbb88b6241ca2cd1179eef83858659b5148d27148163eaadfc02f704debe4f7beff7c79b49b244d73a7ab680796cc3b1773699da7f44b14301028e1352d12b42ab2b21175a966274c9e6a6a7788cbf99d36aa0996c68084c7579672f68babe095ff83ac1638edbac85885"}) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000600)=""/4096) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000380)) 06:17:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001840)={&(0x7f0000000400)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00'}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x3, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000001480)='/dev/null\x00', 0x4c00, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001b00)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f00000015c0)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x8}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x10) io_setup(0xab9, &(0x7f0000001880)) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x80000001, 0x10000) sendmsg$IPVS_CMD_GET_DEST(r1, 0x0, 0x20000000) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000001a80)={&(0x7f0000001940)={0x10, 0x0, 0x0, 0x40040010}, 0xc, &(0x7f0000001a40)={&(0x7f0000001980)={0x7c, r2, 0x200, 0x0, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x873ce06ee5ac482d}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syz_tun\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x101}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40001}, 0x8000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() r3 = gettid() tkill(0x0, 0x0) prlimit64(r3, 0x1, &(0x7f0000000040)={0x9, 0xd}, &(0x7f0000000080)) syz_emit_ethernet(0x7a, &(0x7f0000000100)={@random="8d407b98297d", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, '5&h', 0x44, 0x2f, 0x0, @local, @local, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}}, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 06:17:38 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 06:17:38 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0xa0980, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0x80dc5521, &(0x7f0000000040)=0x2) syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) 06:17:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) shmat(0x0, &(0x7f0000001000/0x4000)=nil, 0x2000) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x8, @remote, 0x4}, {0xa, 0x1f, 0x0, @loopback, 0x7}, r4}}, 0x48) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000140)={@initdev}, &(0x7f0000000180)=0x14) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="36f60300", @ANYRES16=r1, @ANYRES16], 0x3}}, 0x0) 06:17:38 executing program 3: semget$private(0x0, 0x2000000010a, 0x0) r0 = semget$private(0x0, 0x2000000010a, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000000)=""/128) semop(r0, &(0x7f0000000080)=[{0x1, 0xfffffffb, 0x1000}, {0x3, 0x18ea4efe}, {0x3, 0x3, 0x1000}, {0x0, 0x4a, 0x1800}, {0x2, 0x2, 0x800}, {0x1, 0x100}, {0x2, 0x3, 0x1000}, {0x2, 0x80000001}], 0x34d) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r2 = accept4$ax25(0xffffffffffffffff, &(0x7f00000002c0)={{0x3, @null}, [@remote, @default, @remote, @netrom, @netrom, @default, @bcast, @null]}, &(0x7f0000000340)=0x48, 0x0) setsockopt$ax25_int(r2, 0x101, 0x5, &(0x7f0000000380)=0x3, 0x4) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000200)={0x9, 0x100, 0x3ff, 0x6}) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0xf0) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:ldconfig_cache_t:s0\x00', 0x26, 0x1) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$GETALL(r5, 0x0, 0xd, &(0x7f0000000000)=""/128) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) semop(r0, &(0x7f0000000280)=[{0x1, 0x6, 0x800}, {0x5, 0x2, 0x800}, {0x0, 0x0, 0x800}, {0x3, 0x80000000, 0x1000}, {0x367220ad11b61df1, 0x0, 0x2c00}], 0x2aaaaaaaaaaaad65) setsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000240)=0x8, 0x4) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180)={0x1, 0xdc}, 0x8) ioctl$VHOST_SET_VRING_BASE(r4, 0x4008af12, &(0x7f0000000400)={0x1, 0x100000000}) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f0000000440)=""/116, &(0x7f00000004c0)=0x74) 06:17:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x243, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x40, 0x24, 0x507, 0x0, 0x0, {0x0, r9, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pfifo_head_drop={{0x14, 0x1, 'pfifo_head_drop\x00'}, {0x8}}]}, 0x40}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r9, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x24, 0x8, [{{0x1c}, {0x4}}]}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x44d, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x40, 0x24, 0x507, 0x0, 0x0, {0x0, r9, {0x0, 0xa}, {0xffff, 0xffff}}}, 0x40}}, 0x0) getpeername$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r11, &(0x7f0000000340), 0x41395527) getpeername$packet(r11, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast1}}, &(0x7f0000000480)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'ip6gre0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000006640)={'vcan0\x00', 0x0}) r16 = socket$nl_route(0x10, 0x3, 0x0) r17 = socket$nl_route(0x10, 0x3, 0x0) r18 = socket$nl_route(0x10, 0x3, 0x0) r19 = socket$netlink(0x10, 0x3, 0x0) r20 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r20, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r20, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r19, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r21}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r18, &(0x7f0000000240)={0x0, 0x243, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x40, 0x24, 0x507, 0x0, 0x0, {0x0, r21, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pfifo_head_drop={{0x14, 0x1, 'pfifo_head_drop\x00'}, {0x8}}]}, 0x40}}, 0x0) sendmsg$nl_route_sched(r17, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r21, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x24, 0x8, [{{0x1c}, {0x4}}]}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r16, &(0x7f0000000240)={0x0, 0x44d, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x40, 0x24, 0x507, 0x0, 0x0, {0x0, r21, {0x0, 0xa}, {0xffff, 0xffff}}}, 0x40}}, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r22, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r22, 0x29, 0x23, &(0x7f0000006680)={{{@in=@multicast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000006780)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000067c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f00000068c0)=0xe8) r25 = socket$nl_route(0x10, 0x3, 0x0) r26 = socket$nl_route(0x10, 0x3, 0x0) r27 = socket$nl_route(0x10, 0x3, 0x0) r28 = socket$netlink(0x10, 0x3, 0x0) r29 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r29, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r29, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r28, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r30}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r27, &(0x7f0000000240)={0x0, 0x243, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x40, 0x24, 0x507, 0x0, 0x0, {0x0, r30, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pfifo_head_drop={{0x14, 0x1, 'pfifo_head_drop\x00'}, {0x8}}]}, 0x40}}, 0x0) sendmsg$nl_route_sched(r26, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r30, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x24, 0x8, [{{0x1c}, {0x4}}]}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r25, &(0x7f0000000240)={0x0, 0x44d, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x40, 0x24, 0x507, 0x0, 0x0, {0x0, r30, {0x0, 0xa}, {0xffff, 0xffff}}}, 0x40}}, 0x0) r31 = socket$nl_route(0x10, 0x3, 0x0) r32 = socket$nl_route(0x10, 0x3, 0x0) r33 = socket$nl_route(0x10, 0x3, 0x0) r34 = socket$netlink(0x10, 0x3, 0x0) r35 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r35, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r35, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r34, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r36}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r33, &(0x7f0000000240)={0x0, 0x243, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x40, 0x24, 0x507, 0x0, 0x0, {0x0, r36, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pfifo_head_drop={{0x14, 0x1, 'pfifo_head_drop\x00'}, {0x8}}]}, 0x40}}, 0x0) sendmsg$nl_route_sched(r32, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r36, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x24, 0x8, [{{0x1c}, {0x4}}]}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r31, &(0x7f0000000240)={0x0, 0x44d, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x40, 0x24, 0x507, 0x0, 0x0, {0x0, r36, {0x0, 0xa}, {0xffff, 0xffff}}}, 0x40}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000006d80)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000006d40)={&(0x7f0000006900)={0x424, r3, 0x920, 0x70bd28, 0x25dfdbfc, {}, [{{0x8, 0x1, r9}, {0x244, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2f3}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x80}}, {0x8, 0x6, r14}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x7fffffff, 0x7fcdaafd, 0x6, 0x1}, {0x81, 0x2, 0x3, 0xadec}, {0x800, 0x800, 0x6, 0x9a}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6982e30b}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r21}, {0xb4, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xe46}}}]}}, {{0x8, 0x1, r23}, {0xb8, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r30}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r36}}}]}}]}, 0x424}, 0x1, 0x0, 0x0, 0x20000000}, 0x40440c0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f00000000c0)=0x9) 06:17:38 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x165801) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000140)=0xfffffffffffffffa) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, 0xffffffffffffffff) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000740)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000640)="797ba96930fa0130a9a8a66150590db7e4d0d198140a0c641b6847e4db71fe5369c74e5f886962b514f4f7a5e6805c63da36a1f18187f009e1d0f1e0c21575c4a2d676b1141e84ebd49c823f4510c455a852f89c6ed1322fe2401f0fc37706fa8f7bbe9153ce0b9e3a54a8f309500c72f37eb3dd8bcf3e2e93ec8ea8db6903880811f4d8c39c01bef4d6e87541f508dc4540", 0x92, r2}, 0x68) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) bind$unix(r3, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) ioctl$LOOP_SET_STATUS64(r0, 0x127f, &(0x7f0000000000)={0xa00, 0x60a00, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "abb4291ede5e270dd3f0a272133483bbf2df4849c6faf88a21befeff0000000000000000000000000000008000000800000000000000bda5282df52e4cdf00", "141f99c942e13a0e4000000049d5d1f811b06bb5b30000fffffdffa531ff0000000000000000000000804000", "4bbcdb405f780000371887cf0061bd00000057000000002000"}) syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000280)='./file0\x00', 0x100000001, 0xaaaaaaaaaaaab77, &(0x7f0000000900)=[{&(0x7f00000002c0)="7daa0ea5aca941cba00c7a1efa5158b52b1385a846cfca25edd0c167f43ab1ca94e24e010a8fb977b838091e07b04e480fa126b32e31653293f7670401e9d89ebc6e141249a4b14612bdd85274090e3463f99966f143466d0e684b61cf3818af3ed112031eef9af6c534fbe90f16bb052014256a06058d36502b51b870f0180c113544fb925db94932145b1ad052d6ebbf413c2f5a421263f4ff554dc7ecda78242f626cfb9f27e7948f2141e500978bcb5d5ca78f61bc3b82", 0xb9, 0x5}, {&(0x7f0000000380)="ea81d27910a40283430e1a9a674754622c45dac3d60679c654af83a30b810132a9f532a839267be275acb5d99802c67e367fd97007eaa4b8f53b8f502a89a6a436ce40be474bde35151553b5d032cab302731e929d05fb190ae167de69ca51324164b55982040f686f8dec1a9cdc73af373c7b9876322ee93135973c95c170dacc7ecf27a75b8d13b99ca233d0a7ac4d845afcec2bc6d77d2ff717f0c944f5458077b543b4a227f14dbab3248a6f27267d7b6789ab27b4bdb6253014eb59d807fe0f68dac68b1a5cee6dea596e6df4a75e", 0xd1, 0x7f}, {&(0x7f0000000980)="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", 0x118}], 0x400008, &(0x7f0000000600)='/selinux/policy\x00') 06:17:40 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) tkill(r0, 0x13) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500001000000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:17:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x60000) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0x80044326, &(0x7f00000000c0)=0x7ff) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000080)="2e00000018008112e00f80ecdb4cb92e0a6073cf000cd302e8bd6efb120009000e0014a00200000005000500fe80", 0x2e}], 0x171, 0x0, 0x0, 0xa00}, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) utimensat(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x300) 06:17:40 executing program 3: syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x2000) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000340)={0xc08, 0x4bc, 0x0, 0x6}) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x80800) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) utimes(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{r0, r1/1000+10000}, {0x77359400}}) sendto$inet6(0xffffffffffffffff, &(0x7f00000003c0)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f9", 0xa3, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r2 = gettid() tkill(r2, 0x1000000000015) r3 = syz_open_procfs(r2, &(0x7f00000002c0)='net/dev_mcast\x00') ioctl$RTC_PIE_ON(r3, 0x7005) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$P9_RWALK(r4, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) ioctl$VFIO_CHECK_EXTENSION(r5, 0x3b65, 0x5) timerfd_create(0x3, 0x800) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) 06:17:40 executing program 5: ioctl(0xffffffffffffffff, 0x2001000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x0) close(r0) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x4) 06:17:40 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000540)=""/246) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ab8b}], 0x1, 0x6) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x10001, 0x0) sendto$isdn(r3, &(0x7f0000000100)={0x8001, 0x3, "5adfc5a20c5e779b100b17b9318c69bd4a9ec448ef1fa132c2cfeff6867d654f4302e169e489dbace31bf94c"}, 0x34, 0x4000, &(0x7f0000000180)={0x22, 0x1, 0x5, 0x5c26, 0xd9}, 0x6) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000140)=0x3) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000b80)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) write(r4, &(0x7f0000000340), 0x41395527) ioctl$PPPIOCSFLAGS1(r4, 0x40047459, &(0x7f0000000ac0)=0x41064) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000240)="002138ee8667320e37e4b927a1a6d688959f0e3b1df9", 0x16}], 0x1, 0x0) 06:17:40 executing program 1: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0xffffff15) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000da"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=@newqdisc={0x444, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x418, 0x2, [@TCA_CBQ_RTAB={0x404, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, @TCA_CBQ_RATE={0x10, 0x5, {0x5, 0x0, 0x0, 0x0, 0x0, 0x7f}}]}}]}, 0x444}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) connect(r1, &(0x7f0000000440)=@xdp={0x2c, 0x5, r5, 0x3f}, 0x80) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x105000, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x0, 0x0) write(r7, &(0x7f0000000340), 0x41395527) ioctl$NBD_SET_SOCK(r6, 0xab00, r7) [ 226.781560] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 226.788319] IPv6: NLM_F_CREATE should be set when creating new route [ 226.794836] IPv6: NLM_F_CREATE should be set when creating new route [ 226.839657] loop4: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p219 p [ 226.931648] sctp: [Deprecated]: syz-executor.5 (pid 8146) Use of int in maxseg socket option. [ 226.931648] Use struct sctp_assoc_value instead [ 226.950651] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 226.970896] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 226.979222] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 226.987758] loop4: p7 size 1073741824 extends beyond EOD, truncated [ 226.995774] loop4: p8 size 1073741824 extends beyond EOD, truncated [ 227.005378] loop4: p9 size 1073741824 extends beyond EOD, truncated [ 227.020056] loop4: p10 size 1073741824 extends beyond EOD, truncated 06:17:40 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x12) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x600000c, 0x20010, r1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x280, 0x0) [ 227.035306] loop4: p11 size 1073741824 extends beyond EOD, truncated [ 227.047716] loop4: p12 size 1073741824 extends beyond EOD, truncated [ 227.062726] loop4: p13 size 1073741824 extends beyond EOD, truncated [ 227.076834] loop4: p14 size 1073741824 extends beyond EOD, truncated [ 227.110780] loop4: p15 size 1073741824 extends beyond EOD, truncated [ 227.111788] audit: type=1804 audit(1568614660.980:56): pid=8158 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir435208983/syzkaller.2181lI/14/bus" dev="sda1" ino=16600 res=1 [ 227.148285] loop4: p16 size 1073741824 extends beyond EOD, truncated [ 227.161731] loop4: p17 size 1073741824 extends beyond EOD, truncated [ 227.173741] loop4: p18 size 1073741824 extends beyond EOD, truncated [ 227.183711] loop4: p19 size 1073741824 extends beyond EOD, truncated [ 227.194240] loop4: p20 size 1073741824 extends beyond EOD, truncated [ 227.200889] audit: type=1804 audit(1568614661.070:57): pid=8158 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir435208983/syzkaller.2181lI/14/bus" dev="sda1" ino=16600 res=1 [ 227.235196] loop4: p21 size 1073741824 extends beyond EOD, truncated [ 227.242971] loop4: p22 size 1073741824 extends beyond EOD, truncated [ 227.252433] loop4: p23 size 1073741824 extends beyond EOD, truncated [ 227.252825] audit: type=1804 audit(1568614661.130:58): pid=8158 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir435208983/syzkaller.2181lI/14/bus" dev="sda1" ino=16600 res=1 [ 227.291726] loop4: p24 size 1073741824 extends beyond EOD, truncated [ 227.294017] audit: type=1804 audit(1568614661.160:59): pid=8158 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir435208983/syzkaller.2181lI/14/bus" dev="sda1" ino=16600 res=1 [ 227.330126] loop4: p25 size 1073741824 extends beyond EOD, truncated [ 227.337908] loop4: p26 size 1073741824 extends beyond EOD, truncated [ 227.345479] loop4: p27 size 1073741824 extends beyond EOD, truncated [ 227.353399] loop4: p28 size 1073741824 extends beyond EOD, truncated 06:17:41 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x2001000008113, &(0x7f0000000180)="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") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x812, r0, 0x0) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000000)=0x8000, &(0x7f0000000040)=0x4) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) [ 227.361254] loop4: p29 size 1073741824 extends beyond EOD, truncated [ 227.374331] loop4: p30 size 1073741824 extends beyond EOD, truncated [ 227.383664] loop4: p31 size 1073741824 extends beyond EOD, truncated [ 227.399973] loop4: p32 size 1073741824 extends beyond EOD, truncated [ 227.409788] loop4: p33 size 1073741824 extends beyond EOD, truncated [ 227.417956] loop4: p34 size 1073741824 extends beyond EOD, truncated [ 227.430200] loop4: p35 size 1073741824 extends beyond EOD, truncated [ 227.436909] audit: type=1400 audit(1568614661.300:60): avc: denied { map } for pid=8162 comm="syz-executor.5" path="/dev/nullb0" dev="devtmpfs" ino=16707 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=blk_file permissive=1 [ 227.441212] audit: type=1400 audit(1568614661.320:61): avc: denied { map } for pid=8162 comm="syz-executor.5" path="socket:[30208]" dev="sockfs" ino=30208 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=rawip_socket permissive=1 [ 227.494014] loop4: p36 size 1073741824 extends beyond EOD, truncated [ 227.506998] loop4: p37 size 1073741824 extends beyond EOD, truncated 06:17:41 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0xa, 0x3, 0xff, &(0x7f0000000040)) modify_ldt$read_default(0x2, &(0x7f0000000000)=""/53, 0x35) [ 227.515215] loop4: p38 size 1073741824 extends beyond EOD, truncated [ 227.535537] loop4: p39 size 1073741824 extends beyond EOD, truncated [ 227.545232] loop4: p40 size 1073741824 extends beyond EOD, truncated 06:17:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="02000f00000a00000000ff07000000000000000000000000000000000000000000004200000000000000018000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x204000) ioctl$KVM_NMI(r0, 0xae9a) prctl$PR_SET_FPEMU(0xa, 0x1) [ 227.560356] loop4: p41 size 1073741824 extends beyond EOD, truncated [ 227.581308] loop4: p42 size 1073741824 extends beyond EOD, truncated 06:17:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x4, &(0x7f0000000400)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x11, 0x1a001000000}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0xc3100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x9}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 227.614605] loop4: p43 size 1073741824 extends beyond EOD, truncated 06:17:41 executing program 1: seccomp(0x0, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4000) connect$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001980), 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000540)={{0x3, 0x0, 0x2, 0x2}}) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000000)={0x0, 0x0, 0x4}) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 227.663594] syz-executor.1 (8139) used greatest stack depth: 22224 bytes left [ 227.674388] loop4: p44 size 1073741824 extends beyond EOD, truncated [ 227.683329] loop4: p45 size 1073741824 extends beyond EOD, truncated [ 227.691263] loop4: p46 size 1073741824 extends beyond EOD, truncated [ 227.692134] loop4: p47 size 1073741824 extends beyond EOD, truncated [ 227.693167] loop4: p48 size 1073741824 extends beyond EOD, truncated [ 227.694182] loop4: p49 size 1073741824 extends beyond EOD, truncated [ 227.695192] loop4: p50 size 1073741824 extends beyond EOD, truncated [ 227.696257] loop4: p51 size 1073741824 extends beyond EOD, truncated [ 227.697269] loop4: p52 size 1073741824 extends beyond EOD, truncated [ 227.698302] loop4: p53 size 1073741824 extends beyond EOD, truncated [ 227.759999] loop4: p54 size 1073741824 extends beyond EOD, truncated [ 227.775129] loop4: p55 size 1073741824 extends beyond EOD, truncated [ 227.785534] loop4: p56 size 1073741824 extends beyond EOD, truncated [ 227.806354] loop4: p57 size 1073741824 extends beyond EOD, truncated [ 227.828347] loop4: p58 size 1073741824 extends beyond EOD, truncated [ 227.842853] audit: type=1326 audit(1568614661.710:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8185 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c72a code=0x0 [ 227.901915] loop4: p59 size 1073741824 extends beyond EOD, truncated [ 227.918211] loop4: p60 size 1073741824 extends beyond EOD, truncated [ 227.935356] loop4: p61 size 1073741824 extends beyond EOD, truncated [ 227.952926] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 227.960649] loop4: p62 size 1073741824 extends beyond EOD, truncated [ 227.968789] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 227.977948] loop4: p63 size 1073741824 extends beyond EOD, truncated [ 227.994147] loop4: p64 size 1073741824 extends beyond EOD, truncated [ 227.999829] F2FS-fs (loop1): invalid crc value [ 228.011510] ldm_validate_privheads(): Disk read failed. [ 228.017756] loop4: p65 size 1073741824 extends beyond EOD, truncated [ 228.022210] loop0: p1 < > p3 [ 228.028290] loop0: partition table partially beyond EOD, truncated [ 228.034518] F2FS-fs (loop1): invalid crc value [ 228.042762] loop4: p66 size 1073741824 extends beyond EOD, truncated [ 228.044458] loop0: p1 size 2 extends beyond EOD, truncated [ 228.050132] F2FS-fs (loop1): Failed to get valid F2FS checkpoint [ 228.069986] loop4: p67 size 1073741824 extends beyond EOD, truncated [ 228.078779] loop4: p68 size 1073741824 extends beyond EOD, truncated [ 228.080782] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 228.094096] loop4: p69 size 1073741824 extends beyond EOD, truncated [ 228.104581] loop0: p3 size 32769 extends beyond EOD, truncated [ 228.112056] loop4: p70 size 1073741824 extends beyond EOD, truncated [ 228.120019] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 228.128182] loop4: p71 size 1073741824 extends beyond EOD, truncated [ 228.135827] F2FS-fs (loop1): invalid crc value [ 228.141275] loop4: p72 size 1073741824 extends beyond EOD, truncated [ 228.148180] F2FS-fs (loop1): invalid crc value [ 228.166742] loop4: p73 size 1073741824 extends beyond EOD, truncated [ 228.177958] F2FS-fs (loop1): Failed to get valid F2FS checkpoint [ 228.186933] loop4: p74 size 1073741824 extends beyond EOD, truncated [ 228.194580] loop4: p75 size 1073741824 extends beyond EOD, truncated [ 228.202062] loop4: p76 size 1073741824 extends beyond EOD, truncated [ 228.215086] loop4: p77 size 1073741824 extends beyond EOD, truncated [ 228.224813] loop4: p78 size 1073741824 extends beyond EOD, truncated [ 228.232296] loop4: p79 size 1073741824 extends beyond EOD, truncated [ 228.239696] loop4: p80 size 1073741824 extends beyond EOD, truncated [ 228.248723] loop4: p81 size 1073741824 extends beyond EOD, truncated [ 228.260958] loop4: p82 size 1073741824 extends beyond EOD, truncated [ 228.271106] loop4: p83 size 1073741824 extends beyond EOD, truncated [ 228.288141] loop4: p84 size 1073741824 extends beyond EOD, truncated [ 228.305659] loop4: p85 size 1073741824 extends beyond EOD, truncated [ 228.319884] loop4: p86 size 1073741824 extends beyond EOD, truncated [ 228.337409] loop4: p87 size 1073741824 extends beyond EOD, truncated [ 228.351269] loop4: p88 size 1073741824 extends beyond EOD, truncated [ 228.363603] loop4: p89 size 1073741824 extends beyond EOD, truncated [ 228.372415] loop4: p90 size 1073741824 extends beyond EOD, truncated [ 228.380576] loop4: p91 size 1073741824 extends beyond EOD, truncated [ 228.392782] loop4: p92 size 1073741824 extends beyond EOD, truncated [ 228.401319] loop4: p93 size 1073741824 extends beyond EOD, truncated [ 228.409695] loop4: p94 size 1073741824 extends beyond EOD, truncated [ 228.417888] loop4: p95 size 1073741824 extends beyond EOD, truncated [ 228.425459] loop4: p96 size 1073741824 extends beyond EOD, truncated [ 228.433745] loop4: p97 size 1073741824 extends beyond EOD, truncated [ 228.442562] loop4: p98 size 1073741824 extends beyond EOD, truncated [ 228.450671] loop4: p99 size 1073741824 extends beyond EOD, truncated [ 228.458299] loop4: p100 size 1073741824 extends beyond EOD, truncated [ 228.465648] loop4: p101 size 1073741824 extends beyond EOD, truncated [ 228.473382] loop4: p102 size 1073741824 extends beyond EOD, truncated [ 228.480874] loop4: p103 size 1073741824 extends beyond EOD, truncated [ 228.643897] audit: type=1326 audit(1568614662.510:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8185 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c72a code=0x0 [ 228.695220] kobject: 'loop1' (0000000031b40c47): kobject_uevent_env [ 228.695258] kobject: 'loop1' (0000000031b40c47): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 333.475987] rcu: INFO: rcu_preempt self-detected stall on CPU [ 333.476185] rcu: 0-....: (10500 ticks this GP) idle=0ee/1/0x4000000000000004 softirq=15189/15189 fqs=5249 [ 333.476250] rcu: (t=10501 jiffies g=8673 q=645) [ 333.476260] NMI backtrace for cpu 0 [ 333.476269] CPU: 0 PID: 8137 Comm: syz-executor.4 Not tainted 4.19.72 #0 [ 333.476274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.476277] Call Trace: [ 333.476281] [ 333.476359] dump_stack+0x172/0x1f0 [ 333.476372] nmi_cpu_backtrace.cold+0x63/0xa4 [ 333.476408] ? lapic_can_unplug_cpu.cold+0x45/0x45 [ 333.476417] nmi_trigger_cpumask_backtrace+0x1b0/0x1f8 [ 333.476427] arch_trigger_cpumask_backtrace+0x14/0x20 [ 333.476461] rcu_dump_cpu_stacks+0x189/0x1d5 [ 333.476474] rcu_check_callbacks.cold+0x5e3/0xd90 [ 333.476497] ? trace_hardirqs_off+0x62/0x220 [ 333.476524] update_process_times+0x32/0x80 [ 333.476546] tick_sched_handle+0xa2/0x190 [ 333.476555] tick_sched_timer+0x47/0x130 [ 333.476565] __hrtimer_run_queues+0x33b/0xdc0 [ 333.476575] ? tick_sched_do_timer+0x1b0/0x1b0 [ 333.476586] ? hrtimer_fixup_activate+0x30/0x30 [ 333.476606] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 333.476614] ? ktime_get_update_offsets_now+0x2d3/0x440 [ 333.476627] hrtimer_interrupt+0x314/0x770 [ 333.476652] smp_apic_timer_interrupt+0x111/0x550 [ 333.476662] apic_timer_interrupt+0xf/0x20 [ 333.476702] RIP: 0010:__list_add_valid+0x2b/0xa0 [ 333.476714] Code: b8 00 00 00 00 00 fc ff df 55 48 89 e5 41 55 49 89 fd 48 8d 7a 08 41 54 49 89 d4 48 89 fa 48 83 ec 08 48 c1 ea 03 80 3c 02 00 <75> 52 49 8b 54 24 08 48 39 f2 0f 85 5a 01 00 00 48 b8 00 00 00 00 [ 333.476719] RSP: 0018:ffff8880ae807540 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 333.476728] RAX: dffffc0000000000 RBX: ffff888082f9b4f8 RCX: ffffffff858e7de6 [ 333.476733] RDX: 1ffff110105f36b3 RSI: ffff888082f9b590 RDI: ffff888082f9b598 [ 333.476738] RBP: ffff8880ae807558 R08: ffff88804daec180 R09: 0000000000000007 [ 333.476742] R10: ffff88804daecb18 R11: 0000000070128242 R12: ffff888082f9b590 [ 333.476747] R13: ffff888082f9b4f8 R14: ffff888082f9b598 R15: ffff888082f9b590 [ 333.476756] ? apic_timer_interrupt+0xa/0x20 [ 333.476797] ? hhf_dequeue+0x5b6/0xa00 [ 333.476809] hhf_dequeue+0x652/0xa00 [ 333.476846] __qdisc_run+0x1e7/0x1960 [ 333.476890] __dev_queue_xmit+0x165c/0x2fe0 [ 333.476910] ? mark_held_locks+0x100/0x100 [ 333.476922] ? netdev_pick_tx+0x300/0x300 [ 333.476970] ? ip6_finish_output+0x574/0xbe0 [ 333.476991] ? find_held_lock+0x35/0x130 [ 333.477001] ? ip6_finish_output+0x574/0xbe0 [ 333.477010] ? mark_held_locks+0xb1/0x100 [ 333.477020] ? ip6_finish_output2+0x1784/0x2550 [ 333.477027] ? ip6_finish_output+0x574/0xbe0 [ 333.477035] ? ip6_finish_output2+0x1784/0x2550 [ 333.477046] dev_queue_xmit+0x18/0x20 [ 333.477054] ? dev_queue_xmit+0x18/0x20 [ 333.477062] ip6_finish_output2+0x12fd/0x2550 [ 333.477076] ? ip6_forward_finish+0x4d0/0x4d0 [ 333.477084] ? lock_downgrade+0x810/0x810 [ 333.477110] ? kasan_check_read+0x11/0x20 [ 333.477122] ip6_finish_output+0x574/0xbe0 [ 333.477131] ? ip6_finish_output+0x574/0xbe0 [ 333.477142] ip6_output+0x235/0x7c0 [ 333.477152] ? ip6_finish_output+0xbe0/0xbe0 [ 333.477163] ? ip6_fragment+0x3770/0x3770 [ 333.477189] ndisc_send_skb+0xf3b/0x1460 [ 333.477202] ? nf_hook.constprop.0+0x560/0x560 [ 333.477215] ? memcpy+0x46/0x50 [ 333.477224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.477234] ndisc_send_rs+0x134/0x6d0 [ 333.477244] addrconf_rs_timer+0x30f/0x680 [ 333.477254] ? ipv6_get_lladdr+0x490/0x490 [ 333.477267] call_timer_fn+0x18d/0x720 [ 333.477280] ? ipv6_get_lladdr+0x490/0x490 [ 333.477288] ? process_timeout+0x40/0x40 [ 333.477296] ? run_timer_softirq+0x647/0x1700 [ 333.477306] ? trace_hardirqs_on+0x67/0x220 [ 333.477314] ? kasan_check_read+0x11/0x20 [ 333.477322] ? ipv6_get_lladdr+0x490/0x490 [ 333.477331] run_timer_softirq+0x652/0x1700 [ 333.477347] ? add_timer+0xbe0/0xbe0 [ 333.477356] ? __lock_is_held+0xb6/0x140 [ 333.477371] __do_softirq+0x25c/0x921 [ 333.477378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.477386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.477424] irq_exit+0x180/0x1d0 [ 333.477433] smp_apic_timer_interrupt+0x13b/0x550 [ 333.477443] apic_timer_interrupt+0xf/0x20 [ 333.477446] [ 333.477466] RIP: 0010:console_unlock+0xc25/0x10b0 [ 333.477474] Code: fc ff df 48 c1 e8 03 80 3c 08 00 0f 85 47 04 00 00 48 83 3d 04 d7 1c 07 00 0f 84 9b 02 00 00 e8 81 e7 15 00 48 8b 7d 98 57 9d <0f> 1f 44 00 00 e9 64 ff ff ff e8 6c e7 15 00 48 8b 7d 08 c7 05 6e [ 333.477478] RSP: 0018:ffff88804daf75c8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 333.477487] RAX: 0000000000040000 RBX: 0000000000000200 RCX: ffffc9000e6c3000 [ 333.477491] RDX: 0000000000040000 RSI: ffffffff81556f0f RDI: 0000000000000246 [ 333.477496] RBP: ffff88804daf7650 R08: ffff88804daec180 R09: ffff88804daeca48 [ 333.477501] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 333.477505] R13: ffffffff8410dea0 R14: 0000000000000049 R15: ffffffff88d78fd0 [ 333.477543] ? netconsole_netdev_event+0x280/0x280 [ 333.477554] ? console_unlock+0xc1f/0x10b0 [ 333.477571] vprintk_emit+0x238/0x690 [ 333.477582] vprintk_default+0x28/0x30 [ 333.477591] vprintk_func+0x7e/0x189 [ 333.477600] printk+0xba/0xed [ 333.477609] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 333.477619] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 333.477661] ? drop_partitions.isra.0.part.0+0x130/0x130 [ 333.477669] ? disk_unlock_native_capacity+0x124/0x146 [ 333.477680] disk_unlock_native_capacity+0x133/0x146 [ 333.477690] rescan_partitions.cold+0x1b7/0x212 [ 333.477705] __blkdev_reread_part+0x1a2/0x230 [ 333.477714] blkdev_reread_part+0x27/0x40 [ 333.477759] loop_reread_partitions+0x1c/0x40 [ 333.477767] loop_set_status+0xe54/0x1370 [ 333.477779] loop_set_status64+0xc2/0x120 [ 333.477787] ? loop_set_status_old+0x330/0x330 [ 333.477832] ? avc_has_extended_perms+0xa78/0x10f0 [ 333.477845] lo_ioctl+0x432/0x20e0 [ 333.477855] ? lo_rw_aio+0x1470/0x1470 [ 333.477864] blkdev_ioctl+0xc38/0x1ab6 [ 333.477872] ? blkpg_ioctl+0xa90/0xa90 [ 333.477880] ? find_held_lock+0x35/0x130 [ 333.477889] ? debug_check_no_obj_freed+0x200/0x464 [ 333.477914] ? __fget+0x340/0x540 [ 333.477939] block_ioctl+0xee/0x130 [ 333.477946] ? blkdev_fallocate+0x410/0x410 [ 333.477966] do_vfs_ioctl+0xd5f/0x1380 [ 333.477985] ? selinux_file_ioctl+0x46f/0x5e0 [ 333.477993] ? selinux_file_ioctl+0x125/0x5e0 [ 333.478001] ? ioctl_preallocate+0x210/0x210 [ 333.478009] ? selinux_file_mprotect+0x620/0x620 [ 333.478020] ? iterate_fd+0x360/0x360 [ 333.478051] ? do_sys_open+0x31d/0x550 [ 333.478063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.478070] ? security_file_ioctl+0x8d/0xc0 [ 333.478079] ksys_ioctl+0xab/0xd0 [ 333.478088] __x64_sys_ioctl+0x73/0xb0 [ 333.478114] do_syscall_64+0xfd/0x620 [ 333.478124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.478131] RIP: 0033:0x459757 [ 333.478140] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.478144] RSP: 002b:00007efecd6ce9f8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 333.478152] RAX: ffffffffffffffda RBX: 00007efecd6cf6d4 RCX: 0000000000459757 [ 333.478156] RDX: 00007efecd6ceab0 RSI: 0000000000004c04 RDI: 0000000000000005 [ 333.478161] RBP: 00000000000001bf R08: 0000000000000000 R09: 000000000000000a [ 333.478165] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000004 [ 333.478169] R13: 0000000000000004 R14: 0000000000000005 R15: 00000000ffffffff [ 333.755985] rcu: INFO: rcu_sched detected stalls on CPUs/tasks: [ 333.756018] rcu: 0-....: (10539 ticks this GP) idle=0ee/1/0x4000000000000002 softirq=15172/15189 fqs=5250 [ 333.756022] rcu: (detected by 1, t=10502 jiffies, g=-915, q=2) [ 333.756042] Sending NMI from CPU 1 to CPUs 0: [ 333.757346] INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 1.068 msecs [ 333.757525] NMI backtrace for cpu 0 [ 333.757531] CPU: 0 PID: 8137 Comm: syz-executor.4 Not tainted 4.19.72 #0 [ 333.757536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.757540] RIP: 0010:__list_add_valid+0x0/0xa0 [ 333.757551] Code: 49 89 fc e8 22 92 45 fe 4c 89 e6 48 c7 c7 40 48 82 87 e8 33 fd ff ff 41 5c 5d c3 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <48> b8 00 00 00 00 00 fc ff df 55 48 89 e5 41 55 49 89 fd 48 8d 7a [ 333.757554] RSP: 0018:ffff8880ae807560 EFLAGS: 00000246 [ 333.757562] RAX: 1ffff110105f36b3 RBX: ffff888082f9b4f8 RCX: ffffffff858e7de6 [ 333.757567] RDX: ffff888082f9b590 RSI: ffff888082f9b590 RDI: ffff888082f9b4f8 [ 333.757572] RBP: ffff8880ae8075b8 R08: ffff88804daec180 R09: 0000000000000007 [ 333.757577] R10: ffff88804daecb18 R11: 0000000070128242 R12: dffffc0000000000 [ 333.757582] R13: ffff888082f9b240 R14: ffff888082f9b598 R15: ffff888082f9b590 [ 333.757587] FS: 00007efecd6cf700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 333.757592] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 333.757597] CR2: 00007f3d732244a0 CR3: 0000000086af6000 CR4: 00000000001406f0 [ 333.757602] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 333.757606] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 333.757609] Call Trace: [ 333.757611] [ 333.757615] ? hhf_dequeue+0x652/0xa00 [ 333.757618] __qdisc_run+0x1e7/0x1960 [ 333.757622] __dev_queue_xmit+0x165c/0x2fe0 [ 333.757625] ? mark_held_locks+0x100/0x100 [ 333.757628] ? netdev_pick_tx+0x300/0x300 [ 333.757632] ? ip6_finish_output+0x574/0xbe0 [ 333.757635] ? find_held_lock+0x35/0x130 [ 333.757639] ? ip6_finish_output+0x574/0xbe0 [ 333.757642] ? mark_held_locks+0xb1/0x100 [ 333.757646] ? ip6_finish_output2+0x1784/0x2550 [ 333.757649] ? ip6_finish_output+0x574/0xbe0 [ 333.757653] ? ip6_finish_output2+0x1784/0x2550 [ 333.757656] dev_queue_xmit+0x18/0x20 [ 333.757660] ? dev_queue_xmit+0x18/0x20 [ 333.757663] ip6_finish_output2+0x12fd/0x2550 [ 333.757667] ? ip6_forward_finish+0x4d0/0x4d0 [ 333.757670] ? lock_downgrade+0x810/0x810 [ 333.757673] ? kasan_check_read+0x11/0x20 [ 333.757677] ip6_finish_output+0x574/0xbe0 [ 333.757680] ? ip6_finish_output+0x574/0xbe0 [ 333.757683] ip6_output+0x235/0x7c0 [ 333.757687] ? ip6_finish_output+0xbe0/0xbe0 [ 333.757690] ? ip6_fragment+0x3770/0x3770 [ 333.757693] ndisc_send_skb+0xf3b/0x1460 [ 333.757697] ? nf_hook.constprop.0+0x560/0x560 [ 333.757700] ? memcpy+0x46/0x50 [ 333.757704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.757707] ndisc_send_rs+0x134/0x6d0 [ 333.757710] addrconf_rs_timer+0x30f/0x680 [ 333.757714] ? ipv6_get_lladdr+0x490/0x490 [ 333.757717] call_timer_fn+0x18d/0x720 [ 333.757721] ? ipv6_get_lladdr+0x490/0x490 [ 333.757724] ? process_timeout+0x40/0x40 [ 333.757727] ? run_timer_softirq+0x647/0x1700 [ 333.757731] ? trace_hardirqs_on+0x67/0x220 [ 333.757734] ? kasan_check_read+0x11/0x20 [ 333.757738] ? ipv6_get_lladdr+0x490/0x490 [ 333.757741] run_timer_softirq+0x652/0x1700 [ 333.757745] ? add_timer+0xbe0/0xbe0 [ 333.757748] ? __lock_is_held+0xb6/0x140 [ 333.757751] __do_softirq+0x25c/0x921 [ 333.757755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.757759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.757762] irq_exit+0x180/0x1d0 [ 333.757766] smp_apic_timer_interrupt+0x13b/0x550 [ 333.757769] apic_timer_interrupt+0xf/0x20 [ 333.757772] [ 333.757776] RIP: 0010:console_unlock+0xc25/0x10b0 [ 333.757786] Code: fc ff df 48 c1 e8 03 80 3c 08 00 0f 85 47 04 00 00 48 83 3d 04 d7 1c 07 00 0f 84 9b 02 00 00 e8 81 e7 15 00 48 8b 7d 98 57 9d <0f> 1f 44 00 00 e9 64 ff ff ff e8 6c e7 15 00 48 8b 7d 08 c7 05 6e [ 333.757789] RSP: 0018:ffff88804daf75c8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 333.757798] RAX: 0000000000040000 RBX: 0000000000000200 RCX: ffffc9000e6c3000 [ 333.757802] RDX: 0000000000040000 RSI: ffffffff81556f0f RDI: 0000000000000246 [ 333.757807] RBP: ffff88804daf7650 R08: ffff88804daec180 R09: ffff88804daeca48 [ 333.757812] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 333.757817] R13: ffffffff8410dea0 R14: 0000000000000049 R15: ffffffff88d78fd0 [ 333.757820] ? netconsole_netdev_event+0x280/0x280 [ 333.757824] ? console_unlock+0xc1f/0x10b0 [ 333.757827] vprintk_emit+0x238/0x690 [ 333.757830] vprintk_default+0x28/0x30 [ 333.757833] vprintk_func+0x7e/0x189 [ 333.757836] printk+0xba/0xed [ 333.757840] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 333.757844] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 333.757848] ? drop_partitions.isra.0.part.0+0x130/0x130 [ 333.757851] ? disk_unlock_native_capacity+0x124/0x146 [ 333.757855] disk_unlock_native_capacity+0x133/0x146 [ 333.757859] rescan_partitions.cold+0x1b7/0x212 [ 333.757863] __blkdev_reread_part+0x1a2/0x230 [ 333.757866] blkdev_reread_part+0x27/0x40 [ 333.757870] loop_reread_partitions+0x1c/0x40 [ 333.757873] loop_set_status+0xe54/0x1370 [ 333.757877] loop_set_status64+0xc2/0x120 [ 333.757880] ? loop_set_status_old+0x330/0x330 [ 333.757884] ? avc_has_extended_perms+0xa78/0x10f0 [ 333.757887] lo_ioctl+0x432/0x20e0 [ 333.757890] ? lo_rw_aio+0x1470/0x1470 [ 333.757894] blkdev_ioctl+0xc38/0x1ab6 [ 333.757897] ? blkpg_ioctl+0xa90/0xa90 [ 333.757900] ? find_held_lock+0x35/0x130 [ 333.757904] ? debug_check_no_obj_freed+0x200/0x464 [ 333.757907] ? __fget+0x340/0x540 [ 333.757910] block_ioctl+0xee/0x130 [ 333.757914] ? blkdev_fallocate+0x410/0x410 [ 333.757917] do_vfs_ioctl+0xd5f/0x1380 [ 333.757920] ? selinux_file_ioctl+0x46f/0x5e0 [ 333.757924] ? selinux_file_ioctl+0x125/0x5e0 [ 333.757927] ? ioctl_preallocate+0x210/0x210 [ 333.757931] ? selinux_file_mprotect+0x620/0x620 [ 333.757934] ? iterate_fd+0x360/0x360 [ 333.757938] ? do_sys_open+0x31d/0x550 [ 333.757942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.757945] ? security_file_ioctl+0x8d/0xc0 [ 333.757948] ksys_ioctl+0xab/0xd0 [ 333.757952] __x64_sys_ioctl+0x73/0xb0 [ 333.757955] do_syscall_64+0xfd/0x620 [ 333.757959] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.757962] RIP: 0033:0x459757 [ 333.757972] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.757976] RSP: 002b:00007efecd6ce9f8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 333.757984] RAX: ffffffffffffffda RBX: 00007efecd6cf6d4 RCX: 0000000000459757 [ 333.757989] RDX: 00007efecd6ceab0 RSI: 0000000000004c04 RDI: 0000000000000005 [ 333.757994] RBP: 00000000000001bf R08: 0000000000000000 R09: 000000000000000a [ 333.757999] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000004 [ 333.758003] R13: 0000000000000004 R14: 0000000000000005 R15: 00000000ffffffff [ 474.277022] watchdog: BUG: soft lockup - CPU#0 stuck for 123s! [syz-executor.4:8137] [ 474.277029] Modules linked in: [ 474.277039] irq event stamp: 85793 [ 474.277064] hardirqs last enabled at (85792): [] trace_hardirqs_on_thunk+0x1a/0x1c [ 474.277079] hardirqs last disabled at (85793): [] trace_hardirqs_off_thunk+0x1a/0x1c [ 474.277159] softirqs last enabled at (36516): [] peernet2id+0x91/0xc0 [ 474.277177] softirqs last disabled at (36555): [] irq_exit+0x180/0x1d0 [ 474.277194] CPU: 0 PID: 8137 Comm: syz-executor.4 Not tainted 4.19.72 #0 [ 474.277202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.277218] RIP: 0010:hhf_dequeue+0x5b6/0xa00 [ 474.277234] Code: d2 0f 85 32 04 00 00 45 0f af b5 d4 02 00 00 48 89 df 45 01 fe 44 89 73 10 e8 56 47 97 fd 31 ff 41 89 c6 89 c6 e8 ea d9 dc fb <45> 84 f6 74 63 e8 a0 d8 dc fb 48 89 d8 48 c1 e8 03 42 80 3c 20 00 [ 474.277241] RSP: 0018:ffff8880ae807568 EFLAGS: 00000206 ORIG_RAX: ffffffffffffff13 [ 474.277257] RAX: 0000000000000502 RBX: ffff888082f9b4f8 RCX: ffffffff858e7de6 [ 474.277265] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000001 [ 474.277274] RBP: ffff8880ae8075b8 R08: ffff88804daec180 R09: 0000000000000007 [ 474.277282] R10: ffff88804daecb18 R11: 0000000070128242 R12: dffffc0000000000 [ 474.277290] R13: ffff888082f9b240 R14: 0000000000000001 R15: 0000000000000000 [ 474.277302] FS: 00007efecd6cf700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 474.277311] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 474.277319] CR2: 00007f3d732244a0 CR3: 0000000086af6000 CR4: 00000000001406f0 [ 474.277331] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 474.277339] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 474.277344] Call Trace: [ 474.277351] [ 474.277383] __qdisc_run+0x1e7/0x1960 [ 474.277412] __dev_queue_xmit+0x165c/0x2fe0 [ 474.277426] ? mark_held_locks+0x100/0x100 [ 474.277447] ? netdev_pick_tx+0x300/0x300 [ 474.277465] ? ip6_finish_output+0x574/0xbe0 [ 474.277482] ? find_held_lock+0x35/0x130 [ 474.277498] ? ip6_finish_output+0x574/0xbe0 [ 474.277515] ? mark_held_locks+0xb1/0x100 [ 474.277531] ? ip6_finish_output2+0x1784/0x2550 [ 474.277544] ? ip6_finish_output+0x574/0xbe0 [ 474.277558] ? ip6_finish_output2+0x1784/0x2550 [ 474.277578] dev_queue_xmit+0x18/0x20 [ 474.277591] ? dev_queue_xmit+0x18/0x20 [ 474.277606] ip6_finish_output2+0x12fd/0x2550 [ 474.277630] ? ip6_forward_finish+0x4d0/0x4d0 [ 474.277645] ? lock_downgrade+0x810/0x810 [ 474.277663] ? kasan_check_read+0x11/0x20 [ 474.277686] ip6_finish_output+0x574/0xbe0 [ 474.277700] ? ip6_finish_output+0x574/0xbe0 [ 474.277720] ip6_output+0x235/0x7c0 [ 474.277738] ? ip6_finish_output+0xbe0/0xbe0 [ 474.277757] ? ip6_fragment+0x3770/0x3770 [ 474.277781] ndisc_send_skb+0xf3b/0x1460 [ 474.277803] ? nf_hook.constprop.0+0x560/0x560 [ 474.277826] ? memcpy+0x46/0x50 [ 474.277843] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.277861] ndisc_send_rs+0x134/0x6d0 [ 474.277879] addrconf_rs_timer+0x30f/0x680 [ 474.277898] ? ipv6_get_lladdr+0x490/0x490 [ 474.277921] call_timer_fn+0x18d/0x720 [ 474.277935] ? ipv6_get_lladdr+0x490/0x490 [ 474.277944] ? process_timeout+0x40/0x40 [ 474.277951] ? run_timer_softirq+0x647/0x1700 [ 474.277963] ? trace_hardirqs_on+0x67/0x220 [ 474.277970] ? kasan_check_read+0x11/0x20 [ 474.277978] ? ipv6_get_lladdr+0x490/0x490 [ 474.277987] run_timer_softirq+0x652/0x1700 [ 474.277999] ? add_timer+0xbe0/0xbe0 [ 474.278008] ? __lock_is_held+0xb6/0x140 [ 474.278024] __do_softirq+0x25c/0x921 [ 474.278032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.278040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.278053] irq_exit+0x180/0x1d0 [ 474.278062] smp_apic_timer_interrupt+0x13b/0x550 [ 474.278072] apic_timer_interrupt+0xf/0x20 [ 474.278075] [ 474.278084] RIP: 0010:console_unlock+0xc25/0x10b0 [ 474.278092] Code: fc ff df 48 c1 e8 03 80 3c 08 00 0f 85 47 04 00 00 48 83 3d 04 d7 1c 07 00 0f 84 9b 02 00 00 e8 81 e7 15 00 48 8b 7d 98 57 9d <0f> 1f 44 00 00 e9 64 ff ff ff e8 6c e7 15 00 48 8b 7d 08 c7 05 6e [ 474.278096] RSP: 0018:ffff88804daf75c8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 474.278104] RAX: 0000000000040000 RBX: 0000000000000200 RCX: ffffc9000e6c3000 [ 474.278108] RDX: 0000000000040000 RSI: ffffffff81556f0f RDI: 0000000000000246 [ 474.278113] RBP: ffff88804daf7650 R08: ffff88804daec180 R09: ffff88804daeca48 [ 474.278117] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 474.278122] R13: ffffffff8410dea0 R14: 0000000000000049 R15: ffffffff88d78fd0 [ 474.278131] ? netconsole_netdev_event+0x280/0x280 [ 474.278142] ? console_unlock+0xc1f/0x10b0 [ 474.278159] vprintk_emit+0x238/0x690 [ 474.278170] vprintk_default+0x28/0x30 [ 474.278179] vprintk_func+0x7e/0x189 [ 474.278188] printk+0xba/0xed [ 474.278196] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 474.278206] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 474.278220] ? drop_partitions.isra.0.part.0+0x130/0x130 [ 474.278227] ? disk_unlock_native_capacity+0x124/0x146 [ 474.278238] disk_unlock_native_capacity+0x133/0x146 [ 474.278248] rescan_partitions.cold+0x1b7/0x212 [ 474.278263] __blkdev_reread_part+0x1a2/0x230 [ 474.278272] blkdev_reread_part+0x27/0x40 [ 474.278282] loop_reread_partitions+0x1c/0x40 [ 474.278291] loop_set_status+0xe54/0x1370 [ 474.278302] loop_set_status64+0xc2/0x120 [ 474.278310] ? loop_set_status_old+0x330/0x330 [ 474.278332] ? avc_has_extended_perms+0xa78/0x10f0 [ 474.278344] lo_ioctl+0x432/0x20e0 [ 474.278354] ? lo_rw_aio+0x1470/0x1470 [ 474.278370] blkdev_ioctl+0xc38/0x1ab6 [ 474.278378] ? blkpg_ioctl+0xa90/0xa90 [ 474.278386] ? find_held_lock+0x35/0x130 [ 474.278396] ? debug_check_no_obj_freed+0x200/0x464 [ 474.278407] ? __fget+0x340/0x540 [ 474.278421] block_ioctl+0xee/0x130 [ 474.278428] ? blkdev_fallocate+0x410/0x410 [ 474.278437] do_vfs_ioctl+0xd5f/0x1380 [ 474.278445] ? selinux_file_ioctl+0x46f/0x5e0 [ 474.278452] ? selinux_file_ioctl+0x125/0x5e0 [ 474.278461] ? ioctl_preallocate+0x210/0x210 [ 474.278468] ? selinux_file_mprotect+0x620/0x620 [ 474.278479] ? iterate_fd+0x360/0x360 [ 474.278488] ? do_sys_open+0x31d/0x550 [ 474.278499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.278507] ? security_file_ioctl+0x8d/0xc0 [ 474.278516] ksys_ioctl+0xab/0xd0 [ 474.278525] __x64_sys_ioctl+0x73/0xb0 [ 474.278535] do_syscall_64+0xfd/0x620 [ 474.278545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.278551] RIP: 0033:0x459757 [ 474.278559] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 474.278563] RSP: 002b:00007efecd6ce9f8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 474.278571] RAX: ffffffffffffffda RBX: 00007efecd6cf6d4 RCX: 0000000000459757 [ 474.278576] RDX: 00007efecd6ceab0 RSI: 0000000000004c04 RDI: 0000000000000005 [ 474.278580] RBP: 00000000000001bf R08: 0000000000000000 R09: 000000000000000a [ 474.278584] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000004 [ 474.278589] R13: 0000000000000004 R14: 0000000000000005 R15: 00000000ffffffff [ 474.278603] Sending NMI from CPU 0 to CPUs 1: [ 474.278649] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0xe/0x10 [ 474.279619] Kernel panic - not syncing: softlockup: hung tasks [ 474.279634] CPU: 0 PID: 8137 Comm: syz-executor.4 Tainted: G L 4.19.72 #0 [ 474.279644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.279652] Call Trace: [ 474.279660] [ 474.279678] dump_stack+0x172/0x1f0 [ 474.279694] panic+0x263/0x507 [ 474.279707] ? __warn_printk+0xf3/0xf3 [ 474.279722] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 474.279735] ? printk_safe_flush+0xf2/0x140 [ 474.279749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.279764] ? lapic_can_unplug_cpu.cold+0x45/0x45 [ 474.279778] ? watchdog_timer_fn.cold+0x5/0x25 [ 474.279792] ? watchdog_timer_fn+0x551/0x590 [ 474.279808] watchdog_timer_fn.cold+0x16/0x25 [ 474.279825] __hrtimer_run_queues+0x33b/0xdc0 [ 474.279842] ? softlockup_fn+0x90/0x90 [ 474.279860] ? hrtimer_fixup_activate+0x30/0x30 [ 474.279872] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 474.279885] ? ktime_get_update_offsets_now+0x2d3/0x440 [ 474.279905] hrtimer_interrupt+0x314/0x770 [ 474.279932] smp_apic_timer_interrupt+0x111/0x550 [ 474.279948] apic_timer_interrupt+0xf/0x20 [ 474.279963] RIP: 0010:hhf_dequeue+0x5b6/0xa00 [ 474.279976] Code: d2 0f 85 32 04 00 00 45 0f af b5 d4 02 00 00 48 89 df 45 01 fe 44 89 73 10 e8 56 47 97 fd 31 ff 41 89 c6 89 c6 e8 ea d9 dc fb <45> 84 f6 74 63 e8 a0 d8 dc fb 48 89 d8 48 c1 e8 03 42 80 3c 20 00 [ 474.279985] RSP: 0018:ffff8880ae807568 EFLAGS: 00000206 ORIG_RAX: ffffffffffffff13 [ 474.280004] RAX: 0000000000000502 RBX: ffff888082f9b4f8 RCX: ffffffff858e7de6 [ 474.280014] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000001 [ 474.280025] RBP: ffff8880ae8075b8 R08: ffff88804daec180 R09: 0000000000000007 [ 474.280035] R10: ffff88804daecb18 R11: 0000000070128242 R12: dffffc0000000000 [ 474.280045] R13: ffff888082f9b240 R14: 0000000000000001 R15: 0000000000000000 [ 474.280059] ? apic_timer_interrupt+0xa/0x20 [ 474.280080] ? hhf_dequeue+0x5b6/0xa00 [ 474.280095] ? hhf_dequeue+0x5b6/0xa00 [ 474.280117] __qdisc_run+0x1e7/0x1960 [ 474.280140] __dev_queue_xmit+0x165c/0x2fe0 [ 474.280153] ? mark_held_locks+0x100/0x100 [ 474.280175] ? netdev_pick_tx+0x300/0x300 [ 474.280190] ? ip6_finish_output+0x574/0xbe0 [ 474.280205] ? find_held_lock+0x35/0x130 [ 474.280220] ? ip6_finish_output+0x574/0xbe0 [ 474.280234] ? mark_held_locks+0xb1/0x100 [ 474.280249] ? ip6_finish_output2+0x1784/0x2550 [ 474.280263] ? ip6_finish_output+0x574/0xbe0 [ 474.280277] ? ip6_finish_output2+0x1784/0x2550 [ 474.280298] dev_queue_xmit+0x18/0x20 [ 474.280312] ? dev_queue_xmit+0x18/0x20 [ 474.280326] ip6_finish_output2+0x12fd/0x2550 [ 474.280349] ? ip6_forward_finish+0x4d0/0x4d0 [ 474.280367] ? lock_downgrade+0x810/0x810 [ 474.280381] ? kasan_check_read+0x11/0x20 [ 474.280404] ip6_finish_output+0x574/0xbe0 [ 474.280418] ? ip6_finish_output+0x574/0xbe0 [ 474.280439] ip6_output+0x235/0x7c0 [ 474.280455] ? ip6_finish_output+0xbe0/0xbe0 [ 474.280471] ? ip6_fragment+0x3770/0x3770 [ 474.280493] ndisc_send_skb+0xf3b/0x1460 [ 474.280515] ? nf_hook.constprop.0+0x560/0x560 [ 474.280537] ? memcpy+0x46/0x50 [ 474.280551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.280572] ndisc_send_rs+0x134/0x6d0 [ 474.280587] addrconf_rs_timer+0x30f/0x680 [ 474.280602] ? ipv6_get_lladdr+0x490/0x490 [ 474.280624] call_timer_fn+0x18d/0x720 [ 474.280638] ? ipv6_get_lladdr+0x490/0x490 [ 474.280652] ? process_timeout+0x40/0x40 [ 474.280665] ? run_timer_softirq+0x647/0x1700 [ 474.280681] ? trace_hardirqs_on+0x67/0x220 [ 474.280695] ? kasan_check_read+0x11/0x20 [ 474.280709] ? ipv6_get_lladdr+0x490/0x490 [ 474.280723] run_timer_softirq+0x652/0x1700 [ 474.280745] ? add_timer+0xbe0/0xbe0 [ 474.280760] ? __lock_is_held+0xb6/0x140 [ 474.280783] __do_softirq+0x25c/0x921 [ 474.280797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.280810] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.280833] irq_exit+0x180/0x1d0 [ 474.280847] smp_apic_timer_interrupt+0x13b/0x550 [ 474.280863] apic_timer_interrupt+0xf/0x20 [ 474.280872] [ 474.280888] RIP: 0010:console_unlock+0xc25/0x10b0 [ 474.280899] Code: fc ff df 48 c1 e8 03 80 3c 08 00 0f 85 47 04 00 00 48 83 3d 04 d7 1c 07 00 0f 84 9b 02 00 00 e8 81 e7 15 00 48 8b 7d 98 57 9d <0f> 1f 44 00 00 e9 64 ff ff ff e8 6c e7 15 00 48 8b 7d 08 c7 05 6e [ 474.280906] RSP: 0018:ffff88804daf75c8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 474.280920] RAX: 0000000000040000 RBX: 0000000000000200 RCX: ffffc9000e6c3000 [ 474.280928] RDX: 0000000000040000 RSI: ffffffff81556f0f RDI: 0000000000000246 [ 474.280936] RBP: ffff88804daf7650 R08: ffff88804daec180 R09: ffff88804daeca48 [ 474.280944] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 474.280978] R13: ffffffff8410dea0 R14: 0000000000000049 R15: ffffffff88d78fd0 [ 474.280991] ? netconsole_netdev_event+0x280/0x280 [ 474.281012] ? console_unlock+0xc1f/0x10b0 [ 474.281042] vprintk_emit+0x238/0x690 [ 474.281064] vprintk_default+0x28/0x30 [ 474.281077] vprintk_func+0x7e/0x189 [ 474.281091] printk+0xba/0xed [ 474.281106] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 474.281121] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 474.281137] ? drop_partitions.isra.0.part.0+0x130/0x130 [ 474.281151] ? disk_unlock_native_capacity+0x124/0x146 [ 474.281166] disk_unlock_native_capacity+0x133/0x146 [ 474.281181] rescan_partitions.cold+0x1b7/0x212 [ 474.281210] __blkdev_reread_part+0x1a2/0x230 [ 474.281224] blkdev_reread_part+0x27/0x40 [ 474.281238] loop_reread_partitions+0x1c/0x40 [ 474.281252] loop_set_status+0xe54/0x1370 [ 474.281273] loop_set_status64+0xc2/0x120 [ 474.281286] ? loop_set_status_old+0x330/0x330 [ 474.281324] ? avc_has_extended_perms+0xa78/0x10f0 [ 474.281345] lo_ioctl+0x432/0x20e0 [ 474.281369] ? lo_rw_aio+0x1470/0x1470 [ 474.281383] blkdev_ioctl+0xc38/0x1ab6 [ 474.281396] ? blkpg_ioctl+0xa90/0xa90 [ 474.281410] ? find_held_lock+0x35/0x130 [ 474.281425] ? debug_check_no_obj_freed+0x200/0x464 [ 474.281443] ? __fget+0x340/0x540 [ 474.281464] block_ioctl+0xee/0x130 [ 474.281476] ? blkdev_fallocate+0x410/0x410 [ 474.281491] do_vfs_ioctl+0xd5f/0x1380 [ 474.281503] ? selinux_file_ioctl+0x46f/0x5e0 [ 474.281516] ? selinux_file_ioctl+0x125/0x5e0 [ 474.281530] ? ioctl_preallocate+0x210/0x210 [ 474.281543] ? selinux_file_mprotect+0x620/0x620 [ 474.281563] ? iterate_fd+0x360/0x360 [ 474.281576] ? do_sys_open+0x31d/0x550 [ 474.281598] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.281611] ? security_file_ioctl+0x8d/0xc0 [ 474.281624] ksys_ioctl+0xab/0xd0 [ 474.281639] __x64_sys_ioctl+0x73/0xb0 [ 474.281654] do_syscall_64+0xfd/0x620 [ 474.281669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.281680] RIP: 0033:0x459757 [ 474.281693] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 474.281702] RSP: 002b:00007efecd6ce9f8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 474.281721] RAX: ffffffffffffffda RBX: 00007efecd6cf6d4 RCX: 0000000000459757 [ 474.281731] RDX: 00007efecd6ceab0 RSI: 0000000000004c04 RDI: 0000000000000005 [ 474.281741] RBP: 00000000000001bf R08: 0000000000000000 R09: 000000000000000a [ 474.281751] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000004 [ 474.281761] R13: 0000000000000004 R14: 0000000000000005 R15: 00000000ffffffff [ 474.283215] Kernel Offset: disabled [ 477.085403] Rebooting in 86400 seconds..