Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 34.209344] kauditd_printk_skb: 9 callbacks suppressed [ 34.209353] audit: type=1800 audit(1569724529.647:33): pid=7046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 34.236155] audit: type=1800 audit(1569724529.647:34): pid=7046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 37.836138] audit: type=1400 audit(1569724533.267:35): avc: denied { map } for pid=7220 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.10.23' (ECDSA) to the list of known hosts. 2019/09/29 02:35:39 fuzzer started [ 44.191748] audit: type=1400 audit(1569724539.627:36): avc: denied { map } for pid=7230 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/09/29 02:35:41 dialing manager at 10.128.0.105:34323 2019/09/29 02:35:41 syscalls: 2489 2019/09/29 02:35:41 code coverage: enabled 2019/09/29 02:35:41 comparison tracing: enabled 2019/09/29 02:35:41 extra coverage: extra coverage is not supported by the kernel 2019/09/29 02:35:41 setuid sandbox: enabled 2019/09/29 02:35:41 namespace sandbox: enabled 2019/09/29 02:35:41 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/29 02:35:41 fault injection: enabled 2019/09/29 02:35:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/29 02:35:41 net packet injection: enabled 2019/09/29 02:35:41 net device setup: enabled 02:38:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0xffffffff}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x80ffffff}) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 186.837095] audit: type=1400 audit(1569724682.267:37): avc: denied { map } for pid=7248 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=130 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 186.911418] IPVS: ftp: loaded support on port[0] = 21 02:38:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) close(r0) accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0x80, &(0x7f0000006100), 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x0, 0x0) [ 187.001881] chnl_net:caif_netlink_parms(): no params data found [ 187.050352] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.059029] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.074690] device bridge_slave_0 entered promiscuous mode [ 187.082574] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.089129] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.096253] device bridge_slave_1 entered promiscuous mode [ 187.114587] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 187.124019] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 187.144751] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 187.152655] team0: Port device team_slave_0 added [ 187.158308] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 187.165615] team0: Port device team_slave_1 added [ 187.171046] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 187.184182] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 187.197434] IPVS: ftp: loaded support on port[0] = 21 02:38:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) close(r0) accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0x80, &(0x7f0000006100), 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x0, 0x0) [ 187.259868] device hsr_slave_0 entered promiscuous mode [ 187.307139] device hsr_slave_1 entered promiscuous mode [ 187.350120] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 187.371493] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 187.382430] IPVS: ftp: loaded support on port[0] = 21 02:38:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0000e47bf070") open(0x0, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x3c) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, &(0x7f00000002c0)=[{&(0x7f0000001580)="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", 0x101d0}], 0x1}, 0x5c00) [ 187.411349] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.417844] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.424689] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.431079] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.542215] chnl_net:caif_netlink_parms(): no params data found [ 187.563735] IPVS: ftp: loaded support on port[0] = 21 [ 187.579121] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 187.585187] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.653377] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 187.684403] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.693587] bridge0: port 1(bridge_slave_0) entered disabled state 02:38:03 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x3ff, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f00000001c0)={0x1, 0x1}) [ 187.701099] device bridge_slave_0 entered promiscuous mode [ 187.723701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.742265] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.769480] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.789564] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 187.815887] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 187.828872] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.835140] chnl_net:caif_netlink_parms(): no params data found [ 187.849086] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.855547] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.868092] device bridge_slave_1 entered promiscuous mode 02:38:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e0000003000050bed0080647e6394f20100d2000500fc3711407f480f0003000b0000000200009ef88000f01700", 0x2e}], 0x1}, 0x0) [ 187.946358] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 187.963976] IPVS: ftp: loaded support on port[0] = 21 [ 187.978061] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.990795] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.997161] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.022380] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.028961] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.035759] device bridge_slave_0 entered promiscuous mode [ 188.043243] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 188.060729] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 188.063655] IPVS: ftp: loaded support on port[0] = 21 [ 188.074041] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 188.081209] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.087857] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.094768] device bridge_slave_1 entered promiscuous mode [ 188.108325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.115961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.123530] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.129898] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.136599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.146159] chnl_net:caif_netlink_parms(): no params data found [ 188.159795] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 188.168181] team0: Port device team_slave_0 added [ 188.181243] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 188.195981] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 188.205878] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 188.214086] team0: Port device team_slave_1 added [ 188.221232] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 188.229187] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 188.247498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.260626] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 188.282663] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 188.302497] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 188.310324] team0: Port device team_slave_0 added [ 188.317288] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 188.324339] team0: Port device team_slave_1 added [ 188.333638] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 188.341914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.349870] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.357630] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.378713] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.385053] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.392521] device bridge_slave_0 entered promiscuous mode [ 188.399635] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.405964] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.412961] device bridge_slave_1 entered promiscuous mode [ 188.419264] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 188.427894] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 188.499734] device hsr_slave_0 entered promiscuous mode [ 188.537250] device hsr_slave_1 entered promiscuous mode [ 188.580691] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 188.589589] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 188.597972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.605587] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.613092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.620571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.663990] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 188.709491] device hsr_slave_0 entered promiscuous mode [ 188.767339] device hsr_slave_1 entered promiscuous mode [ 188.810088] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 188.820314] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 188.829413] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 188.837629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.845088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.855247] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 188.864496] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 188.881056] chnl_net:caif_netlink_parms(): no params data found [ 188.905260] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 188.913417] team0: Port device team_slave_0 added [ 188.920879] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 188.927637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.965811] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 188.973843] team0: Port device team_slave_1 added [ 188.979102] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 188.986501] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 189.059541] device hsr_slave_0 entered promiscuous mode [ 189.097286] device hsr_slave_1 entered promiscuous mode [ 189.137642] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 189.145158] chnl_net:caif_netlink_parms(): no params data found [ 189.159614] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.166003] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.173141] device bridge_slave_0 entered promiscuous mode [ 189.188181] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 189.199487] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 189.205848] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.214491] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.221957] device bridge_slave_1 entered promiscuous mode [ 189.232925] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 189.244279] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 189.293854] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.312047] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 189.327678] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 189.341087] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.347639] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.354486] device bridge_slave_0 entered promiscuous mode [ 189.361710] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.368253] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.375197] device bridge_slave_1 entered promiscuous mode [ 189.382040] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 189.392849] audit: type=1400 audit(1569724684.827:38): avc: denied { associate } for pid=7249 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 189.473062] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.482189] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 189.489582] team0: Port device team_slave_0 added [ 189.512996] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 02:38:05 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) r2 = shmget(0x3, 0x2000, 0x78000000, &(0x7f0000ffb000/0x2000)=nil) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000180)) setuid(0x0) getegid() mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r7, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup2(r11, r10) write$RDMA_USER_CM_CMD_QUERY(r12, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r14, r13) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRESOCT=r12, @ANYRESOCT=r5, @ANYRESHEX=r4, @ANYRES16=r3, @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYPTR, @ANYRES32, @ANYRESOCT], @ANYRESDEC=r14, @ANYRES32]]) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f0000000380)) r16 = getpgrp(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000000)={{0x100000001}, 0x0, 0x0, 0x0, 0x0, 0x0, r16, 0x7fff}) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f00000001c0)=0x2, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r17 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r17, 0x7fff) sendfile(r1, r17, 0x0, 0x8040fffffffd) [ 189.522504] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 189.530731] team0: Port device team_slave_1 added [ 189.540971] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 189.555287] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 189.566235] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready 02:38:05 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x80400) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0xfffffffffffffcc1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000280)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x158, r2, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xc000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff020d}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffccd2}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xaccc}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK={0xbc, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9a0}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1a3e}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, 0x0, 0x0) ftruncate(r3, 0x200004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) [ 189.583066] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.594472] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 189.602457] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 189.615880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.623212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.646503] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 189.659310] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.667359] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 189.683763] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 189.694187] team0: Port device team_slave_0 added [ 189.701543] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 189.702855] audit: type=1400 audit(1569724685.137:39): avc: denied { create } for pid=7278 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 189.712246] team0: Port device team_slave_1 added [ 189.742547] audit: type=1400 audit(1569724685.177:40): avc: denied { write } for pid=7278 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 189.744628] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 189.771740] audit: type=1400 audit(1569724685.177:41): avc: denied { read } for pid=7278 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 189.785891] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.859512] device hsr_slave_0 entered promiscuous mode [ 189.897295] device hsr_slave_1 entered promiscuous mode [ 189.941113] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 189.948321] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 189.956684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.963853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.972696] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 189.982275] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 189.994505] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 190.002417] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 190.011649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.022097] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.030112] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.036456] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.046623] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 190.056317] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 190.064758] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 190.071529] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.093369] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 190.101350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.109344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.117422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.122755] audit: type=1800 audit(1569724685.557:42): pid=7281 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16522 res=0 02:38:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x48da9f979e4a3d22) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x1a001000000}, [@ldst={0x5, 0x3, 0x2000cf66, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 190.125116] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.152528] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.161146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.180418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.195225] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 190.250134] audit: type=1400 audit(1569724685.687:43): avc: denied { prog_load } for pid=7284 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 190.274184] device hsr_slave_0 entered promiscuous mode [ 190.283007] audit: type=1400 audit(1569724685.717:44): avc: denied { prog_run } for pid=7284 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 190.317216] device hsr_slave_1 entered promiscuous mode [ 190.358145] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 190.365346] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 190.372639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.382315] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 190.390882] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 190.408842] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 190.414977] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.421428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.433811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.441866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 02:38:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf070") mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) write$RDMA_USER_CM_CMD_QUERY(r6, 0x0, 0x0) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r10 = syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0x3, 0x80102) faccessat(r10, &(0x7f0000000300)='./file0\x00', 0x12a, 0x1000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000000080)={r9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f0000000000)={0x95, 0x9, 0x3ff, 0xbf, r9}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r11, @in6={{0xa, 0x4e21, 0x5, @ipv4={[], [], @multicast2}, 0xffff}}, 0x401, 0x17}, &(0x7f0000000280)=0x90) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2e2f66696c013000"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='squashfs\x00', 0x0, 0x0) [ 190.454245] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.460631] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.481367] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 190.500399] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 190.510465] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.518422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.525977] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.533901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.542137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.550769] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.557144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.564666] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 190.574361] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 190.584293] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 190.593538] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 190.602812] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 02:38:06 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000000)=0x9) splice(r0, 0x0, r2, 0x0, 0x100000000ffdc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) fcntl$setpipe(r4, 0x407, 0x1000000) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 190.616815] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.631877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.639543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.653617] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.661526] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.667885] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.674951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.683035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.690920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.699292] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.707279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.715068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.722929] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.729354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.737881] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 190.749436] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 190.759262] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 190.773364] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 190.780737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.792665] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.800571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.808303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.815639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.824435] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.833046] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 190.844964] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 190.854214] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 190.866019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.874259] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.881968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.890094] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.897942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.908715] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 190.914715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.929063] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 190.941347] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 190.956228] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 190.964516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.973442] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.981186] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.989430] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.998790] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 191.014557] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.022736] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.030818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.039389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.047895] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 191.053960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.065774] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.076097] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 191.084517] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 191.102499] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 191.120619] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.133309] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.147750] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 191.161779] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 191.163807] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready 02:38:06 executing program 1: pipe2(0x0, 0x0) creat(0x0, 0x0) pipe2$9p(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x20}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000080), 0x169, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000580)={"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"}) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x169, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000b00), 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') write$FUSE_WRITE(r4, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000440)={@rand_addr="e2b0a0433de26f8ea12a302938575f3f", 0x71, r5}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x9}, &(0x7f00000001c0)=0x8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) [ 191.185998] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 191.196640] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.204987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.218205] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.226769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.240510] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.251217] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.262372] audit: type=1400 audit(1569724686.697:45): avc: denied { create } for pid=7303 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 191.287154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.297898] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 191.303911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.313666] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 191.322343] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.333119] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 191.358578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.371514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.390988] hrtimer: interrupt took 32723 ns [ 191.397716] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.404160] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.415687] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 191.439223] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 02:38:06 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x30, 0x3, 0x0, 0x8000, 0x0, 0x6, 0x0, 0x3f}, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4a8840, 0x0) write$eventfd(r1, &(0x7f00000000c0)=0x9, 0x8) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 191.467047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.474192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.491039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.501967] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.508354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.530315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.537077] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 191.550107] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 191.565105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 02:38:07 executing program 1: getgid() r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000280)={0x2, 'syz_tun\x00'}, 0x18) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4cc042, 0x0) ioctl$SIOCAX25GETINFO(r1, 0x89ed, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f00000000c0)='./file0\x00', r8, r9, 0x800) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'bpq\n\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, 0x18) 02:38:07 executing program 2: semget(0x0, 0x4, 0x0) semget$private(0x0, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, 0x0) semget(0x3, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) getgid() ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000600)={"7ce24952d9575d6fc4f15f5f8b4484183926162660a10bdcd0530152f4999dadd64e416e031f51ab4738078e292125b6f98ed3fe78143e43364fb1f7565dc96eed6347b594f3e02ac2c32cbebe261501ad46c8f9faad3411fd9805e3b8f4ee8ff102895236ec94d8a2a1acd1631eb4d2b9ff9e4cc41518fce9148bbf8807f5316bf34563684e255b06ccea3f13018ab7333554fa803a0e560b6945b377d2f6646bd9b3164a087ae91c5db3ecdc7fff149bf69b08076f350285e640159e99c05be71906a8a10a84e181883fc2afefe49dc0bed00e96ca6cd3ed84994c19a043030037a960470457028c3d8bcdc3a4eafc0a9012502602ed263aa6ce9760c356b5b71a5865ce1740b7a8635ba2b154e4529b6be76b9b30976dcbb65321ca476b2c3c5c064ed186ff13afa45ba15ca64bce365b0720a2d204290f20479270dfb6db703b0c1822a59023955f2c69b01bbbae730c5da8656c31c2f389c1a97160ff87ee04b37e1277b4e3860631c5114cb535f1f0ce7acd1fcde5d152e564982c37b2afbbcf9498300b2eadecd172589d2ef759d5f45e0d39ac86e3feae22bb9c91b6e1aece33369ee9b953d7844f9b1adbc5ee7a0f63aa2aae7f753e0b01306d0ff36ab7810a98a3d76a4aa5368f272f53628c671e6fef8f6880ea61781fb3e9e55f1963e729425b1aec23e4f61e5836223b47eaaae651a4f54f50023c78179989a8e41c2de0ec01cdfb54d3c46fb523dcfb685bc4dbd88a84375760ebbbb949226f7bcfd77bffa985afbece699325e317f605f9ce8681d241579df9ea14abf4a7bf16a6acac4fdbe4459d4f6a2085adb1347c54c78305e40e9bf0c8c2960334663791bc5e37ffc2dcf5b453e94cedf57839ae052a141f1d5485378858255eaffa8c83335fd19a1fca141ed8e00f85bee3304082b947a9d774427e5ee428cf220c1c5aa08a8952ed646e490fbc6d49d19e3ffda9a8c9e06aafe65158bb3c4489a9ccc877cc46503f025121210f6f20e440c9f208044620b09fc17ed564be961d61bf56d1cb87bd14ea6f4dd5a08c213da119946e5d676451b2255569976ef04f9b8d14fb01f5efcb8e11ac04ee19f817ae249e8024354f220352e195e96209767fc3146f0466e55d6c05bf96229baa9ee7e32d4bde6d466c7d7233581a833469e7182daf5a158bd9d5ce9429c6aeb996f1b25029f6d2ae3d011feb6be6cbe3db63694fd4b9959a469cb6fe4c6b73ebe88601a37927fa689630a7ac0774b3935922b595b453fc9b1e31042a9229b5ccaa7d30e78b5301a49f48d935666a51ee3c99546c4d9bdced39fa09a1abc894438bd17f28b848eff583b058f80bb92ecd48588d43b028ba40954e36ec831ecd89f9be9bbd96f29a651d25d4a30785a89c5797ef85c29d9c762cdf4dae4f48bd5cc514ba944a30d8c16a9bce6dfcf75b28b2f382"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@loopback}}, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x400000) syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x3, 0x0) getuid() perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x200200, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={r1, 0x14, 0x1, 0x7fffffff, &(0x7f0000000180)=[0x0, 0x0], 0x2}, 0x20) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x24, r2, 0x200, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0xff}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x44014014}, 0x4c37c1e9de27b4f0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) write$RDMA_USER_CM_CMD_QUERY(r5, 0x0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r5, 0xc028564d, &(0x7f00000000c0)={0x3, 0x1, [0x80000000, 0x5, 0x6, 0x2, 0x7, 0x4, 0x4, 0x7]}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) [ 191.577258] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 191.603492] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 191.622107] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.685254] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 191.744638] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 191.757471] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 191.764346] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.774698] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 191.798277] IPVS: sync thread started: state = BACKUP, mcast_ifn = syz_tun, syncid = 0, id = 0 [ 191.818315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.818519] syz-executor.0 (7319) used greatest stack depth: 21312 bytes left [ 191.826192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.844682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 191.855143] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 191.870726] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 191.881481] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 191.903808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.917516] IPVS: stopping backup sync thread 7337 ... [ 191.942355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.959079] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.965437] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.972808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.980627] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.995174] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 192.014596] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 192.031810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.045170] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 192.056901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.064863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.072976] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.079587] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.086318] audit: type=1400 audit(1569724687.517:46): avc: denied { map_create } for pid=7342 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 192.109240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 192.117971] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.129928] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 192.139954] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 192.148145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 192.155936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 02:38:07 executing program 3: syz_open_dev$sg(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000000}, 0x0, 0x0, 0x0, 0x6, 0x10, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x200000000000, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xfffffff6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x2aac80935bdcb7ae, 0x0) ftruncate(r4, 0x200008) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r3, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r5) mount$9p_fd(0x0, &(0x7f0000000080)='.\x00', &(0x7f00000000c0)='9p\x00', 0x4c50, &(0x7f00000002c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x7}}, {@afid={'afid'}}, {@debug={'debug', 0x3d, 0x5}}, {@dfltuid={'dfltuid'}}], [{@smackfsroot={'smackfsroot', 0x3d, '\'posix_acl_access#^^eth0'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r6, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, 0x0, &(0x7f0000cab000)) lstat(&(0x7f0000000080)='./control\x00', &(0x7f0000000100)) [ 192.163767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.175086] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 192.185316] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 192.196230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 192.206735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.220143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.229842] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 192.241196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.249280] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 192.257082] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 192.264791] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 192.271824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 192.286507] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 192.297657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 192.305558] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.307445] audit: type=1804 audit(1569724687.737:47): pid=7350 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir237292028/syzkaller.8A4rDZ/1/bus" dev="sda1" ino=16529 res=1 [ 192.315658] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 192.351475] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 192.359814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.371327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.381091] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 192.391919] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 192.402702] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 192.409080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 192.418944] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 192.428807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.436368] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.454212] audit: type=1804 audit(1569724687.887:48): pid=7352 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir237292028/syzkaller.8A4rDZ/1/bus" dev="sda1" ino=16529 res=1 [ 192.493250] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 192.500062] audit: type=1804 audit(1569724687.927:49): pid=7351 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir237292028/syzkaller.8A4rDZ/1/bus" dev="sda1" ino=16529 res=1 [ 192.508489] 8021q: adding VLAN 0 to HW filter on device batadv0 02:38:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) write$RDMA_USER_CM_CMD_QUERY(r3, 0x0, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25DELUID(r3, 0x89e2, &(0x7f0000000100)={0x3, @default, r4}) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r5 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r5, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x1000000, 0xffffff7f00000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, r6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup2(r8, r7) write$RDMA_USER_CM_CMD_QUERY(r9, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 02:38:08 executing program 2: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef077b1a3fcd0021c988ad", 0x12, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/.et/tun\x00', 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) close(r3) socket$kcm(0x2, 0x200000001, 0x84) setsockopt$sock_attach_bpf(r3, 0x1, 0xd, &(0x7f0000000080), 0x2cb) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r3) r5 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(r5, &(0x7f00000014c0)={0xa, 0x4e23, 0x8000, @remote, 0x7}, 0x1c) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="000000000000c49e280012000ce10000dfd67467fffff600180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) recvmmsg(r0, &(0x7f0000002200)=[{{&(0x7f0000000100)=@ll, 0x80, &(0x7f0000001400)=[{&(0x7f0000000180)=""/26, 0x1a}, {&(0x7f00000001c0)=""/21, 0x15}, {&(0x7f0000000240)=""/212, 0xd4}, {&(0x7f0000000340)=""/160, 0xa0}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x5, &(0x7f0000001480)=""/57, 0x39}, 0xee4}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/98, 0x62}, {&(0x7f00000015c0)=""/12, 0xc}], 0x2, &(0x7f0000001640)=""/136, 0x88}, 0x8}, {{&(0x7f0000001700)=@in, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001780)=""/65, 0x41}, {&(0x7f0000001800)=""/73, 0x49}, {&(0x7f0000001880)=""/191, 0xbf}, {&(0x7f0000002480)=""/179, 0xb3}, {&(0x7f0000001a00)=""/1, 0x1}], 0x5}, 0x1}, {{&(0x7f0000001ac0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001b40)=""/96, 0x60}, {&(0x7f0000001bc0)=""/174, 0xae}, {&(0x7f0000001c80)=""/194, 0xc2}, {&(0x7f0000001d80)=""/161, 0xa1}, {&(0x7f0000001e40)=""/189, 0xbd}, {&(0x7f0000001f00)=""/66, 0x42}, {&(0x7f0000001f80)=""/236, 0xec}], 0x7, &(0x7f0000002100)=""/213, 0xd5}, 0x100}], 0x4, 0x20, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup2(r8, r7) write$RDMA_USER_CM_CMD_QUERY(r9, 0x0, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r9, 0xc0c85666, &(0x7f0000002380)={{0x0, @name="d1b7ae3bb3b4b7850c9907b5577fd2e4547a8c18e0d347f265155b6d58b8bc8f"}, "9e96d215243600f8e4d2281df03eda5a7e27ed54409d120f66583f9eb7011ce4", 0x1}) 02:38:08 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x278122eabdea36a5, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) setxattr$security_evm(0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="372518b684d4e7cd1c473d554768f14f0411719fbe0467ec2c89a5a56ee3068b15305ac23d868100000000000000d5cb01df5e9d269e8382f9c61a5d997218509e872ac5a554bf88fb239d44e8186d88b630d9504546e74be89c85166a77a68eece22cb6fbe690d2a40a0f8df54ab75858a7ef87bc65b4659c05335999"], 0x1, 0x1) waitid(0x1, 0x0, &(0x7f0000000280), 0x2, 0x0) setxattr$security_smack_transmute(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') close(r2) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000040)=""/12) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) write$RDMA_USER_CM_CMD_QUERY(r6, 0x0, 0x0) sendmsg$sock(r6, &(0x7f00000005c0)={&(0x7f00000001c0)=@isdn={0x22, 0x7, 0x2, 0x8e, 0x5}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000380)="86484f8727c1b2289e4aa4107d79ffedabdc6e15eb11960c7aca66403021ff0db9a4fe3454fa2c68a4b796e81576e61256a8ee6db578c927ee44287640b9fcf68ddb2167c6f6ef0600788c858265cb1ca625653301ce2443e1f965a0f7dc23340e163d2024c6b6f03228983b2059b54b9ae22dcf42aa2dd96e0d9b269bbba31be2ca22798063c1092356c83a30fea6bde84adeb3646166fab69db1b113f33ca4e072e417a12791184d596aad54e870f03ff7daaa483a7f0cb8ecd8fb4a2b1bb6cabb1ad7fd", 0xc5}, {&(0x7f0000000480)="c3be916b8c687ecb4b2dd080a392196cfd3fc624dad884b9a13c68aa10ac7598de0a4bc094da0e86d124809715f963c2835bbd56f1db057cae356da0013bce3b893af82f20dea7b39914d8b90437d99482251e2995cb5d953687cc3c2afd20e5cdf630e89d2b80d86f01d2a796c24011668a6bccc4f9813488b889c7316a1ade7f9b0f47659221a638343df4b27366e9b5888ed8de65185da0141115096a0ffc483b0f67520309ec757229ba5afe82763a8ad8b1476b", 0xb6}, {&(0x7f0000000540)="6a465850708d62633f2dce1d3630d27543b70fb94372285292a3055527b7b39b7345ac05abcbb1a5a1e9", 0x2a}], 0x3}, 0x100) ioctl$sock_ifreq(r3, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x1}, {}, {}], 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r7 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) r8 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x4100, 0x0) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000080)=0x4) 02:38:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e0000003000050bed0080647e6394f20100d2000500fc3711407f480f0003000b0000000200009ef88000f01700", 0x2e}], 0x1}, 0x0) 02:38:08 executing program 3: syz_open_dev$sg(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000000}, 0x0, 0x0, 0x0, 0x6, 0x10, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x200000000000, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xfffffff6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x2aac80935bdcb7ae, 0x0) ftruncate(r4, 0x200008) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r3, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r5) mount$9p_fd(0x0, &(0x7f0000000080)='.\x00', &(0x7f00000000c0)='9p\x00', 0x4c50, &(0x7f00000002c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x7}}, {@afid={'afid'}}, {@debug={'debug', 0x3d, 0x5}}, {@dfltuid={'dfltuid'}}], [{@smackfsroot={'smackfsroot', 0x3d, '\'posix_acl_access#^^eth0'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r6, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, 0x0, &(0x7f0000cab000)) lstat(&(0x7f0000000080)='./control\x00', &(0x7f0000000100)) 02:38:08 executing program 4: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@multicast1, @in6}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xffffffffffffff7c) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x80, 0x6, @random="d338c9560d77"}, 0x14) r0 = getpid() ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000200)=0x100000000) syz_open_procfs(0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/mls\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) write$RDMA_USER_CM_CMD_QUERY(r4, 0x0, 0x0) sendto$inet(r4, 0x0, 0x119, 0x0, &(0x7f00000002c0)={0x2, 0x4e21, @broadcast}, 0x10) sendto$inet(r1, &(0x7f0000000940)='2', 0x1, 0x0, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r7, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) sendto$inet(r1, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x53a7, 0x400000a, 0x0, 0x27) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000001c0), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000240)={'ip_vti0\x00', {0x2, 0x4e24, @empty}}) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='debugfs\x00', 0x0, 0x0) r10 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) lseek(r10, 0x1000000, 0x0) 02:38:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="30000000100000080000000000000000000000006d8bb3b6b0d72eef81dfc45cb17285559f9f989edb9f25f18f2df3aa8064faa4c733fedd9d741ee611326a02e3042e32151f758e00e59d64be399bb47ee4168deff356", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800140000000000"], 0x30}}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000001280)='/dev/vcs\x00', 0x101000, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20000, 0x0) socket(0x10, 0x803, 0x0) 02:38:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x4b564d03, 0xc1]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UI_SET_SWBIT(r5, 0x4004556d, 0x8) [ 192.734000] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 192.819453] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 02:38:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) write$RDMA_USER_CM_CMD_QUERY(r4, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000000)={0x852, 0x4, 0x0, 0x28d, 0x8, 0x1}) dup2(r1, r0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'caif0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000ff7fffffffffffffe0ca420d47ed7f9a44988d2c6b410daeceeec5144027522933640fe7a0995758ff7d6206beb096bf956313c22f"]}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r5 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r5, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r5, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 02:38:08 executing program 2: open$dir(&(0x7f0000000040)='./file0\x00', 0x50f000, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x1010, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x100000005452, &(0x7f0000000000)) [ 192.916575] audit: type=1804 audit(1569724688.347:50): pid=7376 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir237292028/syzkaller.8A4rDZ/2/bus" dev="sda1" ino=16549 res=1 02:38:08 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x34e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xffff, 0xe800000000000000}, 0x4000}, r0, 0x2, 0xffffffffffffffff, 0x4) syz_open_dev$vcsa(0x0, 0x6, 0x0) r1 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r1}, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_tables_names\x00') preadv(r2, &(0x7f0000000480), 0x10000000000001e2, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000002600)=0x8) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f00000024c0)=ANY=[@ANYBLOB="070000000000000000000100000000008b00000000000000", @ANYPTR=&(0x7f0000002740)=ANY=[@ANYBLOB='\x00'/139], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000060000000000000f100000000000000", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/241], @ANYBLOB="000000000000000000000000000000000010000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00'/4096], @ANYBLOB="000000000000000000601000000000003900000000000000", @ANYPTR=&(0x7f0000001340)=ANY=[@ANYBLOB='\x00'/46], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00%\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000001380)=ANY=[@ANYBLOB='\x00'/37], @ANYBLOB="000000000000000000000000000000000010000000000000", @ANYPTR=&(0x7f00000013c0)=ANY=[@ANYBLOB='\x00'/4096], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r4, r3, 0x0) r5 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb3}, 0x8, 0x0) read(r5, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='trusted.overlay.origin\x00', &(0x7f00000023c0)=""/64, 0x40) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x4, 0x44831, 0xffffffffffffffff, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000040)) [ 193.143345] audit: type=1400 audit(1569724688.547:51): avc: denied { wake_alarm } for pid=7392 comm="syz-executor.0" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 02:38:08 executing program 4: perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffc}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 02:38:08 executing program 2: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) write$RDMA_USER_CM_CMD_QUERY(r3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f0000000040)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x7, &(0x7f0000000080)={0x0, 0x0}) r5 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x80000001, 0x80) setsockopt$inet_tcp_TLS_TX(r5, 0x6, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "00340c81172061f1", "2c77dcbceb9ecede003f8283773fb714", "54d89117", "9dd2ec5b0aa0799e"}, 0x28) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003880)={0x0, r4+10000000}) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp6\x00') preadv(r6, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) 02:38:08 executing program 3: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000040)='attr\x00') ftruncate(r1, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x249, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) ioctl$RTC_SET_TIME(r2, 0x4024700a, 0x0) mkdirat$cgroup(r2, &(0x7f0000000000)='syz1\x00', 0x1ff) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000008c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000009f00000048b4f6f68a886769485aff0808c869b96c8b0b0f32e92604635db8d9eb6eda51f1dddff4c9a4e0652f1c5a27ba0715ba76ace96a68065b0cc350d5258127dd905f13e9019cd06fb2c56485db4ecaf4ad2dca0c8983bac03b390ae9c03d55f93d7b27dedd9f95e317d2b57eae278aa743d5aeeea569b70a06a984e5c97fbfd4b5a4ab5c836b997ad9b2d95c0f98a63ebdf7a4960d8d3b4603000000d000233bdde56afe95beeed756074dca5d2f2e797de39c29162164b01a1f9ab2a1cb66947c7fc95fe279"], 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x6c68, 0x7, 0x11, 0x18, "a19466df36b34742cd3d4f12cfefec93524a4c28069618ee278c57fcc42e2fa5f3bc5a4fa2e385b05f0ba4f9784cb62b3f4cb869283ccf464b8c0bc8e0cccc6a", "a8159bbef64c9831879eff4342d9d8b43a66ded059180d92b5612924a881e5cc", [0x100000001, 0x7]}) listen(0xffffffffffffffff, 0x4) sched_setaffinity(0x0, 0x3, &(0x7f0000000600)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@initdev, @in6=@initdev}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x500) accept(0xffffffffffffff9c, &(0x7f0000001280)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000001300)=0x80) 02:38:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) stat(0x0, &(0x7f00000002c0)) r0 = socket(0x2000000000000021, 0x2, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0xc000) syz_emit_ethernet(0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa00080047000030000000000004907800000000000000002103907800000030450000000000000080000000ac14ffbbe00000014690ad8a3d44c2d84df290e43e77415c40c221f908c5c6b015e88531c438423beb94483664bb604c4b1a18ce121af6df1908c08023c3400786f0d0953fb00b11ad2b4d1bd7dc1fa9"], 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet(0x2b, 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0xffffffffffffffa7) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) connect(r2, &(0x7f0000000140)=@isdn={0x22, 0x3, 0x7f, 0x6, 0x5}, 0x80) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r3}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x2}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000240)={r6, 0x8}, 0x8) [ 193.303742] audit: type=1400 audit(1569724688.737:52): avc: denied { map } for pid=7392 comm="syz-executor.0" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=28750 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 02:38:08 executing program 5: r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xffff, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x43280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x15}, 0x0, 0x6a, 0xffffff14, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, &(0x7f0000000040)) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x2010, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) write$RDMA_USER_CM_CMD_QUERY(r4, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r4, 0x80045300, &(0x7f0000000080)) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000dcb000/0x2000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) sigaltstack(&(0x7f0000559000/0x4000)=nil, &(0x7f0000000000)) 02:38:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) write$RDMA_USER_CM_CMD_QUERY(r3, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000080)=0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000005d00)={&(0x7f00000000c0)=@newlink={0xfffffffffffffd3b, 0x10, 0xd07, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @ipip={{0xc, 0x1, '\xfeip\x00'}, {0x1c, 0x2, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @multicast2}, @IFLA_IPTUN_LOCAL={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x19}}, @IFLA_IPTUN_PROTO={0x8}]}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10044}, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x1b5c84, 0x0) ioctl$sock_netrom_SIOCDELRT(r4, 0x890c, &(0x7f0000000180)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={'rose', 0x0}, 0x1f, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5, 0x8, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) 02:38:08 executing program 4: pipe2(0x0, 0x0) creat(0x0, 0x0) pipe2$9p(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000080), 0x169, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000580)={"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"}) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x169, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000b00), 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') write$FUSE_WRITE(r4, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000440)={@rand_addr="e2b0a0433de26f8ea12a302938575f3f", 0x71, r5}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x9}, &(0x7f00000001c0)=0x8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) 02:38:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x100000000000002, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r1, 0x0, 0x420000a77, 0x0) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[], 0xfffffd88) r5 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000000)={'veth0_to_bond\x00', &(0x7f0000000100)=@ethtool_test={0x1a, 0xfffffcd3, 0x1f, 0x9, [0xfffffffffffffffa, 0x401, 0x100000001, 0x9, 0x800, 0x2, 0x8, 0x3, 0x8a5]}}) bind$unix(r5, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r2, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 02:38:09 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="5d656375726974792e5b2d776c6129f85f6d88648a305b736563757269747923637075736574656d30007f3ded9227a03981b9a94098f0f8fb576713e6679cc94346e9216d5d67d18df1f8ce5a6b0e916bdde6153ad738158ce10c8b9e21a313680ccdded7ce3f0ad34635ce3dc14fad4aefceac71554ee5d222de1496d6ff09e8db9da6405120e58c5ff886de4f9c256372f1fa226cd1b4c7401149e1"]) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 193.836731] audit: type=1400 audit(1569724689.267:53): avc: denied { map } for pid=7414 comm="syz-executor.5" path="/proc/7414/ns" dev="proc" ino=28796 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 02:38:09 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649eac6d4cc29a315faf899c2e35d08b1974199c08bf4798207b78d8dd89e727382318265acc85a4444869dfc22ba7fd79b455635a715fa1e705070e2857ef21a3076cdfc2c29b26547360add94ef9c349ae62f54e7a90e1aae762a11b2cc6bd720034fac41f1de628e2a3166ec21e03c68a60708328e1606a83211bc78be79097861ce", 0xe8, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) socket$packet(0x11, 0x3, 0x300) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000, 0x8) sendto$inet(r0, &(0x7f00000000c0)="20268a927f1f6ec2434e4812183d86b0a3a041ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e75018044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd0a5259e62506cda287b857aac", 0x8293, 0x4008002, 0x0, 0xffffff41) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000000140)) 02:38:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0xa02040, 0x2) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x7, 0x6, 0xc, 0x10, "365daa09f95d9c623611da8588e03b5b6af5a8b4b965a2f8da72830a383bdfd6c9da4f3dfacbc83379e9c622e270973919c5b554fecca5d445443ef4af94c0d0", "df183e0742969524d5cd8011a495336962fd0c1d4dfe46bac34121dd0e379fe4", [0x2, 0x5]}) prctl$PR_GET_DUMPABLE(0x3) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000080)="3900000013000d044bfe073f665a81d004da04000000000000ff3f1500000045000107000000141900040043000000000800005d06a4faffff", 0x39}], 0x1) [ 193.980903] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 194.052604] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.5'. [ 194.105773] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 194.127074] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.5'. 02:38:09 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x34e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xffff, 0xe800000000000000}, 0x4000}, r0, 0x2, 0xffffffffffffffff, 0x4) syz_open_dev$vcsa(0x0, 0x6, 0x0) r1 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r1}, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_tables_names\x00') preadv(r2, &(0x7f0000000480), 0x10000000000001e2, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000002600)=0x8) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f00000024c0)=ANY=[@ANYBLOB="070000000000000000000100000000008b00000000000000", @ANYPTR=&(0x7f0000002740)=ANY=[@ANYBLOB='\x00'/139], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000060000000000000f100000000000000", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/241], @ANYBLOB="000000000000000000000000000000000010000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00'/4096], @ANYBLOB="000000000000000000601000000000003900000000000000", @ANYPTR=&(0x7f0000001340)=ANY=[@ANYBLOB='\x00'/46], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00%\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000001380)=ANY=[@ANYBLOB='\x00'/37], @ANYBLOB="000000000000000000000000000000000010000000000000", @ANYPTR=&(0x7f00000013c0)=ANY=[@ANYBLOB='\x00'/4096], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r4, r3, 0x0) r5 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb3}, 0x8, 0x0) read(r5, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='trusted.overlay.origin\x00', &(0x7f00000023c0)=""/64, 0x40) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x4, 0x44831, 0xffffffffffffffff, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000040)) 02:38:09 executing program 4: open(0x0, 0x101000, 0x14c) syz_open_dev$sg(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000040)={0x4, &(0x7f00000004c0)=[{}, {}, {}, {}]}) syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') mount$bpf(0x0, 0x0, &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="6d6f64653d3030303030303030303030303030305752920da869e6c02c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030333737372c6d6f64653d30303030303030303030303030303030303030303030302c66756e633d4b455845435f4b45524e454c5f434845434b2c6f626a5f726f6c653d4d41595f455845432c6861"]) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r3, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') writev(r4, &(0x7f0000000080), 0x5b) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) write$P9_RWALK(r5, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r5, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r6) r7 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r7, 0x80006080045006, &(0x7f0000000140)) ioctl$TCSETXW(r7, 0x5435, &(0x7f0000000080)={0x878e, 0x2, [0x9, 0x1201, 0x9e, 0x7, 0x5], 0x5}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000}, 0x0, 0xd, 0xffffffffffffffff, 0x4) r8 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet(r8, &(0x7f0000006400), 0x3ffffffffffff5f, 0x4004) 02:38:09 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000001240)={@can={0x1d, r2}, {&(0x7f0000001140)=""/184, 0xb8}, &(0x7f0000001200), 0x40}, 0xa0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000240)={r2, 0x1, 0x6, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000002c0)=0xffffff80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x54}}, &(0x7f0000000140)='GPL\x00', 0x1, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000)={0x1}, 0x10}, 0x70) 02:38:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x80, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) r4 = dup2(r3, r0) write$RDMA_USER_CM_CMD_QUERY(r4, 0x0, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0xffffffffa0010000) pipe2$9p(0x0, 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) fcntl$setlease(r5, 0x400, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="00fb15fa2ac32992080000000000f8615345acbe543fc13abfa544d5ba201d2c856f6d"], 0x15, 0x0) fcntl$setlease(r5, 0x400, 0x2) socket$xdp(0x2c, 0x3, 0x0) 02:38:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) recvfrom$unix(r2, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 02:38:10 executing program 1: syz_mount_image$hfs(&(0x7f0000001000)='hfs\x00', &(0x7f0000001040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@type={'type', 0x3d, "2599000e"}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) write$RDMA_USER_CM_CMD_QUERY(r2, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14, 0x84755437f90fe6e6) accept4(r3, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80, 0x80000) [ 194.663812] hfs: type requires a 4 character value [ 194.677455] hfs: unable to parse mount options 02:38:10 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_sctp(0xa, 0x1, 0x84) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffecf) mkdir(0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x401) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) unshare(0x40000000) 02:38:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d6f0bcf6c7bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x36, 0x829, 0x0, 0x0, {0x3, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0x100000000000000}}]}]}, 0x2c}, 0x1, 0xffffff7f0e000000}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x54, 0x0, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x6}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3c}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @empty}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}]}, 0x54}, 0x1, 0x0, 0x0, 0x40000}, 0x24044001) 02:38:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x41be, 0x10000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000340), 0x3}, 0x73ca1bc3675f2fb5, 0x4000000000, 0x6, 0x1, 0x0, 0x0, 0xffff}, 0xffffffffffffffff, 0xfffffffffffffffd, 0xffffffffffffffff, 0x821baf2db5cec47c) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/capi/capi20ncci\x00', 0x100, 0x0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000500)=0x7fff) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0xc00080, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000400)='cgroup.type\x00', 0x2, 0x0) dup2(r4, r3) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001) r5 = accept4(r4, 0x0, &(0x7f00000000c0), 0x800) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x4e22, 0x2, @rand_addr="cb5798ca72a6c2a84d9908ccb90b3c85"}}, 0x0, 0x6, 0x0, "8557b19ad3c4854a3fa194e393664948d5672496e2e7d46f99bca104b9ca0704a230ca4e493ae7e19d5352eb69671d536d2c52fee2706ff62293d18f9cae7cbc01eadc40d3f4f73f062c25c204ee43a6"}, 0xd8) unlink(&(0x7f0000000540)='./file0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup2(r7, r6) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000580)='/dev/rtc0\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r9, &(0x7f00000005c0)={0xd0000008}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) accept4$llc(r8, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x800) pwritev(0xffffffffffffffff, &(0x7f00000008c0)=[{&(0x7f0000000200)='j', 0x1}], 0x1, 0x4081809) sendfile(r2, 0xffffffffffffffff, 0x0, 0x20020102000007) r10 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/enforce\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r12, r11) r13 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/policy\x00', 0x0, 0x0) r14 = socket$inet6_sctp(0xa, 0x5, 0x84) r15 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r15, 0x84, 0x1d, &(0x7f0000000740)=ANY=[@ANYBLOB="fa88334af73aa06e35bd8934010164b7531d3f059beb349a4ba9174fee3fae840d9f7671e985b878365680dede65a857af646dd014ea800a00000000db28064635", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r14, 0x84, 0x76, &(0x7f0000000080)={r16}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r13, 0x84, 0xa, &(0x7f0000000640)={0x5, 0x2, 0x8000, 0x3, 0x800, 0x3, 0x4, 0x2, r16}, &(0x7f0000000680)=0x20) fcntl$dupfd(0xffffffffffffffff, 0x0, r12) ioctl$GIO_CMAP(r10, 0x4b70, &(0x7f0000000480)) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000040)=""/4, 0xebc3276d6d4b1cd2, 0x100100, &(0x7f0000000100)=@abs, 0x930212) r17 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r17, 0x40044591, &(0x7f00000003c0)=0x54ad) [ 194.881685] IPVS: ftp: loaded support on port[0] = 21 [ 194.929882] netlink: get zone limit has 4 unknown bytes [ 195.144439] netlink: get zone limit has 4 unknown bytes 02:38:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd", 0x7c, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f6164206563727970746673751b6620757365723a6e6264002030303030303030303030303030303030323034382062659b31"], 0x34, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) write$RDMA_USER_CM_CMD_QUERY(r3, 0x0, 0x0) r4 = msgget(0x1, 0x200) msgctl$MSG_INFO(r4, 0xc, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='htcp\x00', 0x5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x0, 0x0, 0xffffffffffffff37) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) 02:38:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) recvfrom$unix(r2, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 02:38:10 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCAP(r3, 0x80685600, &(0x7f0000000040)) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)=0x100) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f00000000c0)) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f00000001c0)={0x7, 0x40000000000000, 0xd7f8, 0x7e1, 0x0, 0xfb4}) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x90640, 0x0) ioctl$FS_IOC_FIEMAP(r6, 0xc020660b, &(0x7f0000000240)={0x800000000000, 0x8000, 0x1, 0x5, 0x3, [{0xfffffffffffffd94, 0x5, 0xeadd, 0x0, 0x0, 0x400}, {0x3f, 0x840, 0x7, 0x0, 0x0, 0x1e54283491294391}, {0xf6, 0x4, 0xdf0, 0x0, 0x0, 0x1}]}) 02:38:10 executing program 3: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20a, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) unlink(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000300)=0x0) ioctl$VIDIOC_S_STD(r2, 0x40085618, &(0x7f0000001640)=r3) dup2(r1, r0) r4 = dup2(0xffffffffffffffff, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) write$RDMA_USER_CM_CMD_QUERY(r7, 0x0, 0x0) r8 = signalfd4(r7, &(0x7f0000000140)={0x6}, 0x8, 0x40000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r9, 0x40106614, &(0x7f00000016c0)) vmsplice(r8, &(0x7f0000000180)=[{&(0x7f0000000440)="496f09a3b36e0e0d28d0cc1510a8222fed688f24edf6e92b69af28e03410879069aab69f99f3a007e7f0aadfdd709de24787ed5ca6cb98075240fee2463adf9061e03c56a5c7ff6e0763b27ff974320954ed8872be84d8b03b65d1d392e62acb361a4df8e83ddb9279d9ab84988c1ca05b764562e184f0ca7049e1e6614839f3a617fc4a76e6b3d57273d8b84e2589d02b2bb3b5d49c0a0cca8b0837beee092e83cbe75efbfbd833f855373b2e3f9540989dfc93460a0610a34b93714e3a4a6b21fc", 0xc2}, {&(0x7f0000000540)="12aac07a5b47aefa7aaae13c3a837991612999883cd197ed29de84f96509388d2ceb791f68d2ff5ce9ad063158453f768a723ffcbc163515649eeacb1a7fbde89e515a3bbf2789299562ff8c253f6d352bb7f00003ad79e323744f8bf11948844a6f40e01c33fd49dfb1deadc45cc806035086347957c351dd4f319d4a54d5c44f5997865c7f131e26f3e5a526e1a0dbdefbcce111ec54e9f5757a3d658f27d7cb1498d52de1094975f4947b009e87df60280e43116cc55fd790e0daabb91c9e40a0ac09d6", 0xc5}, {&(0x7f0000000640)="4139d0b202f94cfd97c3d3f3aa9e4a012148c38f78cb7e9f38edfc2103c72232a51cc1a9b08cd1b9e9977ad7110a1e8b219b9759bae06001f955054155b52e0cd354a305e8871c7c4335bd47f4c04c71580939c5ac88f9e6d62448fb7718b1f5d13622f96d77104750a243e84ee4db4718a34042d837622c653e1ad7bfe7103d3aa4da874bc76d2bac04f795266cd699e8ef0221fb75494ff5f03559040c356709e16a80d47aaf24d9040f34abaf7c6c3516878f72490119c6b3ebd83a24e6fd4531c74d85f2bf2c2370a70b65c5da64f2e83c54aec9940ee9eb249cae27fcfd0b2462e2cd8a7d1dc0f67e47fe0e161ad1065e3f319f377a7f6810feedf04a35fdbad867c70860e83747f2ed07b81800ddd19ab0ef589e14fc05ca36a62a98be332b9cb117ea8a0278e82861f2d75a085c7053dbf7a8740e947c11548296a3aaa7c1f70d9e1cc2e4f1c3c64e233c177745c7fabb0132fd032f18a73020ac0f71fa29346579625d95f1e3eed304afd69ffe00baede1cb720c1f839a991f89121add593bdd3e6c7e6c3275e1666a30364a87a6c5d63dc38d7fd56d7e53dcd5675143c92c3da47506ab788e78712b9bf95f458edad08a0d08dc0f52247806aa0c651a3b47e0d5b1bf8c8c06afa8ee703a4a9b30fde1cc43db5d7e7dac6733efef6fc7f17462931bfec0c6d9ec2749270a20715ab053fc150ec78d01d69a7bfb57f5cbb0b3229bfaa53bcb059d8a55b14227852f5822bc9dccaf41cece4f6d1ad63ff4c276c0928f347c0fc8e7dc23fa138d34ad6801403fc2551710be5643fb21d0fdf1eb53797e87d537a2bf22c047f67a3b879ca3c7bbba02849ecc9c21e93a59b01579fdb44e2f94c6020c51cf6aae31babeb8ac31f7019583ed04f29b26e17bbcbfa96a79b2855ca49a5aaca33e1533b674b2f5be9e6d78c137b7371b993c099e2babae5d5a40d0b593b572142947bf5b7d8fd8c69e5bddcfc08af08adc90cb95688847479a54587e533b725ce2f225085b7e201837dd25caa7de6e8fffad74ef76b748a9396e88627612d3d40a89d75fca1370d7dd6af4b0fc33f0347f8f1401dcdb84ceac39e7cc9c36824af7688d0b5240256c9d136ceeb6ded7ae3bae87584c7cdd157bc9ef20e8da3315477fc8273017248a279e1d67346595041ff71eb29690358cbd5c834c9557bc645916f2d65c301cf2b1f9073d47a1ad130a7df33413ef64ab27a3f149768cd4543ae9172a4ac6685653622c9a9139b27c6729e15c566fd097bbfa797dab4ff7caf52f3eeb0f9aa112eec119d8b5efdd4346e8bdf5ad82501280835f3b8886da73331082d099e7ade05b5d6fe85cc3d61f249b41e88fe2083b23344dc0be948e9f607b8ecb50566913baa674db19ec5bfc6efcd07e4438bc8d96a30f9aab0d499fc54a351ab54cf50c37b944f6e0c9efa83b5bcda08c07b8e5de88e383296e5e8b2dded5a3dbad6592d689483af0153d2d565c82c9533315d72b29a0729e5ecc47e8864ab8552e4821f0d9486dcc500d2304b746ba9c92ab3f88e765f7545cafbc0e40697962ea8d4a9a85ea842330d3b8bb4fe1a2897fcc1698ecc40ddad1f65e553202238d35ab0177d7e4c017c6f9ee2b79dddaa00b58f88acf71f4816e5cac8ff55d8fc558af0f5911118a3c0193f3ebc52d30d76214209ac3f8bc98d8af2439c123449150490ccd8207fe0824a8c4ad8dc1984a979cfb10f02472f5ae9240ce5655ffa13c13ff3db8b73ac5b12fb581db374e75bacf1c98174a0e36c68f9911a1b345303af75bfb0e654752e229e2dccfe961c663a94f4c076ed7ac53dd18f0fbb64a2f65cd5641bb58a40d1af83a1cf9743d2b23f400e62e089b7662711f207b65dd47744b4cb550f347500deeccf55c75c06f9ed8828f793bbe7f9f2417addb1710cd0c6a88aa7d98622a44902e4c23414555e7b83984825186bba57aca20485b34e2afeb692a04db7bebb280320ddd8a4f9f6a4a27cb66f7cd9a4bdb406df3a10ef1c5957f96a737a65a17727ca4ada7f420fbe46d6cdc5da6e2f866ed09de9c8a61f355c619a200405d46ebbaa22df63734f6fc71afbfcb7e8adc79e2adc5b70b5eb3edef5d3c8ab5aca72af96aafb2ab6f72d4cff9b736638abc7b25e5c0c747e917cdbeddb1ef00fd1309d682ce9761c7804c77de5a4aedcd2d555df35ea08349734405adbcf0cb9a827302b331e3462d37a0f08b8e7c17399cb959b6abc5c4939536afa75a0a2187d15edf1bf0faa9160401e2efc5eb9f5599acb3162a772a0d64aa0f3cd46f1c886f485f737a7ca31786f248118e00c2d089d0be0d21c61df2bb798fc2ccbd429bf8d3d127a312af67f7871793ca7779dab8fa68b85795e07de88b3b0013d4c31da86fdff8b4ad3ea19d051e67fc9f8b0209d480bc0e270adfad457ff2566181d6b5b0223cea8025092d0aeeb2deafdb1154a541eca450836ce0f87348947fe34483caa45c8ba05717b7ab77becf310c240954b9efc83f78041f812de00b4172651daf67eb12f09eaafd376781d66e88d8ad384297a51329b2118c1afae658521176f103eab4f7ea1ae56f54f5d12ee5792dc34158083185834137dda942c842c868513b35eefa3a7e63b1cec6f26941e7176a6f81cf352ae40d60fdf1540c3d827e7c8883008c3d8db7b4f617aaab1b706587385a2ac4ab08e5dd33046a320ddcc9c3edb7815ef140e7bb60bdca6833a40d17f34d8c815923b3433c688712c887c884efc52d18057e566a1bb43cd2546341c01cbb0fc47b4b0b25af9bff5ecad0923720a3fe547cf298e6ca0144dd1d27517fd16a981f63d5f59734f38e5a9a8d9186b21f77f3f0edb707c3da3f611a2e1fc43897fe9a921dac36421ff6758b239686f96796bc5f73e98cee0a3eb1236bcb0ab945879c529200c450098216cccec468da708ddd471fae823cd9c664e22f8b589fc9a1c0559e07d4cc918087db8da4272df10bb4a0f857103194dfa653fe448e37fbfc35e3514c218f80b6f26754f1edec3e1830fdab30853e573c41da6ad7db70e72383d5b1d1bc61b20776469de3683a6a3e71f2e3a8d668c181816ba996227a997c46f187769763bac8ecf00503ec33e44736975d2595330153266762337c9b1a3d57256a2865a6ef24595ac3aca1349637b2dc013d54373d9bc22f53a15044416a1b46376c27a997bf877915fa23a6747d47875b5c0c2bfe6a08345287fa3f0ab55771d879f208d7ae037ec39dffbcec453d3b2f22ca9d3ebf827794f71743078ea19b0cb9687f446cbf88d91ced47a4c6ada6809cee772fb95e28207305557fc11049271721cad059a9a866f92fb52b69f9d70c497f939cc28cabe5e15e16f53083b9c07984f13cd5520b70aeac7949ec9bdfe189b4a265ee3ecb158d3484925142e20e384b7f25b08e53505bdbc624de0e9dba2026b133e1edf0736025c0439cc4f4331a867fab8ac34ad4fbd1586893b7c55439455d552409d4086f736e021a711aa5bd2287870e91a8e5dfbcff9ba67be5dc1e1e7c519b40c9c04ae5fc5f5be2bac2de7059a270a89ef8178e08c6a05c5b2ef3cce574fff22c862dee7033f5d66b3a9f9975b211338ffcd777bf6c23bad5c74395a744a90267c083babacbb1c0884755d1659d9c89520acc17bb415b0b9333f3836ac42289e7da58ed58dfc329829b18d0e1058953ecb9a72625cc72b1fe012fdbfc0a3173d8c82a32c7b3c5fb1684438b9e89114db0426bdbc5adb190f7a24c688f30eef9bdd67b67f200e63f2ddfa5dabd257cba0d8f7d67a41170986190917424458993bddea9fba467e534aca58fedb732bbbc7b949b8e16cbf83dbc4b434b1a5f51ddc28f6232cd549e76091176c8c514488b5ec5f55cb18733171d4b2bfc7ac3c9e9fc80c14fa4231e7c2cb79980d084c8e1dead2885503bd04dc663984731da23dc52341b9227850c91e3d2c55687ae61f0f82f7360d2b8698d3390d0d29bc9d97895c3797291fdc44925fd2de984cc9d04c51362b850f17d8ec2c59b8c0f015fcbdcf45b1159255da242ff5b9c1a2a4b9c9fe1fdff62d5274a85dfa843cf4c0dbda673b4e731da24e48978f437b2ab0eb03776c7e71f0cf1012b394fe1ca5e0b89e1a759aee3544e4d9cb00bccadfbf077d2d9c4c20bb8ad8cbfcace1c097783a4db8195d3e66622b9c079b25c457def32fab70d5e260e61bd41f624228979be67a25df2b184474fb1fd36d03588f0b15c4e703cdb7cb9f07e5792c5192eb45213a0ecfa7aef02c916265596aa212b511c39575c87748332bc374ddd4bb4b171b8553fd2e8c8ec00c480e0ea17f2bb9d6eb04e0673faba3cd2e61c1723ababb735f867a3e263ec298333f1b3575aa95a825d757f790e3878aa26441ca93b200c67c410f95e17acd43850a136f52e80aafec4f48264d7f981b8d035cc40111a1d7722cccf6e3358ab928424791df6e0809dba7deb74545594f9accc0d9b7b5cad7571bb3081b2d1cd7948800ab47f67e75e93aebf14ef3e5fe2818f337590cf85d7512bc71ca2cfe23027d79ab02193ca6f5e83a7ba9f591720bbef54af6677f1c7fa24ead512eb0978418482c3ab9bc76fa90d38b85e36d746534a9e5f6576ea6e33c9d82edc62f81e5efd6c833eaa6f5fa21d539e8c5f9b2ba6b7cabaf0abbe0ffbe35300ef5ab7de61c63a947d6f6eed4df0cde8b4c02abc10c42c0576439960fe1381d3c8993146e35de4dc37f33616fbeec45469960447cf5eed2e1a239256031fc4239c2cb5a561bfc4ed2d0401ea14ec96499ae7fa9a9ce9e867cf525cfc33e086aae9e48b648b968b53ee720a15a7962ca2269de5df2254f614e6cf58166033f07c71189ebaf7d9b6926819607389d3738173305f903fe40c1ab6de33c452efbf18394ce1a2e1dc2c4e9fdc6b24b84f2b2af2c9196710cf1b6afd2f5171e3126ad994c33ea098af26075a7527283dc20b09e203ec34b190654c21b724a91602bc1b0dad8373f65e164c5b55edbc48f78ce3e68aeeb8e82c1976fac24f4ae037f03a05ae195ca459130f38dfddb8c70941790e5017f8d486e8c40e3cd7114a40a2512f037227f3e0f9b4f5279fe7d03aeffd8cb91789d8a87613918a06d602f568b45633ad2a9c65090f596c40ccae5fa638a7cee8ecf23e0a799f9fbc5729e6d55e369aac7a7b8600da236dc10d4b3954816526b67181a2b937fea6a7037d4a78908e502118d0d6ac50bd4152b68be0acfeb5e9c3c4fe1482f2b27480258482318a2d4769b03175d93b9b60ddf7b8d5539611ba05b2d7ae1c3d69bc538ef088be5e829e5b9e8b89ec114a7dcd0beece86be2e29bdea6da64ba26308ea98e36d44bedaaf7d35b5bc45e4b30915b857d616ac5a6d8f04032ad4a61be02c3fe810142eb2c9ba169083dd3b0ac532adce88f290941ccfd44bf908798629a6d8ddb1de546418c9597d564a945fd5ab801e82f80087064ac57192405f2be096d3b0a868cb6085d77586452cb5be00e9a9f45694f414f25e54e16620f9ba177b3caf015f95925ead4ab22dd387e90e8c0948f7ce8a1f6157bd3fa78b771dbccdbf21cc0c1c1a966c9acf667ff12b35bda3f2429ee2279397f077be04c674509855d54f04492b6a8e2483c201b0f6b45e95121acccc7227e1069919dca98ef85d10d83f7f3c7b9c1f914863010baf74d2fb251d2ae5fb677d7ef3829dd3e1a3932e3fdf4bf8d7cde3b5c32438b3bcc47b746b56eeb8ef3a40bc19c1d7fbc3e7cd68a816ee50f93c0f71e1307974838704e58f143a06f8cc31cb", 0x1000}], 0x3, 0x4) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_getrule={0x20, 0x22, 0x604, 0x70bd27, 0x25dfdbff, {0x2, 0x10, 0x0, 0x5, 0x9, 0x0, 0x0, 0x7, 0x10008}, ["", ""]}, 0x20}, 0x1, 0x0, 0x0, 0xabcb70ba2816ca3f}, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ptrace$cont(0x9, 0xffffffffffffffff, 0x3, 0x400) dup2(r11, r10) r12 = dup2(r10, 0xffffffffffffffff) ioctl$NBD_SET_SIZE(r12, 0xab02, 0x7fffffff) 02:38:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000240)='keyring{em0selinuxself\\trusted:[wlan0\x00', 0x26, 0x7) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x246, 0x0, 0x0, 0x0, 0x4cb]}) socket$alg(0x26, 0x5, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000180)={0xbd, 0x1, 0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:38:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) dup2(r0, r1) syz_genetlink_get_family_id$tipc(0x0) fchdir(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000000)={{0x0, 0x9}, 'port0\x00', 0x2, 0x40000, 0x4b, 0x3f, 0x4, 0xd07e, 0x5, 0x0, 0x4, 0x8}) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x10, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) [ 195.668193] IPVS: ftp: loaded support on port[0] = 21 02:38:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100070c10000000000401400000", 0x58}], 0x1) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) accept$ax25(r1, &(0x7f00000001c0)={{0x3, @default}, [@rose, @default, @null, @default, @remote, @null, @netrom, @rose]}, &(0x7f0000000240)=0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000280)=0x100810) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r6, r5) ioctl$FS_IOC_SETFSLABEL(r6, 0x41009432, &(0x7f00000002c0)="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") r7 = openat$cgroup(r4, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x304}, "5e7ac172fac0051b", "286c84872b3b2954936ee8c9153933f4", "95468738", "5185af70f0976068"}, 0x28) 02:38:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) recvfrom$unix(r2, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 02:38:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000080)={r3}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={r3, 0x8000, 0x18, 0xfff}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0)={r4, 0x64, 0x6, [0x8, 0xfffe, 0xc613, 0x100, 0x4, 0x8]}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xfffffe7c, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c00000010000106e600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c000100626f6e64000000000c00020008000a0000000000"], 0x3c}}, 0x0) r5 = syz_open_pts(0xffffffffffffffff, 0x101000) ioctl$TIOCSLCKTRMIOS(r5, 0x5457, &(0x7f00000001c0)) [ 198.209274] device bridge_slave_1 left promiscuous mode [ 198.215230] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.290402] device bridge_slave_0 left promiscuous mode [ 198.295914] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.989674] device hsr_slave_1 left promiscuous mode [ 201.032981] device hsr_slave_0 left promiscuous mode [ 201.082129] team0 (unregistering): Port device team_slave_1 removed [ 201.092197] team0 (unregistering): Port device team_slave_0 removed [ 201.102358] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 201.150706] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 201.235244] bond0 (unregistering): Released all slaves [ 201.292512] IPVS: ftp: loaded support on port[0] = 21 [ 201.377519] chnl_net:caif_netlink_parms(): no params data found [ 201.462637] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.474073] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.482532] device bridge_slave_0 entered promiscuous mode [ 201.494135] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.501688] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.512959] device bridge_slave_1 entered promiscuous mode [ 201.536427] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 201.551371] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 201.575873] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 201.584811] team0: Port device team_slave_0 added [ 201.594650] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 201.604284] team0: Port device team_slave_1 added [ 201.613950] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 201.622386] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 02:38:17 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x102002700) 02:38:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1a) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="620440df857cbc02910ad400fb0000b200083838fa6900bb"], 0x28) sendmmsg(r0, &(0x7f0000000100), 0x400000000000125, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 02:38:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) recvfrom$unix(r2, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) [ 201.703745] device hsr_slave_0 entered promiscuous mode [ 201.777440] device hsr_slave_1 entered promiscuous mode [ 201.817701] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 201.836203] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 201.918858] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.925276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.931974] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.938359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.098310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.116664] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 202.145302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.156395] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.186460] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.214162] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 202.226471] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.249638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.257365] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.263725] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.288787] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.296536] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.302923] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.311667] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.320677] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.328795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.336260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.346023] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 202.352740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 202.360154] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 202.373925] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 202.386725] 8021q: adding VLAN 0 to HW filter on device batadv0 02:38:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000005000001000080"]) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0xc0010141]}) 02:38:18 executing program 0: lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000480)="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", 0x553}], 0x1) 02:38:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0xfffffffffffff001, 0x0, 0x3, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() ioprio_set$pid(0x2, r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mknod$loop(&(0x7f0000000380)='./file0\x00', 0x2000, 0x1) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x20000, 0x0) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="040aba6077a7e78c03f563144e7000"], 0xf, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@window, @sack_perm, @window={0x3, 0x8}], 0x3) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x22301, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x2) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getpid() remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video36\x00', 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r1, 0x0, 0x0, 0x0, 0x2) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 02:38:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) recvfrom$unix(r2, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) 02:38:18 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825a55f910c28f5e87a64820546a1ebed56adbd5b57f67b95778e2569f8e39808e0b61a0bf6a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d331de23d61ca62ef8d48f42ffd113acf060c105020d4882fc399eaab8787f0db6510490b0f420326bcc4e2b65e7c68bacee7877a6274d908e5a5d512b87ed3eb24d40d331edbedf8a03a722ffa87cc2dfec4758b087c23cc9c5e726fea9424959d9ee275d661bd3c48f4855d4bd33886271153f162b6d3cbf1416a884b136571b", @ANYRES16, @ANYPTR64, @ANYRESHEX, @ANYRES32=0x0, @ANYBLOB="e0c55c5d9eb82ee4d00100010029a741efca44f937d049248204007296d961242a3fd1535ab766ba4c1a2a078c17b19b4e2e0c734057548c402dc43b3897cc275fd87f333c9631b8c40dd887fc8dd4f9ad4c079521dfdaf3d0fe090000", @ANYRESHEX], 0x0, 0x164}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:38:18 executing program 0: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 02:38:18 executing program 1: eventfd2(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000080)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f00000002c0)={'filter\x00', 0x4}, 0x68) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f0000000400)) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r4 = dup(r3) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000005c0)=0xff, 0x4) r5 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x418}}, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x1fb) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) r7 = open(&(0x7f0000000440)='./bus\x00', 0x101042, 0x140) ftruncate(r7, 0x2007fff) sendfile(r4, r7, 0x0, 0x8000fffffffe) socket$nl_generic(0x10, 0x3, 0x10) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000001c0)={0x0, r3, 0x6, 0x8, 0xff, 0x9}) fgetxattr(r3, &(0x7f0000000bc0)=ANY=[@ANYRESDEC, @ANYRESDEC=r0], &(0x7f0000000600)=""/78, 0xfffffffffffffef1) [ 202.672300] ptrace attach of "/root/syz-executor.1"[7574] was attempted by "/root/syz-executor.1"[7577] [ 202.697373] mmap: syz-executor.3 (7570) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 02:38:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) recvfrom$unix(r2, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) 02:38:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="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"], 0x30}}, 0x0) 02:38:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000005000001000080"]) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0xc0010141]}) [ 202.930114] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:38:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x80047437, 0x0) 02:38:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) recvfrom$unix(r2, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) 02:38:18 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) dup2(r0, r1) 02:38:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net//..\x00', 0x314ea2ec15e387bd, 0x0) 02:38:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000005000001000080"]) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0xc0010141]}) 02:38:18 executing program 4: mincore(&(0x7f00003fc000/0xc00000)=nil, 0xc00000, &(0x7f0000001280)=""/4096) 02:38:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 02:38:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000005000001000080"]) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0xc0010141]}) 02:38:19 executing program 1: syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, 0x0, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000300)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00'/203, 0x4) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, 0x0) 02:38:19 executing program 4: clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0xf4, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$getregs(0xc, r0, 0x0, &(0x7f0000000040)=""/14) select(0xfffffcc5, &(0x7f0000000000), &(0x7f0000000080), 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x2400000000000000, 0x9}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:38:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="240000001a0007041dfffd946f6105000a00000a1f000003002808000800030004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7", 0x49}], 0x1}, 0x0) 02:38:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 02:38:19 executing program 3: syz_open_dev$sg(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x612, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xc0}, 0x48) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x370800000000, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="8000f1f63804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 02:38:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0xc0010141]}) 02:38:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) [ 203.802107] ptrace attach of "/root/syz-executor.4"[7643] was attempted by "/root/syz-executor.4"[7645] 02:38:19 executing program 4: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 02:38:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_tcp_buf(r1, 0x6, 0x0, 0x0, &(0x7f0000000040)) 02:38:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0xc0010141]}) 02:38:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 02:38:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037}, 0x2c) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') [ 204.394246] EXT4-fs (loop3): bad geometry: block count 580964351930795064 exceeds size of device (66048 blocks) [ 204.506577] EXT4-fs (loop3): bad geometry: block count 580964351930795064 exceeds size of device (66048 blocks) 02:38:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-serpent-avx2)\x00'}, 0x58) 02:38:20 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0x10000007c) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) dup2(r0, r1) execve(&(0x7f00000004c0)='./file0/../file0\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 02:38:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0xc0010141]}) 02:38:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 02:38:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) recvmsg(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="6938025d2cc33f51"], 0xe) close(r1) close(r0) 02:38:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 02:38:20 executing program 3: pipe(&(0x7f0000000140)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup2(r0, 0xffffffffffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000003c0)=""/188, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x3}, &(0x7f0000000200), 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 204.684556] device nr0 entered promiscuous mode 02:38:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000005000001000080"]) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0xc0010141]}) 02:38:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 02:38:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) symlink(0x0, &(0x7f0000003200)='./file0\x00') rename(0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'vcan0\x00'}) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000380)) semget(0x3, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002e80)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) write$uinput_user_dev(r1, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) dup2(r0, r1) 02:38:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000005000001000080"]) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0xc0010141]}) 02:38:20 executing program 4: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) write$FUSE_POLL(r2, &(0x7f0000000040)={0x18}, 0x18) fallocate(r2, 0x20, 0x0, 0xfffffeff000) fallocate(r1, 0x8, 0x0, 0xfffffeff000) write$UHID_CREATE(r2, &(0x7f0000000200)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}, 0x120) [ 204.952280] device nr0 entered promiscuous mode [ 204.974784] input: syz1 as /devices/virtual/input/input5 [ 204.999135] input: failed to attach handler leds to device input5, error: -6 02:38:20 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8cff7cf9080000000a45204c696e7578"], 0x10) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) 02:38:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000005000001000080"]) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0xc0010141]}) 02:38:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 02:38:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.upper\x00', 0x0, 0x1e6, 0x2) 02:38:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) 02:38:20 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000005000001000080"]) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0xc0010141]}) [ 205.206090] SELinux: policydb string [ 205.206090] E Linux does not match my string SE Linux 02:38:20 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825a55f910c28f5e87a64820546a1ebed56adbd5b57f67b95778e2569f8e39808e0b61a0bf6a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d331de23d61ca62ef8d48f42ffd113acf060c105020d4882fc399eaab8787f0db6510490b0f420326bcc4e2b65e7c68bacee7877a6274d908e5a5d512b87ed3eb24d40d331edbedf8a03a722ffa87cc2df", @ANYRES16, @ANYPTR64, @ANYRESHEX, @ANYRES32=0x0, @ANYRESHEX], 0x0, 0xd7}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:38:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) [ 205.251482] SELinux: failed to load policy [ 205.257460] input: syz1 as /devices/virtual/input/input6 [ 205.305769] input: failed to attach handler leds to device input6, error: -6 02:38:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mlockall(0x7) [ 205.355147] ptrace attach of "/root/syz-executor.1"[7775] was attempted by "/root/syz-executor.1"[7776] 02:38:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) 02:38:20 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) 02:38:20 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000005000001000080"]) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0xc0010141]}) 02:38:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net//..\x00', 0x314ea2ec15e387bd, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() 02:38:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 02:38:20 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000005000001000080"]) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0xc0010141]}) 02:38:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 02:38:21 executing program 1: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00\xddd\xadR\xcd\xf0\x9ac=,\x814\xe9\xd1*c\f:\xe2p\x96\x0e<\x80\aY\xed@\x8f/\x0f\xedDVQ\xac\t\x8d\xbf\x91\xa2b]IG\xc1\x87r\xb0\xd69\xb1\xbdar\x83k\x0f\xa1Uj\xa0\xc6\x0e\xb3u\r\xaa\xad\xab\x7f4\f(\xea\xd2\xcc\a\x1f\x9a#\xa3#U\"\xa6\xf38\x80}\b\xdfE|\x12\xf5F\xd0F\xc45\x9b[\xa1D`I\xd4+\x1el\xb1k\x1c\xd9\x82\xa9B\xef\x01\xf4\'%\xef\xb6\xfa\xcd6\x8al\xe7)\x8d\x85\xce]\x9d\xcb\xc3\xe5J\x16\x88\xd2!R\x02+v2[\xef\x18\xb6\xacG9\x13\xcaa6\xaf4CH9\xf0\x99\xe85)\xbfFR3\a\x04\x9e$T\x80U\xcf\x94\xcf\x14^\xfc\xb7\x00\x00\x00\x00', &(0x7f0000000200)=@chain={'key_or_keyring:', r1, ':chain\x00'}) 02:38:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 02:38:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup(0xffffffffffffffff) getsockopt$inet_tcp_buf(r1, 0x6, 0x1a, 0x0, &(0x7f0000000040)) 02:38:21 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000005000001000080"]) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0xc0010141]}) 02:38:21 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xcb, &(0x7f0000000000), 0xc) 02:38:21 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x0, @loopback}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x0, @loopback}, {0xa, 0x0, 0x0, @remote}, r3}}, 0x48) 02:38:21 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) 02:38:21 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 02:38:21 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 02:38:21 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000005000001000080"]) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0xc0010141]}) 02:38:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:21 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 02:38:21 executing program 1: mlockall(0x3) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) clone(0x1080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) 02:38:21 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x0, @loopback}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x0, @loopback}, {0xa, 0x0, 0x0, @remote}, r3}}, 0x48) 02:38:21 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000005000001000080"]) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0xc0010141]}) 02:38:21 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 02:38:21 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000ecd000/0x4000)=nil, 0x4000, 0x1, 0x28812, r0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:38:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 02:38:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 02:38:21 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x2, &(0x7f0000000080)={0x8, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'sh\x00'}, 0x3) [ 206.243075] ------------[ cut here ]------------ [ 206.244320] kobject: 'loop3' (00000000a51da33e): kobject_uevent_env [ 206.244352] kobject: 'loop3' (00000000a51da33e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 206.249162] ODEBUG: free active (active state 1) object type: rcu_head hint: (null) [ 206.249385] WARNING: CPU: 0 PID: 7263 at lib/debugobjects.c:325 debug_print_object+0x168/0x250 [ 206.282494] Kernel panic - not syncing: panic_on_warn set ... [ 206.282494] 02:38:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f0000000080)=""/40, 0x28, 0x40000060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) [ 206.289855] CPU: 0 PID: 7263 Comm: syz-executor.4 Not tainted 4.19.75 #0 [ 206.296693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.306040] Call Trace: [ 206.308624] dump_stack+0x172/0x1f0 [ 206.312251] panic+0x263/0x507 [ 206.315445] ? __warn_printk+0xf3/0xf3 [ 206.315903] kobject: 'loop5' (00000000c855179d): kobject_uevent_env [ 206.319331] ? debug_print_object+0x168/0x250 [ 206.319343] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.319353] ? __warn.cold+0x5/0x4a [ 206.319361] ? __warn+0xe8/0x1d0 02:38:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0x2b, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000240)='D', 0x1}], 0x1}, 0xfc) [ 206.319374] ? debug_print_object+0x168/0x250 [ 206.325853] kobject: 'loop5' (00000000c855179d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 206.330242] __warn.cold+0x20/0x4a [ 206.330253] ? kasan_check_read+0x11/0x20 [ 206.330263] ? debug_print_object+0x168/0x250 [ 206.330275] report_bug+0x263/0x2b0 [ 206.330287] do_error_trap+0x204/0x360 [ 206.330297] ? math_error+0x340/0x340 [ 206.330307] ? vprintk_emit+0x1ab/0x690 [ 206.330318] ? error_entry+0x7c/0xe0 [ 206.330329] ? trace_hardirqs_off_caller+0x65/0x220 [ 206.330342] ? vprintk_default+0x28/0x30 [ 206.396853] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 206.398107] audit: type=1804 audit(1569724701.717:54): pid=7879 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir592333461/syzkaller.oWcpS6/19/bus" dev="sda1" ino=16608 res=1 [ 206.401693] do_invalid_op+0x1b/0x20 [ 206.401707] invalid_op+0x14/0x20 [ 206.435288] RIP: 0010:debug_print_object+0x168/0x250 [ 206.436266] kobject: 'loop2' (00000000c2a24880): kobject_uevent_env [ 206.440385] Code: dd 20 56 82 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 20 56 82 87 48 c7 c7 60 4b 82 87 e8 d6 04 19 fe <0f> 0b 83 05 cb 83 17 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 206.440390] RSP: 0018:ffff88805b1979d0 EFLAGS: 00010082 [ 206.440397] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 206.440403] RDX: 0000000000000000 RSI: ffffffff8155dbd6 RDI: ffffed100b632f2c [ 206.440410] RBP: ffff88805b197a10 R08: ffff88805b18a300 R09: ffffed1015d03ee3 [ 206.440415] R10: ffffed1015d03ee2 R11: ffff8880ae81f717 R12: 0000000000000001 [ 206.440424] R13: ffffffff8879f200 R14: 0000000000000000 R15: ffff888087863320 [ 206.448537] kobject: 'loop2' (00000000c2a24880): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 206.465702] ? vprintk_func+0x86/0x189 [ 206.465718] debug_check_no_obj_freed+0x29f/0x464 [ 206.465735] kmem_cache_free+0x18f/0x260 [ 206.505827] kobject: 'loop5' (00000000c855179d): kobject_uevent_env [ 206.507386] free_task+0xdd/0x120 [ 206.507396] __put_task_struct+0x20f/0x4c0 02:38:21 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8cff7cf908000000"], 0x8) 02:38:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000005000001000080"]) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0xc0010141]}) [ 206.507407] finish_task_switch+0x52b/0x780 [ 206.507422] __schedule+0x86e/0x1dc0 [ 206.507455] ? hrtimer_start_range_ns+0x665/0xc70 [ 206.507470] ? pci_mmcfg_check_reserved+0x170/0x170 [ 206.518811] kobject: 'loop5' (00000000c855179d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 206.520767] ? __hrtimer_get_remaining+0x1a0/0x1a0 [ 206.520779] ? lockdep_hardirqs_on+0x415/0x5d0 [ 206.552868] kobject: 'loop0' (0000000063503cf4): kobject_uevent_env [ 206.556581] schedule+0x92/0x1c0 [ 206.580547] SELinux: truncated policydb string identifier [ 206.586863] do_nanosleep+0x201/0x690 [ 206.586877] ? __debug_object_init+0x190/0xc30 [ 206.586888] ? schedule_timeout_idle+0x90/0x90 [ 206.586900] ? memset+0x32/0x40 [ 206.586917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.599983] kobject: 'loop0' (0000000063503cf4): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 206.604227] ? __hrtimer_init+0xe1/0x250 [ 206.604240] hrtimer_nanosleep+0x2a6/0x570 [ 206.627706] kobject: 'loop3' (00000000a51da33e): kobject_uevent_env [ 206.631123] ? nanosleep_copyout+0x110/0x110 [ 206.631138] ? _copy_from_user+0xdd/0x150 [ 206.635579] SELinux: failed to load policy [ 206.641743] ? clock_was_set_work+0x30/0x30 [ 206.641760] __x64_sys_nanosleep+0x1a6/0x220 [ 206.641771] ? hrtimer_nanosleep+0x570/0x570 [ 206.641782] ? do_syscall_64+0x26/0x620 [ 206.641792] ? lockdep_hardirqs_on+0x415/0x5d0 [ 206.641803] ? trace_hardirqs_on+0x67/0x220 [ 206.641814] do_syscall_64+0xfd/0x620 [ 206.641831] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.653437] kobject: 'loop3' (00000000a51da33e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 206.654564] RIP: 0033:0x457ed0 [ 206.654578] Code: c0 5b 5d c3 66 0f 1f 44 00 00 8b 04 24 48 83 c4 18 5b 5d c3 66 0f 1f 44 00 00 83 3d 81 e8 61 00 00 75 14 b8 23 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 24 d3 fb ff c3 48 83 ec 08 e8 ea 46 00 00 [ 206.720930] RSP: 002b:00007ffff9003968 EFLAGS: 00000246 ORIG_RAX: 0000000000000023 [ 206.728635] RAX: ffffffffffffffda RBX: 000000000003258e RCX: 0000000000457ed0 [ 206.735897] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007ffff9003970 [ 206.743159] RBP: 000000000000003f R08: 0000000000000001 R09: 00005555555de940 [ 206.750522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 206.757787] R13: 00007ffff90039c0 R14: 000000000003257b R15: 00007ffff90039d0 [ 206.765065] [ 206.765070] ====================================================== [ 206.765074] WARNING: possible circular locking dependency detected [ 206.765077] 4.19.75 #0 Not tainted [ 206.765082] ------------------------------------------------------ [ 206.765086] syz-executor.4/7263 is trying to acquire lock: [ 206.765089] 0000000072d88286 ((console_sem).lock){-.-.}, at: down_trylock+0x13/0x70 [ 206.765101] [ 206.765105] but task is already holding lock: [ 206.765108] 000000007b2985b5 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 206.765121] [ 206.765124] which lock already depends on the new lock. [ 206.765126] [ 206.765128] [ 206.765133] the existing dependency chain (in reverse order) is: [ 206.765134] [ 206.765136] -> #3 (&obj_hash[i].lock){-.-.}: [ 206.765148] _raw_spin_lock_irqsave+0x95/0xcd [ 206.765152] __debug_object_init+0xc6/0xc30 [ 206.765155] debug_object_init+0x16/0x20 [ 206.765158] hrtimer_init+0x2a/0x300 [ 206.765162] init_dl_task_timer+0x1b/0x50 [ 206.765166] __sched_fork+0x22a/0x4b0 [ 206.765169] init_idle+0x75/0x800 [ 206.765172] sched_init+0x952/0x9f0 [ 206.765175] start_kernel+0x402/0x8c5 [ 206.765179] x86_64_start_reservations+0x29/0x2b [ 206.765182] x86_64_start_kernel+0x77/0x7b [ 206.765186] secondary_startup_64+0xa4/0xb0 [ 206.765187] [ 206.765189] -> #2 (&rq->lock){-.-.}: [ 206.765201] _raw_spin_lock+0x2f/0x40 [ 206.765204] task_fork_fair+0x6a/0x520 [ 206.765208] sched_fork+0x3af/0x900 [ 206.765211] copy_process.part.0+0x1859/0x7a30 [ 206.765215] _do_fork+0x257/0xfd0 [ 206.765218] kernel_thread+0x34/0x40 [ 206.765221] rest_init+0x24/0x222 [ 206.765224] start_kernel+0x88c/0x8c5 [ 206.765228] x86_64_start_reservations+0x29/0x2b [ 206.765232] x86_64_start_kernel+0x77/0x7b [ 206.765235] secondary_startup_64+0xa4/0xb0 [ 206.765237] [ 206.765239] -> #1 (&p->pi_lock){-.-.}: [ 206.765251] _raw_spin_lock_irqsave+0x95/0xcd [ 206.765255] try_to_wake_up+0x94/0xf50 [ 206.765258] wake_up_process+0x10/0x20 [ 206.765261] __up.isra.0+0x136/0x1a0 [ 206.765264] up+0x9c/0xe0 [ 206.765267] __up_console_sem+0xb7/0x1c0 [ 206.765271] console_unlock+0x6c7/0x10b0 [ 206.765274] do_con_write.part.0+0xeec/0x1eb0 [ 206.765277] con_write+0x46/0xd0 [ 206.765280] n_tty_write+0x3f9/0x10f0 [ 206.765283] tty_write+0x458/0x7a0 [ 206.765286] __vfs_write+0x114/0x810 [ 206.765290] vfs_write+0x20c/0x560 [ 206.765293] ksys_write+0x14f/0x2d0 [ 206.765296] __x64_sys_write+0x73/0xb0 [ 206.765299] do_syscall_64+0xfd/0x620 [ 206.765303] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.765305] [ 206.765307] -> #0 ((console_sem).lock){-.-.}: [ 206.765320] lock_acquire+0x16f/0x3f0 [ 206.765323] _raw_spin_lock_irqsave+0x95/0xcd [ 206.765325] down_trylock+0x13/0x70 [ 206.765329] __down_trylock_console_sem+0xa8/0x210 [ 206.765332] console_trylock+0x15/0xa0 [ 206.765335] vprintk_emit+0x21d/0x690 [ 206.765344] vprintk_default+0x28/0x30 [ 206.765348] vprintk_func+0x7e/0x189 [ 206.765351] printk+0xba/0xed [ 206.765354] __warn_printk+0x9b/0xf3 [ 206.765358] debug_print_object+0x168/0x250 [ 206.765361] debug_check_no_obj_freed+0x29f/0x464 [ 206.765365] kmem_cache_free+0x18f/0x260 [ 206.765368] free_task+0xdd/0x120 [ 206.765371] __put_task_struct+0x20f/0x4c0 [ 206.765375] finish_task_switch+0x52b/0x780 [ 206.765378] __schedule+0x86e/0x1dc0 [ 206.765381] schedule+0x92/0x1c0 [ 206.765384] do_nanosleep+0x201/0x690 [ 206.765388] hrtimer_nanosleep+0x2a6/0x570 [ 206.765391] __x64_sys_nanosleep+0x1a6/0x220 [ 206.765395] do_syscall_64+0xfd/0x620 [ 206.765399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.765401] [ 206.765404] other info that might help us debug this: [ 206.765406] [ 206.765409] Chain exists of: [ 206.765411] (console_sem).lock --> &rq->lock --> &obj_hash[i].lock [ 206.765425] [ 206.765429] Possible unsafe locking scenario: [ 206.765431] [ 206.765434] CPU0 CPU1 [ 206.765437] ---- ---- [ 206.765439] lock(&obj_hash[i].lock); [ 206.765447] lock(&rq->lock); [ 206.765455] lock(&obj_hash[i].lock); [ 206.765462] lock((console_sem).lock); [ 206.765469] [ 206.765472] *** DEADLOCK *** [ 206.765473] [ 206.765477] 1 lock held by syz-executor.4/7263: [ 206.765479] #0: 000000007b2985b5 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 206.765494] [ 206.765497] stack backtrace: [ 206.765501] CPU: 0 PID: 7263 Comm: syz-executor.4 Not tainted 4.19.75 #0 [ 206.765507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.765510] Call Trace: [ 206.765513] dump_stack+0x172/0x1f0 [ 206.765517] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 206.765520] __lock_acquire+0x2e19/0x49c0 [ 206.765524] ? mark_held_locks+0x100/0x100 [ 206.765527] ? format_decode+0x25f/0xbc0 [ 206.765531] ? enable_ptr_key_workfn+0x30/0x30 [ 206.765534] ? kvm_clock_read+0x18/0x30 [ 206.765538] lock_acquire+0x16f/0x3f0 [ 206.765541] ? down_trylock+0x13/0x70 [ 206.765544] _raw_spin_lock_irqsave+0x95/0xcd [ 206.765548] ? down_trylock+0x13/0x70 [ 206.765551] ? vprintk_emit+0x21d/0x690 [ 206.765554] down_trylock+0x13/0x70 [ 206.765557] ? vprintk_emit+0x21d/0x690 [ 206.765561] __down_trylock_console_sem+0xa8/0x210 [ 206.765564] console_trylock+0x15/0xa0 [ 206.765568] vprintk_emit+0x21d/0x690 [ 206.765571] vprintk_default+0x28/0x30 [ 206.765574] vprintk_func+0x7e/0x189 [ 206.765577] printk+0xba/0xed [ 206.765581] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 206.765584] ? __warn_printk+0x8f/0xf3 [ 206.765587] __warn_printk+0x9b/0xf3 [ 206.765590] ? add_taint.cold+0x16/0x16 [ 206.765594] debug_print_object+0x168/0x250 [ 206.765597] debug_check_no_obj_freed+0x29f/0x464 [ 206.765601] kmem_cache_free+0x18f/0x260 [ 206.765604] free_task+0xdd/0x120 [ 206.765607] __put_task_struct+0x20f/0x4c0 [ 206.765611] finish_task_switch+0x52b/0x780 [ 206.765614] __schedule+0x86e/0x1dc0 [ 206.765618] ? hrtimer_start_range_ns+0x665/0xc70 [ 206.765622] ? pci_mmcfg_check_reserved+0x170/0x170 [ 206.765625] ? __hrtimer_get_remaining+0x1a0/0x1a0 [ 206.765629] ? lockdep_hardirqs_on+0x415/0x5d0 [ 206.765632] schedule+0x92/0x1c0 [ 206.765635] do_nanosleep+0x201/0x690 [ 206.765639] ? __debug_object_init+0x190/0xc30 [ 206.765642] ? schedule_timeout_idle+0x90/0x90 [ 206.765645] ? memset+0x32/0x40 [ 206.765649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.765653] ? __hrtimer_init+0xe1/0x250 [ 206.765656] hrtimer_nanosleep+0x2a6/0x570 [ 206.765660] ? nanosleep_copyout+0x110/0x110 [ 206.765663] ? _copy_from_user+0xdd/0x150 [ 206.765666] ? clock_was_set_work+0x30/0x30 [ 206.765670] __x64_sys_nanosleep+0x1a6/0x220 [ 206.765673] ? hrtimer_nanosleep+0x570/0x570 [ 206.765677] ? do_syscall_64+0x26/0x620 [ 206.765680] ? lockdep_hardirqs_on+0x415/0x5d0 [ 206.765684] ? trace_hardirqs_on+0x67/0x220 [ 206.765687] do_syscall_64+0xfd/0x620 [ 206.765691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.765694] RIP: 0033:0x457ed0 [ 206.765704] Code: c0 5b 5d c3 66 0f 1f 44 00 00 8b 04 24 48 83 c4 18 5b 5d c3 66 0f 1f 44 00 00 83 3d 81 e8 61 00 00 75 14 b8 23 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 24 d3 fb ff c3 48 83 ec 08 e8 ea 46 00 00 [ 206.765708] RSP: 002b:00007ffff9003968 EFLAGS: 00000246 ORIG_RAX: 0000000000000023 [ 206.765716] RAX: ffffffffffffffda RBX: 000000000003258e RCX: 0000000000457ed0 [ 206.765721] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007ffff9003970 [ 206.765726] RBP: 000000000000003f R08: 0000000000000001 R09: 00005555555de940 [ 206.765730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 206.765735] R13: 00007ffff90039c0 R14: 000000000003257b R15: 00007ffff90039d0 [ 206.767070] Kernel Offset: disabled [ 207.529062] Rebooting in 86400 seconds..