[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 34.576082] audit: type=1800 audit(1556023062.934:33): pid=7004 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 34.603070] audit: type=1800 audit(1556023062.934:34): pid=7004 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 [ 34.870585] random: sshd: uninitialized urandom read (32 bytes read) [ 35.245253] audit: type=1400 audit(1556023063.604:35): avc: denied { map } for pid=7176 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 35.324187] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 36.052910] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.44' (ECDSA) to the list of known hosts. [ 44.192813] random: sshd: uninitialized urandom read (32 bytes read) 2019/04/23 12:37:52 fuzzer started [ 44.400149] audit: type=1400 audit(1556023072.754:36): avc: denied { map } for pid=7185 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 46.117244] random: cc1: uninitialized urandom read (8 bytes read) 2019/04/23 12:37:55 dialing manager at 10.128.0.105:46537 2019/04/23 12:37:55 syscalls: 2434 2019/04/23 12:37:55 code coverage: enabled 2019/04/23 12:37:55 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/04/23 12:37:55 extra coverage: extra coverage is not supported by the kernel 2019/04/23 12:37:55 setuid sandbox: enabled 2019/04/23 12:37:55 namespace sandbox: enabled 2019/04/23 12:37:55 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/23 12:37:55 fault injection: enabled 2019/04/23 12:37:55 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/23 12:37:55 net packet injection: enabled 2019/04/23 12:37:55 net device setup: enabled [ 48.653127] random: crng init done 12:39:56 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x250) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="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") getresuid(&(0x7f00000003c0)=0x0, &(0x7f0000000400)=0x0, &(0x7f0000000440)) r3 = getuid() getresuid(&(0x7f0000000480), &(0x7f00000004c0)=0x0, &(0x7f0000000500)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000780)=0xe8) r7 = getuid() syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0xfffffffffffffff8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="04dfb6c0989be9423505a35370b7e2065db3ec96c9c72f3e3fa97e9fe1d22dc0b70b897b2c08acbee77ed079c243f9e94914e470a9feaef34631a62e43df938d2e82456c465aad04f068e7b8a74ac2a70d2683f702097381b30449fcf8add0985159435c7282070e03af32fa2e257237700b0fb41a3467fcd79f3a9a7c7b25384beed79471af13629daf2a174f3639cbb7c79464bdbca874940a8c7f760a7052c7", 0xa1, 0x5}, {&(0x7f00000002c0)="4c723abcb740b724ecea5854eb2b41b349df95b5f33e919dbc858035765bb7bd5515566d2700cd37a365c3a0051710d62a6d371a26be26f6d569e70eab772f9f42a1e1ff5e082fb2ebbd86e1cff63cab72d600bb0a98c5b84dbc1a3033220c40104a3895180aec0420eb28c5c0cbc11cd0980867874c9c563e3e7f9ecb1b575f8e5ec9d8473ac60536056d2ff01d95c6bb4677db076b05858a26ac37d72f4448b2d061817c4e9b3f2f0c5ff43387069851e530e66a59866b3884c3", 0xbb, 0x6}], 0x40, &(0x7f00000007c0)={[{@map_off='map=off'}, {@iocharset={'iocharset', 0x3d, 'cp865'}}, {@map_off='map=off'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0xd1d3}}, {@sbsector={'sbsector', 0x3d, 0xfff}}, {@hide='hide'}, {@check_strict='check=strict'}], [{@dont_hash='dont_hash'}, {@fowner_lt={'fowner<', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@euid_lt={'euid<', r4}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3e, 0x64, 0x77, 0x3b, 0x32, 0x38, 0x77], 0x2d, [0x61, 0x31, 0x67, 0x39], 0x2d, [0x37, 0x77, 0x66], 0x2d, [0x63, 0x7f, 0x31, 0x32], 0x2d, [0x30, 0x33, 0x65, 0x62, 0x33, 0x77, 0x37, 0x62]}}}, {@fowner_lt={'fowner<', r5}}, {@fowner_gt={'fowner>', r6}}, {@audit='audit'}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/null\x00'}}, {@uid_lt={'uid<', r7}}]}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r8, 0xc0106403, &(0x7f0000000980)={0x9bd, 0x2, 0x10001, 0x200}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r8, 0xc01064b5, &(0x7f0000000a00)={&(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0], 0x4}) arch_prctl$ARCH_GET_CPUID(0x1011) lsetxattr$trusted_overlay_opaque(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)='trusted.overlay.opaque\x00', &(0x7f0000000ac0)='y\x00', 0x2, 0x3) fchmod(r0, 0x8) r9 = syz_open_dev$dmmidi(&(0x7f0000000b00)='/dev/dmmidi#\x00', 0x6, 0x0) ioctl$EVIOCGUNIQ(r9, 0x80404508, &(0x7f0000000b40)=""/53) openat$rtc(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/rtc0\x00', 0x400, 0x0) r10 = getgid() write$P9_RSTATu(r0, &(0x7f0000000bc0)={0x77, 0x7d, 0x2, {{0x0, 0x5e, 0x5, 0xc2, {0xc3, 0x4, 0x6}, 0x0, 0x100000000, 0x100000000, 0x7fff, 0x17, 'trusted.overlay.opaque\x00', 0xb, 'em0vboxnet1', 0x4, 'euid', 0x5, 'audit'}, 0x4, 'uid<', r1, r10, r1}}, 0x77) getsockopt$inet_dccp_int(r9, 0x21, 0x1, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) getsockopt$inet_sctp_SCTP_RTOINFO(r9, 0x84, 0x0, &(0x7f0000000cc0)={0x0, 0xccd8, 0x0, 0x7}, &(0x7f0000000d00)=0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000d40)={r11, 0xb7, "b5ea8a3fd78adaf8b98bd94e24a5014c8fb7ccde3b0648e2db594b2abe437b837f9ac904c0ac415596545c1ee52563df09ca31f893d646994eb13f2fed1fe64675a96b6ecfb46163672a44e0e2670e4b409efed2439ccd3023137bd420bf821137cf3d52d7609334e27c255169d0368aed92f55b1c3a0ef73a6397ce44cf8df5c16e6c3c5b819d34c9bb76600515dec6dd7521e6c7891d9ddff242a7359ef9af348a7776ff60532bd3e0edd5ce13b34ca9e635ea299f38"}, &(0x7f0000000e00)=0xbf) clock_gettime(0x0, &(0x7f0000000e80)={0x0, 0x0}) utimensat(r9, &(0x7f0000000e40)='./file0\x00', &(0x7f0000000ec0)={{0x77359400}, {r12, r13/1000+30000}}, 0x100) keyctl$join(0x1, &(0x7f0000000f00)={'syz', 0x0}) ioctl$VIDIOC_G_STD(r9, 0x80085617, &(0x7f0000000f40)) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000f80)={r11, 0x3}, &(0x7f0000000fc0)=0x8) openat$cgroup_procs(r9, &(0x7f0000001000)='cgroup.threads\x00', 0x2, 0x0) 12:39:56 executing program 0: getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000080)=0x0) r2 = getegid() setgroups(0x2, &(0x7f00000000c0)=[r0, r2]) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r3, &(0x7f0000000240)={0x74, 0x7d, 0x1, {{0x0, 0x5c, 0x4, 0x8, {0x26}, 0xa2040000, 0x5, 0x3, 0x401, 0xe, 'wlan1mime_type', 0x14, 'keyringselinuxcpuset', 0x7, 'em1bdev'}, 0x3, '{{&', r4, r1, r5}}, 0x74) r6 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r6) ioctl$VIDIOC_SUBDEV_G_EDID(r3, 0xc0285628, &(0x7f0000000300)={0x0, 0x67b0cc5f, 0x200, [], &(0x7f00000002c0)=0x200}) getsockname$packet(r3, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000700)=0x14) setsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1, 0x4e22, 0x7, 0x4e22, 0x6, 0x0, 0xa0, 0x80, 0x6c, r7, r4}, {0x3ff, 0x1f, 0x6f5, 0x80000001, 0x1, 0x6, 0x7fc0000000}, {0x101, 0x7fffffff, 0x4c4f, 0x5}, 0x6, 0x6e6bb6, 0x2, 0x1, 0x2, 0x3}, {{@in6=@mcast2, 0x4d4, 0x32}, 0x2, @in=@remote, 0x3505, 0x3, 0x3, 0x7, 0x7fffffff, 0x4}}, 0xe8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000840)={0x1, [0x7]}, 0x6) getsockopt$rose(r3, 0x104, 0x5, &(0x7f0000000880), &(0x7f00000008c0)=0x4) r8 = accept(r3, &(0x7f0000000900)=@hci, &(0x7f0000000980)=0x80) r9 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r9) syz_genetlink_get_family_id$tipc(&(0x7f00000009c0)='TIPC\x00') setsockopt$inet_sctp6_SCTP_EVENTS(r8, 0x84, 0xb, &(0x7f0000000a00)={0x8, 0xb13, 0xab, 0x100000001, 0x4, 0xd1f, 0x20, 0x1, 0x8, 0x3}, 0xb) shutdown(r8, 0x1) pipe2(&(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) fcntl$setsig(r11, 0xa, 0x3c) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) ioctl$sock_bt_bnep_BNEPCONNDEL(r8, 0x400442c9, &(0x7f0000000b40)={0x5, @remote}) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f0000000b80)=""/171) sendmsg$unix(r8, &(0x7f0000000e00)={&(0x7f0000000c40)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000dc0)=[{&(0x7f0000000cc0)="11043fc435524edcf776c4a09c0fb42e9a09948f6b187a60b5e0c06c48ecb43f7016fa7ad248ac96a81fd9b8864ef9dc86386e432ccd2f512857d9c608bb9c43d64db31cb7730b64487ee5f63e2830dab9af8fa67ae252eb7fd639fa9da75eda86218cf8f761c87a09552991b357f427096e534467042062666a38468d84c58188ccb6780f2bd04e874ded893be5c8833f3a346e8b4457aac559ad0926c16ab175b8cf6e500cf813ef3c0783f446a18a8c4f7880bc9c4e34f57858c3078f0e62f218fa64fbe24eeca37aee70a561265fd9701f1b8903697038d5b8cc501e03e1737723216f254a8f7fb00d690a6f57c387", 0xf1}], 0x1, 0x0, 0x0, 0x4}, 0x40) ioctl$VHOST_GET_FEATURES(r10, 0x8008af00, &(0x7f0000000e40)) ioprio_get$pid(0x2, r9) ioctl$sock_inet_SIOCDARP(r11, 0x8953, &(0x7f0000000e80)={{0x2, 0x4e20, @loopback}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x4, {0x2, 0x4e23, @empty}, 'hwsim0\x00'}) ptrace$peekuser(0x3, r9, 0x72) 12:39:56 executing program 3: openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x400000, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x501001, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@null=' \x00', 0xc, 'vxcan1\x00'}) write$P9_ROPEN(r0, &(0x7f00000002c0)={0x18, 0x71, 0x1, {{0x50, 0x4}, 0x3}}, 0x18) semget(0x2, 0x3, 0x80) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @broadcast}, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000440)=0xe8) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={0x0, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x22}}, 0x80, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000480)='netdevsim0\x00', 0xfffffffffffffe01, 0xf18b, 0x7fff}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000540)={0x0, 0x0, [], @raw_data=[0x7fffffff, 0x2, 0x7f, 0xfffffffffffffffb, 0x7, 0x200, 0x2, 0x10001, 0x6, 0x2, 0x8, 0x60000000000, 0x40, 0xffff, 0x2, 0x33, 0x40, 0x9, 0x0, 0xe254, 0x9, 0x7, 0x1, 0x7, 0x5, 0x7, 0x8, 0xffffffffffffff3d, 0x2b, 0x10001, 0x5922, 0x10001]}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000600)={{0x6, 0x2, 0xffffffff00000000, 0x8, 0x80000000, 0xd4}, 0x1}) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000640)={{0xff, @empty, 0x4e21, 0x2, 'fo\x00', 0x4, 0x200, 0x36}, {@empty, 0x4e22, 0x2000, 0x3, 0x800, 0x80}}, 0x44) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000006c0)={0x0}, &(0x7f0000000700)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000740)={0x0, 0x2c, "4834951e0bb3542e9cb362a1ab64267b912749fb038ce228251b6511787d58fb11a20e44410683f9fb4fa90e"}, &(0x7f0000000780)=0x34) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000007c0)={r1, 0x577, 0xfff00000, 0x9, 0x565, 0x3004, 0x81, 0x4, {r2, @in6={{0xa, 0x4e22, 0xb3, @local}}, 0x1ff, 0x3f, 0x4, 0x9, 0x5}}, &(0x7f0000000880)=0xb0) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f00000008c0)={0xa7, 0x1, 'client0\x00', 0x3, "6d086a4421d4cdc2", "2cf9a9d78483d27707e4d391262727499962e37e5d652fac93d5480c7e7671f7", 0x1, 0x6}) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000980)='syz0\x00') r3 = semget$private(0x0, 0x1, 0x0) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f00000009c0)=""/220) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000ac0)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000b00)={0x0, r4, 0x2}) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000b80)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r5, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000cc0)={0x4, &(0x7f0000000c80)=[{0x7, 0xfffffffffffffff7}, {0x10001, 0x7}, {0x3}, {0x6, 0x2}]}) open_by_handle_at(r0, &(0x7f0000000d00)={0xa7, 0x4, "84e3be7bb1fa5fde6b2723a9e6251c9c1f8b996c34c94f7d7289f7848798c77f5b330bf979fd9c8da569a82da3f0f46b58191936c4b10512444360ae0a87e72fbf1af8f47b950ef9a008bca3d502f3382cd079f01b3f09af0f1194456ba3dbbe5acb65f3e707ecf0ef41eec00ef3582a6b8e378abead38ad0febd20d89881cb01c8c7e86b2836899f86315fa6190523bc36de8ce54c199217d6bf85989221c"}, 0x4000) r6 = syz_open_dev$mouse(&(0x7f0000000dc0)='/dev/input/mouse#\x00', 0x7, 0x800) ioctl$sock_proto_private(r6, 0x24c, &(0x7f0000000e00)="21b3860b66c856f5d54a96498f4073262f40803220bc2529bf5b17e3476efbaae4ad0d4e751549323e6f779785392e5f252658571e5e730938e91cd2867e2315305e522167a0329bc54694048564ed14859d6b35f8cd6c76d7b435b131293cccf0663b4a4b78081dcb992c54fa9cea6b30fd8fd94eec71d5d4012d6942fc07b9e31b12f22c5193e7bb2d7e4e3bf349e04027a779fa1dff619f184389a211f38ff2ab9a4f6f94a3d8") ioctl$VIDIOC_QBUF(r6, 0xc058560f, &(0x7f0000000ec0)={0x4, 0x0, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0xa, 0x0, 0x100000001, 0x46c, 0x6, "ac988a10"}, 0x6, 0x4, @fd, 0x4}) 12:39:56 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x204141, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x81, @empty, 0x9}, @in6={0xa, 0x9, 0x9f05fc7, @rand_addr="b8965ef654337a2186e6d59654befcbd", 0x2}, @in6={0xa, 0x4e23, 0x0, @empty, 0x8}, @in={0x2, 0x8, @broadcast}, @in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e24, 0x5, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}, 0xffffffffffffff9c}, @in6={0xa, 0x4e22, 0x3f21, @local, 0x3}, @in6={0xa, 0x4e20, 0x9, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xfffffffffffffc00}], 0xd8) r1 = semget$private(0x0, 0x4, 0x2) r2 = geteuid() fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000240)={{0x1, r2, r3, r4, r5, 0x4, 0x7}, 0x16, 0x7, 0xfffffffffffffff7}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000002c0)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000300)=0x1c) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000340)={0xdfa, 0x820e, 0x20, 0x3, r7}, &(0x7f0000000380)=0x10) open_by_handle_at(r0, &(0x7f00000003c0)={0xee, 0x748, "6e7c41072b2b4e697439e490b0a3b2e88144ef3ddf9ad2b2718df7bea24e5a2989354c4f0ec222d9253d2fa24ecd7250b80991ab7c691b85bc22ebcb00d84395d28305c619ff0c5a6a19577e413ad23a58cdf7165db6e8ac38cde0c900120fed1c2ac0bebaca044c2ea9a4b407636a248965047d71e479089084e3801a6b19647e04b5bb052cc5939316803f53f832757cb3bd8fe4044d0127624bf3b482e2839e466f31896078e001f3cb839a37e220370cb34012a80813cd98858ed32e8cf01a697bd9cc53de1e7bc9e9840fdb7734630302b251f04fb69e27708ac1aba0caea64cabb3fac"}, 0x80000) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f00000004c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, r4}) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000500)=@assoc_id=r6, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000540)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000580)=0x10) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000005c0)=0x1, 0x4) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) write$P9_RXATTRWALK(r0, &(0x7f0000000600)={0xf, 0x1f, 0x2, 0x2}, 0xf) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000640)="28fc4b8e4a685dae669cb7faa7cc9583cfe61e8f0d2192ef16909ae59e6ac97ddaadc50a7fbfe44a2582e931df1e76151f7c8663ed51e45e3be83b212fe3c6aa92ed8989e99603434324ba44628df3d4630fa7bb82169d3fe7") fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000006c0)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) r9 = openat$null(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/null\x00', 0x14d00, 0x0) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000840)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000900)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x24, r10, 0x301, 0x70bd28, 0x25dfdbfb, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x1ff}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4005}, 0x40000) write$capi20(r0, &(0x7f0000000940)={0x10, 0x0, 0x0, 0x83, 0x6, 0x4}, 0x10) ioctl$sock_TIOCOUTQ(r9, 0x5411, &(0x7f0000000980)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a00)={&(0x7f00000009c0)='./file0\x00'}, 0x10) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000a40)=""/56) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r9, 0x84, 0x78, &(0x7f0000000a80)=r8, 0x4) syz_mount_image$btrfs(&(0x7f0000000ac0)='btrfs\x00', &(0x7f0000000b00)='./file0\x00', 0x1, 0x2, &(0x7f0000000c40)=[{&(0x7f0000000b40)="eabad740fd87ea47af61321898d2a13a71c9f27f3b024386d81ce5", 0x1b, 0x9}, {&(0x7f0000000b80)="e0a99f47f3a24014447d155e13125aa4508a4cbbdf8862e09d52f62c4eddafdd2b51bd0d01641726d9d3934d9053239b8750262644517e402f0cf1623e372623ec4ad9c15addbb181766e96c71954b807b1e2af2f3996e3a1b556cbb1191a56c28aa42732e144d177020f060f63247a2c86657a4d5083d509f6c187e78b6976a6051446792ab918e30d3f6a08ffe24679737c83ff4e4c4e36a157f47b55e4a0a5ccbc33d8cb0d93a4f30", 0xaa, 0x8}], 0x10000, &(0x7f0000000c80)={[{@usebackuproot='usebackuproot'}, {@metadata_ratio={'metadata_ratio', 0x3d, 0x8}}, {@barrier='barrier'}, {@compress_force='compress-force'}], [{@dont_measure='dont_measure'}, {@audit='audit'}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/vga_arbiter\x00'}}, {@euid_gt={'euid>', r2}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000e00)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000f00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000f40)={'team0\x00', r11}) 12:39:56 executing program 2: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000040)=0x3, 0x4) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x8) setsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f0000000080)="045caa805a6d71eccdfa", 0xa) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000100)=""/70) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000180)) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000001c0)={0x0, 0x0, [0x7, 0x7fffffff, 0x100, 0x8cd]}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000240), &(0x7f0000000280)=0x4) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)={0x2a, 0x4, 0x0, {0x1, 0x0, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) clock_adjtime(0x5, &(0x7f0000000300)={0x40, 0x7, 0x51f, 0x1, 0x2, 0x1, 0x9b, 0x617, 0x2, 0x2, 0x3, 0xffffffffffffffe0, 0x5, 0x40, 0xb0, 0x81, 0xd9b, 0x2, 0x4, 0x7f, 0x8, 0xff, 0x5, 0x7, 0x80000001, 0x7f}) r1 = mq_open(&(0x7f0000000400)='cpusetnodev\x00', 0x0, 0x10, &(0x7f0000000440)={0x30, 0x0, 0xffffffffffffff45, 0x15e, 0x3, 0x100000000, 0x9, 0x7}) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000480)) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f00000004c0)="0296a7ba87884d4a7372af90c27e831bf28c1e97ecdd6cab2659675c693cdbb11abe45e36cfe3cba9d75bfde308f3dc2e07c16310cd64916e7ecb83498cd7e5bcba7634eab26827d727e6902c83df86919045aca75afa904f18a187f24bae038dd3f52a57b70cfb6684b7d9068b4d4798d7310c544d259de23427f83fc245b7ec0834af934313303995627582c7f0e1a35773f3105aadf58323644403dd1e4c804af727c2571ede43a079d44528c591a6e63f82d85344c6d82ccd5139c3bc8659c176a0d7ee716f5d7cba236e5", 0xcd) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000005c0)) r2 = getpid() fcntl$lock(r1, 0x24, &(0x7f0000000600)={0x2, 0x5, 0x2, 0x3, r2}) write$P9_ROPEN(r0, &(0x7f0000000640)={0x18, 0x71, 0x1, {{0x50, 0x4, 0x3}, 0x4}}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_dccp_buf(r0, 0x21, 0xcf, &(0x7f0000000680)=""/161, &(0x7f0000000740)=0xa1) ioctl$VT_WAITACTIVE(r0, 0x5607) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000780)) r3 = add_key$user(&(0x7f00000007c0)='user\x00', &(0x7f0000000800)={'syz', 0x0}, &(0x7f0000000840)="9edbf323e451f04814564bce9045e28aacc70eb81222a657c992eac81bb8bd647a5e834790bfc005c1d805adfb59280a976d1165a2abb0b12cedaaf728570a70dd4c92556a5665a39030d43d98470f7f597739f2ee2bedcafcd0270f882f2d74bb92fb422651d60c3bc891978fb9ac7905436bd71e95c6176e48428ae64045569c950dd0ee4b08a49d9c69ac25d8ab886414dcdbeb90e260", 0x98, 0x0) keyctl$assume_authority(0x10, r3) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000009c0)={0x0, 0x0, 0x0}, &(0x7f0000000a00)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a40)={0x0, 0x0, 0x0}, &(0x7f0000000a80)=0xc) setgroups(0x3, &(0x7f0000000ac0)=[r4, r5, r6]) 12:39:56 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000040)={0x81, 0x9, 0x9, 0x8}) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000080)=0x100) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'user.', '\x00'}) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000140)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x3, 0x1000, 0xb, 0x8001}) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000001c0)) fchmodat(r0, &(0x7f0000000200)='./file0\x00', 0x4) connect$unix(r0, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) fsetxattr$security_capability(r0, &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000300)=@v2={0x2000000, [{0x1b2, 0x200}, {0x2, 0x800}]}, 0x14, 0x2) truncate(&(0x7f0000000340)='./file1\x00', 0x1f) mknodat(r0, &(0x7f0000000380)='./file0\x00', 0x8, 0x2) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x34, r1, 0x300, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x8, 0x8, @udp='udp:syz0\x00'}}}, ["", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x48081) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) sched_getparam(r2, &(0x7f0000000580)) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f00000005c0)=""/130, &(0x7f0000000680)=0x82) syslog(0xa, &(0x7f00000006c0)=""/181, 0xb5) write$FUSE_OPEN(r0, &(0x7f0000000780)={0x20, 0xfffffffffffffff5, 0x6, {0x0, 0x1}}, 0x20) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f00000007c0)=0x800) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000800)={{0x8, 0x8}, 'port1\x00', 0x18, 0x0, 0x100, 0xec4, 0xf8, 0x5, 0x8, 0x0, 0x3}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000008c0)={0xc0, {{0xa, 0x7fffffff, 0xd7e, @dev={0xfe, 0x80, [], 0x1d}, 0x3}}}, 0x88) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000980)) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f00000009c0)) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000b00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x68, r1, 0x2, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x9, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8800}, 0x4000000) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000b40)) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000b80)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000f40)={0x6, &(0x7f0000000bc0)=[{}, {}, {}, {}, {}, {}]}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000fc0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000001100)={&(0x7f0000000f80)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000010c0)={&(0x7f0000001000)={0xb8, r4, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x100000001}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xa09}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x400}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffffffff00000000}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x71}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x20008810) [ 168.225065] audit: type=1400 audit(1556023196.584:37): avc: denied { map } for pid=7185 comm="syz-fuzzer" path="/root/syzkaller-shm627872505" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 168.280606] audit: type=1400 audit(1556023196.614:38): avc: denied { map } for pid=7202 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13785 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 169.130188] IPVS: ftp: loaded support on port[0] = 21 [ 169.465416] chnl_net:caif_netlink_parms(): no params data found [ 169.474429] IPVS: ftp: loaded support on port[0] = 21 [ 169.524801] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.531711] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.538724] device bridge_slave_0 entered promiscuous mode [ 169.547946] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.554367] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.561440] device bridge_slave_1 entered promiscuous mode [ 169.591619] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 169.600846] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 169.625738] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 169.632744] IPVS: ftp: loaded support on port[0] = 21 [ 169.634179] team0: Port device team_slave_0 added [ 169.651407] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 169.658421] team0: Port device team_slave_1 added [ 169.666340] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 169.699767] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 169.729406] chnl_net:caif_netlink_parms(): no params data found [ 169.812011] device hsr_slave_0 entered promiscuous mode [ 169.860384] device hsr_slave_1 entered promiscuous mode [ 169.913225] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 169.930323] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 169.953728] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.960246] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.967144] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.973567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.005520] IPVS: ftp: loaded support on port[0] = 21 [ 170.056021] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.062899] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.069969] device bridge_slave_0 entered promiscuous mode [ 170.077217] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.084036] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.091341] device bridge_slave_1 entered promiscuous mode [ 170.114007] chnl_net:caif_netlink_parms(): no params data found [ 170.159534] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 170.168951] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 170.209444] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 170.216991] team0: Port device team_slave_0 added [ 170.225084] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 170.232406] team0: Port device team_slave_1 added [ 170.244283] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.251454] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.258674] device bridge_slave_0 entered promiscuous mode [ 170.265751] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 170.274191] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 170.297158] IPVS: ftp: loaded support on port[0] = 21 [ 170.305450] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.312008] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.319425] device bridge_slave_1 entered promiscuous mode [ 170.373180] device hsr_slave_0 entered promiscuous mode [ 170.440298] device hsr_slave_1 entered promiscuous mode [ 170.524542] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.532311] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.546213] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 170.553913] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 170.562420] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 170.574116] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 170.612040] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 170.619226] team0: Port device team_slave_0 added [ 170.626877] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 170.634064] team0: Port device team_slave_1 added [ 170.655566] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 170.706955] chnl_net:caif_netlink_parms(): no params data found [ 170.724210] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 170.792107] device hsr_slave_0 entered promiscuous mode [ 170.830406] device hsr_slave_1 entered promiscuous mode [ 170.903544] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 170.917502] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 170.926044] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.934531] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 170.952283] IPVS: ftp: loaded support on port[0] = 21 [ 170.958622] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 170.981649] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 170.988889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.996998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.052168] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.058555] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.067848] device bridge_slave_0 entered promiscuous mode [ 171.075081] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.081890] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.089082] device bridge_slave_1 entered promiscuous mode [ 171.102403] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 171.110172] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 171.116249] 8021q: adding VLAN 0 to HW filter on device team0 [ 171.165836] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 171.180543] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 171.202749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.210713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.218300] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.224686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.231756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.239548] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.247252] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.253606] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.270929] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 171.287552] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 171.299343] chnl_net:caif_netlink_parms(): no params data found [ 171.311950] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 171.324831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 171.335905] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 171.368716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 171.379643] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 171.439785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 171.447570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 171.455574] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.463586] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 171.471064] team0: Port device team_slave_0 added [ 171.496030] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 171.506823] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 171.513994] team0: Port device team_slave_1 added [ 171.522806] chnl_net:caif_netlink_parms(): no params data found [ 171.531890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.539673] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.553342] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.559752] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.567350] device bridge_slave_0 entered promiscuous mode [ 171.575109] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.581699] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.588612] device bridge_slave_1 entered promiscuous mode [ 171.603670] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 171.611342] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 171.634440] 8021q: adding VLAN 0 to HW filter on device bond0 [ 171.642788] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 171.669458] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 171.685554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.693413] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.703141] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 171.765223] device hsr_slave_0 entered promiscuous mode [ 171.810531] device hsr_slave_1 entered promiscuous mode [ 171.851603] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 171.859433] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 171.874510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.882357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.891497] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 171.907939] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 171.923198] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.929638] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.937047] device bridge_slave_0 entered promiscuous mode [ 171.944340] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 171.950525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.973378] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 171.979637] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.987059] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.994503] device bridge_slave_1 entered promiscuous mode [ 172.007043] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.016067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.023172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.033303] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 172.039383] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.047340] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 172.054962] team0: Port device team_slave_0 added [ 172.067200] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 172.075450] team0: Port device team_slave_1 added [ 172.081071] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 172.088699] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 172.100415] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 172.111951] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 172.129096] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 172.145088] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 172.155428] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 172.165237] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 172.174302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.182365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.189864] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.196237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.209953] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 172.263750] device hsr_slave_0 entered promiscuous mode [ 172.310578] device hsr_slave_1 entered promiscuous mode [ 172.350439] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 172.357498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 172.365327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.372859] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.379181] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.400949] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 172.408946] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.417722] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 172.425539] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 172.435005] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 172.443019] team0: Port device team_slave_0 added [ 172.448677] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 172.456270] team0: Port device team_slave_1 added [ 172.463372] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 172.469455] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.476758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.483733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.492106] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 172.499025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 172.519723] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 172.532048] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 172.542776] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 172.561442] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.569216] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 172.612915] device hsr_slave_0 entered promiscuous mode [ 172.650385] device hsr_slave_1 entered promiscuous mode [ 172.691367] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 172.698484] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 172.705511] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 172.714818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.722891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.730566] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.736900] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.743998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 172.751658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 172.761338] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 172.769949] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 172.782948] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 172.798032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 172.811896] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 172.819902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 172.827849] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.836174] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.842581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.851234] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 172.861084] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 172.867147] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.875942] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 172.889800] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 12:40:01 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8, 0x1c1040) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1c}}, 0x0) write$evdev(r0, &(0x7f0000000100)=[{{0x0, 0x7530}}], 0xff49) [ 172.913255] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 172.926439] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.946616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.953671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 172.961586] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 172.969021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 172.978734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 172.988319] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 173.003125] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 173.010010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.017878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.026595] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.033035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.041376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.049356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 173.057474] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 173.073281] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 173.086200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.094284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.102978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.110918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 12:40:01 executing program 5: r0 = dup(0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2000000005, 0x572b) fchdir(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) dup(r1) r2 = open(&(0x7f00000003c0)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[], 0x2e7) setxattr$security_smack_entry(0x0, &(0x7f0000000300)='security.SMACK64IPIN\x00', 0x0, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f0000000040)=0x2, 0xa198) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x800) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0xffffffffffff1d12, @rand_addr="35b75d67778ca429c838a53cd8c1814f"}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp\x00') [ 173.118485] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.139946] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 173.153932] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 173.162919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 173.177127] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 173.185046] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.192747] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.201247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.208953] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.216637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.224534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.232660] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.238999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.245989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.253761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.263155] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 173.269178] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 173.282680] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 173.293339] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 173.306250] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 173.314458] hrtimer: interrupt took 22951 ns [ 173.319953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 173.333619] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.341199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.352244] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 173.367399] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.376923] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 173.383442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.404724] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 173.412805] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 173.427746] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 173.434663] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 173.450848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.458595] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.468399] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 173.477339] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 173.488815] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.496793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.503679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.511516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.519006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.529185] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 173.535857] 8021q: adding VLAN 0 to HW filter on device team0 [ 173.543846] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 173.557341] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.566962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.574856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.586331] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 173.595597] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 173.609536] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 173.620516] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 173.632215] 8021q: adding VLAN 0 to HW filter on device batadv0 12:40:02 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000000c0)) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000000)) [ 173.638593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.647123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.660431] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.667012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.677810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 12:40:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x212000, 0x0) mq_timedsend(r1, &(0x7f0000000040)="3b8f0a4d16f1bfc361e4c650ee7b98481c", 0x11, 0x1, &(0x7f0000000080)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x4e20, 0x0, @local}}}, 0x38) [ 173.694251] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.707414] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 173.729066] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 173.746072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 173.753662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.761233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.768020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.776608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.784431] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.790832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.800867] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 173.806941] 8021q: adding VLAN 0 to HW filter on device team0 [ 173.821504] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 173.827525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 12:40:02 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000000c0)) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000000)) [ 173.852390] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 173.872830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.887580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.911609] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.917986] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.932267] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 173.951661] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 12:40:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) pkey_alloc(0x0, 0x2) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 173.971506] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 173.985967] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 173.993141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.005877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.015486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.025734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.033821] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.040224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.047128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.057529] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready 12:40:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000080)=""/11) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f00000000c0)=0x4) socket$nl_generic(0x10, 0x3, 0x10) 12:40:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) socket$netlink(0x10, 0x3, 0xa) r1 = open(&(0x7f0000000000)='./bus\x00', 0x1141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) ftruncate(0xffffffffffffffff, 0x4820f) [ 174.098658] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 174.128752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 12:40:02 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000008, 0x181440) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000000300)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000002c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000040), r1, 0x2}}, 0x18) semget(0xffffffffffffffff, 0x0, 0x0) close(r0) [ 174.145670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 174.174786] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 174.193047] audit: type=1400 audit(1556023202.544:39): avc: denied { create } for pid=7281 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 [ 174.251206] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 174.290604] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 174.320382] audit: type=1400 audit(1556023202.554:40): avc: denied { create } for pid=7280 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 174.321441] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 174.370707] audit: type=1400 audit(1556023202.584:41): avc: denied { write } for pid=7281 comm="syz-executor.0" path="socket:[26686]" dev="sockfs" ino=26686 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 [ 174.399598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 174.408336] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 174.421916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 174.429703] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 174.442607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 174.453352] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 174.465437] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 174.482345] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 174.499506] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 174.517450] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 174.526129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.539721] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.555655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 174.564366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 174.574968] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 174.588393] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 174.605047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 174.614208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.626792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.634941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.650882] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 174.656934] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 174.675940] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 174.688248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 174.698192] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.716239] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 174.725306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 174.741581] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 174.764349] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 12:40:03 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) r1 = getpgrp(0x0) r2 = syz_open_procfs(r1, &(0x7f0000000380)='wchan\x00') sendfile(r0, r0, 0x0, 0x100000001) write$UHID_CREATE2(r2, &(0x7f00000000c0)={0xb, 'syz0\x00', 'syz1\x00', 'syz0\x00', 0x1c, 0xfffffffffffffff7, 0x527f, 0x9, 0x8, 0x7fff, "df289d2b4befe09cb57e8e190ca26a6ffe4527c8d82f81953e458803"}, 0x134) [ 174.798639] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 174.821418] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.782940] audit: type=1400 audit(1556023204.144:42): avc: denied { write } for pid=7315 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 175.815098] audit: type=1400 audit(1556023204.144:43): avc: denied { read } for pid=7315 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 12:40:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x3, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000000)={0x0, 0x1, 0x0, [], &(0x7f0000000040)={0x98f905, 0x1000, [], @ptr}}) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x9, 0x44040) 12:40:04 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x40, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SIOCRSGL2CALL(r1, 0x89e5, &(0x7f0000000040)=@rose) wait4(0x0, 0x0, 0x80000008, 0x0) r2 = shmat(0x0, &(0x7f0000ff3000/0x3000)=nil, 0x5ffd) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000ff3000/0x3000)=nil) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) shmdt(r2) r3 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f00000000c0), 0x4) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f00000001c0)={[], 0x0, 0xffffffff80000001, 0xa014883, 0x3, 0x6, r5}) sendmsg$nl_xfrm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x703d}}}, 0xb8}}, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000001d80)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0385720, &(0x7f0000000180)={0x1, {}, 0x0, 0x6}) gettid() 12:40:04 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(0xffffffffffffffff, 0x100002003) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x10001}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r1, 0x0, 0x1, 0x2, 0x8001, 0x80000000}, &(0x7f0000000180)=0x14) r2 = socket$inet6(0xa, 0x4, 0x41f) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000002c0)={0x9}, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x2004e20, 0x6, @ipv4, 0x2ca7b60b}, 0xfffffffffffffd03) 12:40:04 executing program 0: setresuid(0x0, 0xfffe, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) r1 = geteuid() getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={0x0, 0xd2}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000180)={r2, 0xffff, 0x9d, "95743b06bca991be925a8eb6d50e573afa518110dabece7dc51d9bbcddfac6d03922956d2476811e9189c1dec56f6bfb0d6b2fb265b03645ff12326c19e2c3f574dce8752e81834e4890a1207a1069af9e1bf7fbbc0ddba2eb23339266e7feafcfdbcd39a3258c682ee4a00a77f880ab9487b543b882cf5b8b8309c20a785f28f8e07605ae5e64946ba8379f88a7be8c2dbf7489cb820be0498a945c6f"}, 0xa5) setresuid(0x0, 0x0, r1) clone(0x8000000000041fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f00000000c0)) ptrace$cont(0x1f, r3, 0x3, 0x8287) tkill(r3, 0x0) 12:40:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) get_mempolicy(&(0x7f0000000200), &(0x7f0000000400), 0x40, &(0x7f0000ffd000/0x2000)=nil, 0x0) lsetxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f00000001c0)=@v2={0x5, 0x1, 0x8, 0x8, 0x10, "520b10a68929e103edf4518fa486c708"}, 0x1a, 0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x202000) connect$unix(r1, &(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e) r2 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r2, 0x40045542, &(0x7f0000000040)=0x5) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="b32623fcc2e1f55eb1fbf876b8a1773db7c475614c168d3bc0763d85de349a9469da26ecfed92385ac4acd43e5a6c3c88390e1c00546c0baa22693d182078491defaf97a95c23c62627637598e276f98fe626df743ebe1b853b0b68577ca42a131b75730930fd036f24bd96563360200433809d7e6779f287a", @ANYRES32=0x0, @ANYBLOB="000000000000c45b240543b70b0fbc01006200003cbee33bd500"/42], 0x3c}}, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}) 12:40:04 executing program 4: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f00000004c0)=0xe8) r6 = dup3(r1, r1, 0x80000) accept$alg(r6, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000ac0)={{{@in=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000bc0)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) r9 = getuid() stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000200)='./file1\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000d80)=ANY=[@ANYBLOB="02000000010003000000000002000200", @ANYRES32=r2, @ANYBLOB="02000100", @ANYRES32=r3, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="02000500", @ANYRES32=r5, @ANYBLOB="0401", @ANYRES32=r7, @ANYBLOB="02000000", @ANYRES32=r8, @ANYBLOB="02000400", @ANYRES32=r9, @ANYBLOB="040004000000000008000400", @ANYRES32=r10, @ANYBLOB="10000400000000002000060000000000"], 0x64, 0x1) 12:40:04 executing program 5: socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) pselect6(0x381, &(0x7f0000000000)={0x8}, &(0x7f0000000040), &(0x7f0000000300)={0x0, 0x0, 0x0, 0x800000000000}, &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x2, 0x400000) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f00000000c0)) [ 176.276375] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=57794 sclass=netlink_route_socket pig=7328 comm=syz-executor.1 12:40:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x5) accept(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) r2 = accept4(r0, 0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 12:40:04 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f00000000c0)=""/164) ioctl$KDGKBLED(r0, 0xc0045405, &(0x7f0000000480)) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r1 = request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='\x00', 0xfffffffffffffffb) r2 = add_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="2192068f84cc198ff1af5e2c261cb6c08e0468adbd4e79a3bcad03a7724e46784e8fc3c7af03fc70fb5d92b4a0f3860c63e3e067c1ae2e225af0631e26d29d278405f523874a95baaa61249c86adeedf110fcc4faa50c490ab6ae6d33b7b9ca9d88b1a2208845f2652a0449dd18f475c7fde27fd04b05029a847743dc977f01f18abea29ef8ebe32cde63408206fb71b881af8e89de2", 0x96, 0xffffffffffffffff) keyctl$instantiate(0xc, r1, 0x0, 0x0, r2) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4800, 0x9) 12:40:04 executing program 5: ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) getxattr(&(0x7f0000000240)='./file0/../file0\x00', &(0x7f0000000080)=@known='system.advise\x00', &(0x7f0000000100), 0x3b1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x400101, 0x0) epoll_pwait(r0, &(0x7f0000000140)=[{}, {}], 0x2, 0x7, &(0x7f0000000200)={0x6}, 0x8) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x5, 0x240) r2 = syz_open_dev$media(0x0, 0x3f, 0x280) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) preadv(r1, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/241, 0xf1}, {&(0x7f0000000480)=""/243, 0xf3}], 0x2, 0x0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1b1, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0xffffffffffffff7f) prctl$PR_GET_CHILD_SUBREAPER(0x25) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$SIOCRSSL2CALL(r2, 0x89e2, &(0x7f0000000280)=@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}) [ 176.423349] audit: type=1400 audit(1556023204.764:44): avc: denied { name_bind } for pid=7341 comm="syz-executor.2" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 176.451173] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=57794 sclass=netlink_route_socket pig=7328 comm=syz-executor.1 12:40:04 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$pokeuser(0x6, r1, 0x20, 0xadf) getsockname$llc(r0, 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xffffffff, 0x0) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000080)=""/226) 12:40:04 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000840), 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7fffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r2 = getpgrp(0x0) r3 = syz_open_dev$swradio(&(0x7f0000000640)='/dev/swradio#\x00', 0x1, 0x2) ioctl$EVIOCRMFF(r3, 0x40044581, &(0x7f0000000680)=0x7fffffff) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) capget(0x0, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000180)=0x126, 0x4) r6 = dup(r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0xc0505350, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000000, 0x0, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x80000001, 0x56a, 0x0, 0x8, 0x2, 0xffffffffffffffff}, &(0x7f0000000200)={0x5, 0x5, 0x3f, 0x2}, 0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0xfff}, 0x8}) ioctl$ASHMEM_SET_PROT_MASK(r6, 0x40087705, &(0x7f0000000280)={0x6}) ptrace$setregset(0x4205, r2, 0x201, &(0x7f0000000400)={&(0x7f0000000740)}) ioctl$int_in(r5, 0x5452, &(0x7f0000000580)=0xe2b) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) io_cancel(0x0, 0x0, 0x0) setrlimit(0xf, &(0x7f0000000540)={0xba6, 0x3fb}) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ppoll(&(0x7f0000000300)=[{r0, 0xa4}, {r1, 0x20}, {r4, 0x10}, {r1, 0x400}], 0x4, &(0x7f00000005c0)={r7, r8+30000000}, &(0x7f0000000600)={0x93}, 0x8) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) finit_module(r9, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x2) ftruncate(r9, 0x2007fff) sendfile(r6, r9, &(0x7f0000d83ff8), 0x8000fffffffe) [ 176.558986] audit: type=1400 audit(1556023204.814:45): avc: denied { node_bind } for pid=7341 comm="syz-executor.2" saddr=::1 src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 12:40:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000004000), 0xfffffee9) read$FUSE(r0, &(0x7f0000003000), 0x6ab) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') creat(&(0x7f00000000c0)='./file0\x00', 0x8c) stat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000018000000000000000000000000000b00000000000000656d316e6f646576f16d3100000000000000000000000000000000000000000001000000000000002c000000000000000000000000000000000000000000000033000000000000002b73797374656dcc63707573654b0667726f7570246367726f75701500000000"], 0x90) [ 176.610780] audit: type=1400 audit(1556023204.864:46): avc: denied { name_connect } for pid=7341 comm="syz-executor.2" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 12:40:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x5) accept(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) r2 = accept4(r0, 0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 12:40:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x1, 0x0) r2 = dup(r1) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000002e80)=0x214, 0x4) sendto$inet(r2, &(0x7f0000000100)="02", 0x1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2002) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000140)={0x800004, 0x4}) 12:40:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x5) accept(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) r2 = accept4(r0, 0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 12:40:05 executing program 5: ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) getxattr(&(0x7f0000000240)='./file0/../file0\x00', &(0x7f0000000080)=@known='system.advise\x00', &(0x7f0000000100), 0x3b1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x400101, 0x0) epoll_pwait(r0, &(0x7f0000000140)=[{}, {}], 0x2, 0x7, &(0x7f0000000200)={0x6}, 0x8) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x5, 0x240) r2 = syz_open_dev$media(0x0, 0x3f, 0x280) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) preadv(r1, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/241, 0xf1}, {&(0x7f0000000480)=""/243, 0xf3}], 0x2, 0x0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1b1, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0xffffffffffffff7f) prctl$PR_GET_CHILD_SUBREAPER(0x25) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$SIOCRSSL2CALL(r2, 0x89e2, &(0x7f0000000280)=@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}) 12:40:05 executing program 1: ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) getxattr(&(0x7f0000000240)='./file0/../file0\x00', &(0x7f0000000080)=@known='system.advise\x00', &(0x7f0000000100), 0x3b1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x400101, 0x0) epoll_pwait(r0, &(0x7f0000000140)=[{}, {}], 0x2, 0x7, &(0x7f0000000200)={0x6}, 0x8) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x5, 0x240) r2 = syz_open_dev$media(0x0, 0x3f, 0x280) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) preadv(r1, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/241, 0xf1}, {&(0x7f0000000480)=""/243, 0xf3}], 0x2, 0x0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1b1, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0xffffffffffffff7f) prctl$PR_GET_CHILD_SUBREAPER(0x25) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$SIOCRSSL2CALL(r2, 0x89e2, &(0x7f0000000280)=@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}) 12:40:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="030000003c12110b9bd070d07c2c5233bbbc14942e8a28aa598fd22bea2acc94489ec33f43ecbe24ce88f9a174e92c773458fe9896b8ce2bcd1353a5441a9c16481a51064d3bba57a4a63b49b45b3410a7692dff804d12f452d7d0c81589a18b87635f12ec8a2c0b82ec39d3f97dada1d26acd6e8238d92fa20ad50c482895069c1b171d693f8860fd8c9a37a142fcec042adef71fa28735234e99bbfb919408dc5d2b495a3e") ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000100)={r2, 0x5, 0x0, 0x9, 0x4}, &(0x7f0000000140)=0x18) 12:40:05 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xc6, 0x800) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x2}, 0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x2) ioctl$KDSETKEYCODE(r0, 0x40087101, 0x0) 12:40:05 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x2, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x2, 0x0, [], {0x0, @bt={0x3, 0x7, 0x0, 0x2, 0x6, 0x5, 0x4, 0x6, 0x5, 0x100, 0x7, 0x4, 0x9, 0x1, 0x6}}}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup2(r1, r1) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r2, 0xc0345642, &(0x7f0000000000)={0x9, "a5a5f08f517d23f9473158946f7f39a467b38efc7ba23798e4dd8a97eaea1484", 0x1, 0x1}) 12:40:05 executing program 3: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$nullb(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nullb0\x00', 0x10000, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x9, 0xa0000) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000001c0)=""/197) open(&(0x7f0000000300)='./file0\x00', 0x400000, 0x21) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x2, 0x4000) write$selinux_context(r3, &(0x7f0000000100)='system_u:object_r:auditd_unit_file_t:s0\x00', 0x28) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r4 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) ioctl(r1, 0x3, &(0x7f0000000080)="26187b2002973170789dfe3984ba1a1e033d5eed53a7472b560ca5b864128c7217") ioctl$FICLONE(r4, 0x40049409, r1) dup2(r1, r1) [ 176.964786] audit: type=1400 audit(1556023205.324:47): avc: denied { create } for pid=7386 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 12:40:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") eventfd(0x7) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000140)={0x20000012}) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000000)={0x0, @multicast2, @empty}, &(0x7f0000000100)=0xc) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x100, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae8a, &(0x7f00000000c0)=ANY=[@ANYBLOB="2c00bba1000000257bf34537125ed2a341226f81d56eb20847d0c7f770bdaad0fa922ee78d0a6e0dc70500"/55]) 12:40:05 executing program 1: r0 = socket$inet(0x10, 0x3, 0xe) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa283000a200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 177.021523] bond0: Releasing backup interface bond_slave_1 12:40:05 executing program 2: ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000001c0)=0x6) syz_open_procfs(0x0, &(0x7f0000000140)='task\x00') r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {0x9, 0x4, 0x0, 0x0, 0x5}, 0x4}, 0x350) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000540)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) getpgrp(0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000940)='/dev/vfio/vfio\x00', 0x80100, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/commit_pending_bools\x00', 0x1, 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000800)='trusted.overlay.origin\x00', &(0x7f00000007c0)='y\x00', 0xffffffffffffffd7, 0x1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/9, 0x9) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x5) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x7, 0x0) r3 = dup(r2) r4 = openat$cgroup_ro(r3, &(0x7f0000000340)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000080), 0xfffffe38) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r4, 0x117, 0x5, 0x0, 0x3f) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0x1) write$P9_RSTAT(r4, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x80000000002172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000440)="d1215bb63e66b41696c6cb11b3e3c130f48a2bca433bcec5fa24fd1d4e63ed309d0fcd4bbcb393593c0b2ea65003d67486aa4bd838760feeaaef9f3ec16bbd6f2be00f7ae459de3160bc7a2fa6c7dc0ad92b4665dae5af647aa2b97cef29ffb38edc9426280f02070ba698ea303ebf9eb6f456019c3c7567ed31aefbd06f3d166eda1bb0f1e4189aef937f0de59050fcd022fd4966a6777b21a813ddd748857d91a053a221a5dc4e", 0xa8, 0x0) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x4e1e, @loopback}, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e20, @multicast1}, 0x40, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)='gre0\x00', 0x9, 0x7, 0xfff}) syz_open_procfs(0x0, &(0x7f0000001100)='numa_maps\x00') mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r5, 0x0) getpid() ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000001c0)) socketpair$unix(0x1, 0x7ffffff, 0x0, &(0x7f0000000700)) 12:40:05 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}, 0x1}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x3, 0x9, 0x100000001, 0x1}) openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) [ 177.074736] audit: type=1400 audit(1556023205.364:48): avc: denied { ioctl } for pid=7386 comm="syz-executor.4" path="socket:[26892]" dev="sockfs" ino=26892 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 12:40:05 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa4}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10202, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x7, &(0x7f0000000140)=""/118) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) ptrace$cont(0x9, r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000080)={0xfff, 0xfffffffffffffffd, 0xffffffffffff0000}, 0xc) [ 177.124297] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 12:40:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x4, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000000c0)={0x8000, 0x800, 0x401}, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000001780)={0x1, 0x2}, 0x8) setsockopt$inet6_tcp_int(r2, 0x6, 0x8, &(0x7f00000002c0)=0xffffffffffff3f30, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0xffffffffffffffd1, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x400000000004e22}, 0x1c) close(r2) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000040)={'nlmon0\x00', 0x90}) 12:40:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0xfffffffffffffffc) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000240)="ef73cc841adaaf5c58bb96fdbc62a8bbb7c2b687ea0eff43a004f2636954204b6687791bbe34e068d214089a09298baf4f62d944630eefac90d9c7bcb5a52198f57dcb88a63c40bedc690ba6cddf1b684494efbd9bc5070e55cc5b541ad05bbbff080bdb", 0x64, 0x6}, {&(0x7f00000002c0)="bab48fb2112972f674d95ca00067d62f8712f3ceae7fda66085ae6831ad1c3e09dd8393e0645109527bb1434b3", 0x2d, 0x97}, {&(0x7f0000000300)="08701c91ad50aad5ac4c0e21d8c3f58bed452922f0d34f3c2d78b66e04e11a8291164b5fb3de4516262cb43b4c888571ecbf522cfb02352b9663025dd6b4c759f53c434dec7d6c98632079eac631", 0x4e, 0x1}, {&(0x7f0000000380)="290d42d92ccfc38420ad96f7502e62ad7212dd2dc6b462e55a86547e333bdc9a962e23f19b6679e8b5dc7773d74bb67437aa9c30d71e4d9321b594044ab85faaf304365b0ea90ff25602e3a76071db1bdd1a7aa42c6c00d04137e00fced1d6e2f6986383a4555b28132c10a2c1073ee8d7fc612c9c2469a372e74362671ec7bf73de8e625700b3323c54e4944064f71236cfa272ac3ccf3a89d492d7b6529d2c93177cc4775e4f9fe3db225d2efe674474", 0xb1, 0x4}, {&(0x7f0000000440)="8ab1992c008fbe19e274f86e6848a0b6e1a052b7379f68e2e6bea0bf53a04286ed895ac6c675c855876f55d02a37f5e7d9ffafe66588713756b97c3133cd4ff23014f8", 0x43, 0x58}], 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000780)=0x6, &(0x7f00000007c0)=0x4) fcntl$getflags(r1, 0x401) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e23, @multicast2}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000005c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x40880000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x1c, r3, 0x900, 0x70bd27, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000740)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) set_thread_area(&(0x7f0000000540)={0xb26d, 0x20000800, 0x0, 0x3f, 0xfff, 0x6, 0x3f, 0xff, 0x3ff, 0x5}) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000840), &(0x7f0000000800)=0x4) 12:40:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x9, &(0x7f0000000080)=0xf325, 0x4) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x800, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffff9c}) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000100)={r3, 0x80000, r4}) getsockopt$inet_tcp_int(r1, 0x6, 0x9, 0x0, &(0x7f0000d12ffc)) 12:40:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffc, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000240)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="050000001fe58cd1eaa69c49304f4d4d510000000071101c"], &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x7f\x00'/248}, 0x48) signalfd(r2, &(0x7f0000000440)={0x10412e94}, 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000380)={0x1, [0x0]}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000400)=r3, 0x4) clock_gettime(0x0, &(0x7f0000000680)={0x0, 0x0}) pselect6(0x0, 0x0, &(0x7f0000000480)={0x0, 0x80000001, 0x80, 0x101, 0x9, 0x0, 0xffffffffffff0000, 0x9}, &(0x7f00000004c0)={0x1ff, 0x8100000000000000, 0x8000, 0x9, 0x83, 0x0, 0x6, 0x3}, &(0x7f0000000540)={r4, r5+30000000}, &(0x7f00000005c0)={&(0x7f0000000580)={0x8001}, 0x8}) 12:40:05 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x190004) sendfile(r0, r2, 0x0, 0x8000) sendfile(r0, r1, 0x0, 0x7fffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = open(&(0x7f0000000c00)='./file0\x00', 0x84081, 0x0) open(0x0, 0x0, 0x0) write$FUSE_POLL(r3, &(0x7f0000000000)={0xfffffe77}, 0x8800000) [ 177.273870] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:40:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, 0x0) fcntl$setstatus(r0, 0x4, 0x2800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000180)) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0xffffffffffffffff, 0x105082) r3 = memfd_create(0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x4081003) socket$inet_dccp(0x2, 0x6, 0x0) fallocate(r2, 0x2000011, 0x0, 0x100000001) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000006c0)={0x0, 0xfffffffffffffff9, 0xac5, 0x3, 0x6, 0x7, 0x800, 0x8, {0x0, @in={{0x2, 0x4e24, @multicast1}}, 0x5, 0x7, 0xffe1, 0x8, 0x1}}, &(0x7f00000001c0)=0xb0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000440)={r4, 0xf4ed}, 0x8) shmget(0x1, 0x4000, 0x1000, &(0x7f0000ffa000/0x4000)=nil) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f00000000c0)=0xe8) getgroups(0x4, &(0x7f0000000100)=[0xee01, 0xffffffffffffffff, 0x0, 0xee00]) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000140)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x100000, &(0x7f0000000500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, r7}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@euid_lt={'euid<', r8}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/loop#\x00'}}, {@obj_type={'obj_type', 0x3d, '}cpuset'}}, {@obj_role={'obj_role', 0x3d, '.\''}}, {@subj_type={'subj_type', 0x3d, 'bridge0\x00'}}]}}) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000480)={r5, 0x5, 0x8, 0x6, 0x1, 0x1, 0x5}) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000780)={@broadcast, @empty}, 0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000200)={0x0, 'bridge0\x00'}, 0x18) pwritev(0xffffffffffffffff, 0x0, 0xfffffda1, 0x40000000000000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000600)) [ 177.318645] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 177.325377] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 12:40:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_emit_ethernet(0xe63d, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2f, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x883e, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r1 = dup(r0) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) 12:40:05 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) prlimit64(r0, 0x1000000000000f, &(0x7f0000000100)={0x3ff, 0x321d}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$llc_int(r1, 0x10c, 0x0, &(0x7f0000000080)=0x66, 0x4) setpriority(0x0, 0x0, 0xfffffffffffffffd) 12:40:05 executing program 4: ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000100)={0x0, 0x80000, 0xffffffffffffff9c}) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000001500)='/dev/mISDNtimer\x00', 0x121100, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001540)='/dev/sequencer2\x00', 0x181000, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001580)='/selinux/checkreqprot\x00', 0x1010c1, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000001600)={0x0, 0x0}) ppoll(&(0x7f00000015c0)=[{r0, 0x20}, {r1, 0x1}, {r2, 0x1}, {r3, 0x210}, {r4, 0x8000}, {r5, 0x4000}], 0x6, &(0x7f0000001640)={r6, r7+30000000}, &(0x7f0000001680)={0x7}, 0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000000700000000000000009500"/24], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) [ 177.540416] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0d00:0000:00aa with DS=0xd [ 177.580851] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0d00:0000:00aa with DS=0xd 12:40:06 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x190004) sendfile(r0, r2, 0x0, 0x8000) sendfile(r0, r1, 0x0, 0x7fffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = open(&(0x7f0000000c00)='./file0\x00', 0x84081, 0x0) open(0x0, 0x0, 0x0) write$FUSE_POLL(r3, &(0x7f0000000000)={0xfffffe77}, 0x8800000) 12:40:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x24000, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f00000000c0)={{0x3, @name="10e6a854dfbc90c72f03e94e4c5be96ab236ded819c7a0729a5e32b72a7a3245"}, "d4ec9610eb027a161e7065fc2fb6865daa3f9c5d891ed2a57bc39b23880c7a58", 0x2}) r2 = socket$inet(0x2, 0x8000a, 0x0) read(r2, &(0x7f0000001100)=""/4096, 0x1000) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r3 = gettid() tkill(r3, 0x14) 12:40:06 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x200, 0x0) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000140)={0x27, 0xf, 0x4, 0x2, {0x0, 0x7530}, {0x3, 0xd, 0x3, 0x8, 0x6, 0x100, "322328b4"}, 0x81, 0x3, @planes=&(0x7f0000000100)={0x3, 0xfffffffffffffb50, @userptr=0x2, 0x3}, 0x4}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x100, 0x0) 12:40:06 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x10004e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1f1d47a1b37da625) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f0000000100)={0x0, 0x989680}, 0x0, 0x0) 12:40:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x101080, 0x0) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000100)=""/6) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r3 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r3, 0x5404, &(0x7f00000000c0)={0x8, 0x0, 0x0, 0xaec}) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000040)={0xffffffffffffffff}) 12:40:06 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x190004) sendfile(r0, r2, 0x0, 0x8000) sendfile(r0, r1, 0x0, 0x7fffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = open(&(0x7f0000000c00)='./file0\x00', 0x84081, 0x0) open(0x0, 0x0, 0x0) write$FUSE_POLL(r3, &(0x7f0000000000)={0xfffffe77}, 0x8800000) 12:40:06 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000005000/0x1000)=nil) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000080)={0x1}) [ 178.007617] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) 12:40:06 executing program 0: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4000) ftruncate(r0, 0x8200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{}, {}, {}, {}]}) shmget$private(0x0, 0x1000, 0x78000bc8, &(0x7f0000007000/0x1000)=nil) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8000df7fffff) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x44000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000080)=0x80000001) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) 12:40:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000180)=[0xfffffffffffff437, 0x5]) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000000140)=0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) r2 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x13, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) 12:40:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socketpair(0xe, 0x80000, 0x4, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x101800, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0xffffffffffffff81, 0x5, 0x6, 0x400, 0x28, 0x3a, 0x6, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0xffffffffffffff7f, 0x81, 0x9, 0x5, 0x3}}, &(0x7f00000001c0)=0xb0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000200)={r3, 0x4, 0x8}, 0x8) dup3(r0, r2, 0x80000) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r4, 0x5421, &(0x7f0000000080)) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000000280)={0x0, 0x8, 0x0, 0x2, 0x7, 0x2}) 12:40:06 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x200, 0x0) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000140)={0x27, 0xf, 0x4, 0x2, {0x0, 0x7530}, {0x3, 0xd, 0x3, 0x8, 0x6, 0x100, "322328b4"}, 0x81, 0x3, @planes=&(0x7f0000000100)={0x3, 0xfffffffffffffb50, @userptr=0x2, 0x3}, 0x4}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x100, 0x0) 12:40:06 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0212a29ef280f2d4e283bdb3205c78c60000001e0005060000000000000000000000000000000000000000008f9eabd9f51d4b70000000ac1414bb00000000000000000000000000000000000000001c001700"/108], 0x5c}}, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x2, 0x4000) write$eventfd(r1, &(0x7f00000000c0)=0x8, 0x8) [ 178.214818] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=62110 sclass=netlink_xfrm_socket pig=7499 comm=syz-executor.1 [ 178.236351] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=62110 sclass=netlink_xfrm_socket pig=7499 comm=syz-executor.1 [ 178.263244] ------------[ cut here ]------------ [ 178.268175] WARNING: CPU: 0 PID: 7488 at fs/direct-io.c:293 dio_complete+0x671/0x800 [ 178.276047] Kernel panic - not syncing: panic_on_warn set ... [ 178.276047] [ 178.283424] CPU: 0 PID: 7488 Comm: syz-executor.0 Not tainted 4.14.113 #3 [ 178.290360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.299711] Call Trace: [ 178.302312] dump_stack+0x138/0x19c [ 178.305956] panic+0x1f2/0x438 [ 178.309151] ? add_taint.cold+0x16/0x16 [ 178.313140] ? dio_complete+0x671/0x800 [ 178.317610] ? __warn.cold+0x14/0x34 [ 178.321333] ? dio_complete+0x671/0x800 [ 178.325317] __warn.cold+0x2f/0x34 [ 178.328909] ? ist_end_non_atomic+0x10/0x10 [ 178.333233] ? dio_complete+0x671/0x800 [ 178.337219] report_bug+0x216/0x254 [ 178.340870] do_error_trap+0x1bb/0x310 [ 178.344771] ? math_error+0x360/0x360 [ 178.348582] ? pagecache_isize_extended+0x250/0x250 [ 178.353613] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 178.358480] do_invalid_op+0x1b/0x20 [ 178.362202] invalid_op+0x1b/0x40 [ 178.365665] RIP: 0010:dio_complete+0x671/0x800 [ 178.370244] RSP: 0018:ffff8880611771b8 EFLAGS: 00010212 [ 178.375618] RAX: 0000000000040000 RBX: 0000000000008200 RCX: ffffc9000803e000 [ 178.382893] RDX: 00000000000042c5 RSI: ffffffff819ae051 RDI: ffff8880893488fc [ 178.390164] RBP: ffff888061177200 R08: ffff8880894ca280 R09: 0000000000000002 [ 178.390570] kobject: 'loop5' (ffff8880a4a509a0): kobject_uevent_env [ 178.397927] R10: 0000000000000000 R11: ffff8880894ca280 R12: ffff888088eb7400 [ 178.397958] R13: 0000000000008200 R14: ffff888089348af8 R15: 0000000000000000 [ 178.397982] ? dio_complete+0x671/0x800 [ 178.397995] ? dio_complete+0x671/0x800 [ 178.398006] ? trace_hardirqs_on_caller+0x400/0x590 [ 178.398016] ? write_end_fn+0xa0/0xa0 [ 178.398027] do_blockdev_direct_IO+0x530e/0x7fc0 [ 178.398051] ? sb_init_dio_done_wq+0x80/0x80 [ 178.416337] kobject: 'loop5' (ffff8880a4a509a0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 178.419089] ? ext4_dio_get_block_unwritten_async+0x1c0/0x1c0 [ 178.419114] ? __lock_is_held+0xb6/0x140 [ 178.419127] ? ext4_dio_get_block_unwritten_async+0x1c0/0x1c0 [ 178.427682] kobject: 'loop4' (ffff8880a49cc0a0): kobject_uevent_env [ 178.432073] __blockdev_direct_IO+0xa1/0xd0 [ 178.432085] ? write_end_fn+0xa0/0xa0 [ 178.432100] ext4_direct_IO+0x70d/0x1890 [ 178.432112] ? ext4_dio_get_block_unwritten_async+0x1c0/0x1c0 [ 178.432133] generic_file_direct_write+0x1ec/0x430 [ 178.432150] __generic_file_write_iter+0x2bc/0x5b0 [ 178.432167] ext4_file_write_iter+0x2c0/0xfd0 [ 178.432184] ? ext4_file_mmap+0x2c0/0x2c0 [ 178.432205] ? __might_sleep+0x93/0xb0 [ 178.437563] kobject: 'loop4' (ffff8880a49cc0a0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 178.440820] do_iter_readv_writev+0x41e/0x680 [ 178.440837] ? vfs_dedupe_file_range+0x8f0/0x8f0 [ 178.440854] ? rw_verify_area+0xea/0x2b0 [ 178.440868] do_iter_write+0x154/0x550 [ 178.440878] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 178.440893] ? __kmalloc+0x379/0x7a0 [ 178.440907] vfs_iter_write+0x77/0xb0 [ 178.440921] iter_file_splice_write+0x578/0xae0 [ 178.440932] ? touch_atime+0xce/0x250 [ 178.440951] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 178.440973] ? rw_verify_area+0xea/0x2b0 [ 178.575069] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 178.580171] direct_splice_actor+0x126/0x1a0 [ 178.584590] splice_direct_to_actor+0x2a1/0x7b0 [ 178.589255] ? generic_pipe_buf_nosteal+0x10/0x10 [ 178.594098] ? do_splice_to+0x170/0x170 [ 178.598056] ? rw_verify_area+0xea/0x2b0 [ 178.602111] do_splice_direct+0x18d/0x230 [ 178.606254] ? splice_direct_to_actor+0x7b0/0x7b0 [ 178.611085] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 178.615851] ? __sb_start_write+0x153/0x2f0 [ 178.620173] do_sendfile+0x4db/0xbd0 [ 178.623895] ? do_compat_pwritev64+0x140/0x140 [ 178.628506] ? put_timespec64+0xb4/0x100 [ 178.632551] ? nsecs_to_jiffies+0x30/0x30 [ 178.636687] SyS_sendfile64+0x102/0x110 [ 178.640655] ? SyS_sendfile+0x130/0x130 [ 178.644632] ? do_syscall_64+0x53/0x630 [ 178.648612] ? SyS_sendfile+0x130/0x130 [ 178.652585] do_syscall_64+0x1eb/0x630 [ 178.656459] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 178.661319] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 178.666511] RIP: 0033:0x458c29 [ 178.669696] RSP: 002b:00007f9fed79bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 178.677387] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000458c29 [ 178.684657] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003 [ 178.691921] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 178.699182] R10: 00008000df7fffff R11: 0000000000000246 R12: 00007f9fed79c6d4 [ 178.706433] R13: 00000000004c5e10 R14: 00000000004da5c8 R15: 00000000ffffffff [ 178.714584] Kernel Offset: disabled [ 178.718290] Rebooting in 86400 seconds..