[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [ 70.551444][T10209] sshd (10209) used greatest stack depth: 23704 bytes left [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 75.855430][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 75.855443][ T26] audit: type=1400 audit(1567777732.632:35): avc: denied { map } for pid=10320 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.206' (ECDSA) to the list of known hosts. 2019/09/06 13:48:58 fuzzer started [ 82.086789][ T26] audit: type=1400 audit(1567777738.862:36): avc: denied { map } for pid=10329 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/09/06 13:49:00 dialing manager at 10.128.0.26:42805 2019/09/06 13:49:01 syscalls: 2510 2019/09/06 13:49:01 code coverage: enabled 2019/09/06 13:49:01 comparison tracing: enabled 2019/09/06 13:49:01 extra coverage: extra coverage is not supported by the kernel 2019/09/06 13:49:01 setuid sandbox: enabled 2019/09/06 13:49:01 namespace sandbox: enabled 2019/09/06 13:49:01 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/06 13:49:01 fault injection: enabled 2019/09/06 13:49:01 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/06 13:49:01 net packet injection: enabled 2019/09/06 13:49:01 net device setup: enabled 13:51:11 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') inotify_init1(0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) unshare(0x400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000040)={0x1b9}, &(0x7f0000000200), 0x0) [ 214.249427][ T26] audit: type=1400 audit(1567777871.032:37): avc: denied { map } for pid=10346 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15458 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 214.347449][T10347] IPVS: ftp: loaded support on port[0] = 21 13:51:11 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) llistxattr(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 214.463418][T10347] chnl_net:caif_netlink_parms(): no params data found [ 214.513255][T10347] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.521265][T10347] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.537792][T10347] device bridge_slave_0 entered promiscuous mode [ 214.551722][T10350] IPVS: ftp: loaded support on port[0] = 21 [ 214.558415][T10347] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.565524][T10347] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.575606][T10347] device bridge_slave_1 entered promiscuous mode [ 214.595592][T10347] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 13:51:11 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) [ 214.609072][T10347] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 214.643737][T10347] team0: Port device team_slave_0 added [ 214.652872][T10347] team0: Port device team_slave_1 added 13:51:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0x7fffffff}], 0x1, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0xd) [ 214.738878][T10347] device hsr_slave_0 entered promiscuous mode [ 214.777638][T10347] device hsr_slave_1 entered promiscuous mode [ 214.890094][T10352] IPVS: ftp: loaded support on port[0] = 21 [ 214.899104][T10354] IPVS: ftp: loaded support on port[0] = 21 [ 214.923550][T10347] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.930653][T10347] bridge0: port 2(bridge_slave_1) entered forwarding state 13:51:11 executing program 4: kexec_load(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x1000000}], 0x0) socket$unix(0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}) syz_open_pts(0xffffffffffffffff, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, 0x0, 0x0) [ 214.937999][T10347] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.945049][T10347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.975241][T10350] chnl_net:caif_netlink_parms(): no params data found [ 215.082831][T10347] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.094521][T10350] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.117023][T10350] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.124649][T10350] device bridge_slave_0 entered promiscuous mode [ 215.133782][T10350] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.141227][T10350] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.148958][T10350] device bridge_slave_1 entered promiscuous mode [ 215.165419][T10347] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.186822][T10358] IPVS: ftp: loaded support on port[0] = 21 [ 215.196859][T10357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.206398][T10357] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.228542][T10357] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.239437][T10357] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 215.270239][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.278740][T10359] bridge0: port 1(bridge_slave_0) entered blocking state 13:51:12 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x8000000006, 0x0, 0x0, 0x50000}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) accept4$unix(r0, 0x0, 0x0, 0x0) [ 215.285791][T10359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.295323][T10350] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 215.330210][T10350] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 215.340297][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.349053][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.356113][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.434312][T10357] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.443137][T10357] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.451379][T10357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.459987][T10357] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 215.492048][T10352] chnl_net:caif_netlink_parms(): no params data found [ 215.501125][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.509906][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.519101][T10350] team0: Port device team_slave_0 added [ 215.525734][T10347] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.569015][T10350] team0: Port device team_slave_1 added [ 215.581213][T10363] IPVS: ftp: loaded support on port[0] = 21 [ 215.591686][T10354] chnl_net:caif_netlink_parms(): no params data found [ 215.659802][T10350] device hsr_slave_0 entered promiscuous mode [ 215.707318][T10350] device hsr_slave_1 entered promiscuous mode [ 215.747150][T10350] debugfs: Directory 'hsr0' with parent '/' already present! [ 215.757658][T10358] chnl_net:caif_netlink_parms(): no params data found [ 215.813231][T10352] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.821188][T10352] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.828923][T10352] device bridge_slave_0 entered promiscuous mode [ 215.836171][T10352] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.843320][T10352] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.850955][T10352] device bridge_slave_1 entered promiscuous mode [ 215.877338][T10347] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.896012][T10354] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.904345][T10354] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.912594][T10354] device bridge_slave_0 entered promiscuous mode [ 215.920630][T10354] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.928210][T10354] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.935792][T10354] device bridge_slave_1 entered promiscuous mode [ 215.943707][T10358] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.951164][T10358] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.958711][T10358] device bridge_slave_0 entered promiscuous mode [ 215.967690][T10358] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.974746][T10358] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.982405][T10358] device bridge_slave_1 entered promiscuous mode [ 215.994093][T10352] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 216.019965][T10352] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 216.045711][T10358] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 216.059988][ T26] audit: type=1400 audit(1567777872.842:38): avc: denied { associate } for pid=10347 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 216.109267][T10354] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 216.119712][T10358] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 216.131363][T10352] team0: Port device team_slave_0 added [ 216.138883][T10352] team0: Port device team_slave_1 added [ 216.165437][T10354] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 216.195786][T10358] team0: Port device team_slave_0 added 13:51:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x8000000006, 0x0, 0x0, 0x50000}]}) r0 = accept$unix(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x0) [ 216.220333][T10354] team0: Port device team_slave_0 added [ 216.228555][T10354] team0: Port device team_slave_1 added [ 216.235519][T10358] team0: Port device team_slave_1 added [ 216.248923][T10363] chnl_net:caif_netlink_parms(): no params data found 13:51:13 executing program 0: clock_gettime(0x1, &(0x7f00000005c0)={0x0}) clock_settime(0x0, &(0x7f0000001340)={r0}) 13:51:13 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000001280)) 13:51:13 executing program 0: add_key(&(0x7f0000000000)='keyring\x00', 0x0, &(0x7f0000000080)='c', 0x1, 0xfffffffffffffffb) [ 216.332302][T10352] device hsr_slave_0 entered promiscuous mode 13:51:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newqdisc={0x40, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x14, 0x2, [@TCA_HHF_ADMIT_BYTES={0x8}, @TCA_HHF_EVICT_TIMEOUT={0x8}]}}]}, 0x40}}, 0x0) [ 216.388440][T10352] device hsr_slave_1 entered promiscuous mode [ 216.408925][T10352] debugfs: Directory 'hsr0' with parent '/' already present! [ 216.469574][T10358] device hsr_slave_0 entered promiscuous mode [ 216.508351][T10358] device hsr_slave_1 entered promiscuous mode [ 216.547052][T10358] debugfs: Directory 'hsr0' with parent '/' already present! [ 216.608495][T10354] device hsr_slave_0 entered promiscuous mode [ 216.647205][T10354] device hsr_slave_1 entered promiscuous mode 13:51:13 executing program 0: sched_setaffinity(0x0, 0xa64, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) [ 216.686983][T10354] debugfs: Directory 'hsr0' with parent '/' already present! [ 216.723595][T10350] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.779068][T10363] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.787930][T10363] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.795716][T10363] device bridge_slave_0 entered promiscuous mode [ 216.806716][T10350] 8021q: adding VLAN 0 to HW filter on device team0 13:51:13 executing program 0: sched_setaffinity(0x0, 0xa64, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) [ 216.831282][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.840283][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.848050][T10363] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.855209][T10363] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.863795][T10363] device bridge_slave_1 entered promiscuous mode [ 216.921925][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.936978][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.945325][T10359] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.952407][T10359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.960343][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.968950][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.977675][T10359] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.984713][T10359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.992563][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.001516][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.010188][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.018555][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.038706][T10363] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 217.051218][T10363] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 217.068602][T10354] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.078586][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.086304][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.094401][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.104966][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.116568][T10350] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 217.127792][T10350] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 217.152837][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.161168][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.171088][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.179365][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.187810][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.200311][T10363] team0: Port device team_slave_0 added [ 217.216339][T10358] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.226023][T10363] team0: Port device team_slave_1 added [ 217.235830][T10350] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.245539][T10352] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.259386][T10358] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.273879][T10354] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.282718][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.290455][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.298103][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.305659][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.331713][T10352] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.348939][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.358652][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.366881][ T3009] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.373958][ T3009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.381477][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.390105][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.398517][ T3009] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.405538][ T3009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.413078][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.421481][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.429174][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.436710][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.445170][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.453492][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.462219][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.470024][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 13:51:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160\x00'}, 0x58) pread64(0xffffffffffffffff, &(0x7f0000005000)=""/4096, 0xffffffc7, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000013c0)=[{&(0x7f0000000000)="d1b3781bb1601df1240cf2f85876d6dbbbafd82f9862b8e2745f3d5a44f5395d5927461fcaf2313acea8d2f37e4510820e25eadfcf535b71c74a01d51130eebabf0199cffed17e6f01d14883ef2dbbe14b203510a09b505627e76f00aa0606c25e2f2e0778036cfe1e3a1f3ad7a1fecab3ab600e415cbae2300e9853d019632cc84b0eb8cca3e2c1c8051650b55cd154", 0x90}, {&(0x7f00000000c0)="9ad7f4e54a17815d65eb9b0b9179e447e885cf3ec36fc09c292fde469fa70492", 0x20}, {&(0x7f00000001c0)="d739ad5275dafacc868da8fecf8c54a6a3e2", 0x12}, {&(0x7f0000000200)="0e1942111cde80dda9a6266597b220bdcd", 0x11}, {0x0}, {&(0x7f0000001240)="a3b150db5303d1d47a1d4a342c117f9527b63a130cf4380cd93b885d21e18f953470aa59fa768a32be41d7163f941d605e271fdb1e42d2493f7ff9cc252cbc275f682c29d22ad6beb9be65799151c7a5f94f9ec7e9bd3ad9dc3cdeefea06691e58818b9c75743bc8f85bf76a69e2eb3c4ec932a111454c5879b05f3e66a3749f3d77460d84c6a8d02f646f4e0bd98d2f73d66a7f171fadda6d0edc09d10fa8ef20a18815c80d56acb443c25f4f2a8ba5a2caab36b8fd7991e2767a1bb0f659c8afe42a", 0xc3}, {&(0x7f0000001340)}], 0x7, 0x0) r1 = accept$alg(r0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x0, 0x0, 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) fchdir(r2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_FPEXC(0xb, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r3, &(0x7f0000001480)=ANY=[], 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') creat(0x0, 0x0) sendmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000180)='\n', 0x7ffff000}], 0x1}}], 0x1, 0x0) [ 217.549255][T10363] device hsr_slave_0 entered promiscuous mode [ 217.590289][T10410] FAT-fs (loop1): bogus number of reserved sectors [ 217.596890][T10410] FAT-fs (loop1): Can't find a valid FAT filesystem [ 217.604088][T10363] device hsr_slave_1 entered promiscuous mode [ 217.636947][ C1] hrtimer: interrupt took 27559 ns [ 217.657473][T10363] debugfs: Directory 'hsr0' with parent '/' already present! [ 217.665282][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.674209][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.685368][T10359] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.692479][T10359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.703651][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.712646][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.721099][T10359] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.728178][T10359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.743966][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.752634][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.761034][T10359] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.768114][T10359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.775799][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.784832][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.793270][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.801604][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.809878][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.818202][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.826516][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.834510][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.874808][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.883917][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.899966][T10365] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.907052][T10365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.918103][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.926726][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.938262][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.946849][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.958914][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.969831][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.979084][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.989916][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.016038][T10354] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 218.029322][T10354] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 218.045202][T10358] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.054584][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.063732][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.075434][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.092435][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.105319][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.114086][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.125164][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.143417][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.152293][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.163241][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.171398][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.205963][T10352] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 218.224762][T10352] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 218.251173][T10354] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.259771][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.279783][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.291710][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.300172][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.313064][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.336622][T10352] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.365233][T10363] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.406779][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.427534][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.442929][T10363] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.451495][T10429] FAT-fs (loop1): bogus number of reserved sectors [ 218.497152][T10429] FAT-fs (loop1): Can't find a valid FAT filesystem [ 218.522704][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.533065][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.542435][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.549533][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.558616][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.569262][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.577825][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.584882][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.595808][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.604565][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.613520][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.667338][T10357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.675891][T10357] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.709272][T10357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.723662][T10357] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.732331][T10357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.744430][T10357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.755464][T10363] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 218.769065][T10363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.788098][T10357] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.795927][T10357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.808265][T10357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.857132][T10363] 8021q: adding VLAN 0 to HW filter on device batadv0 13:51:15 executing program 2: r0 = open(&(0x7f0000000040)='.\x00', 0x143042, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x27c) r1 = gettid() write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000100)) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0xb7) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) write$P9_RATTACH(r0, 0x0, 0xfffffffffffffdd3) tkill(r1, 0x1000000000016) 13:51:15 executing program 0: sched_setaffinity(0x0, 0xa64, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xa246d6afe2c05f5e, 0x0}}], 0x400000000000004, 0x0, 0x0) socket$inet(0x2, 0x2, 0x0) pipe(&(0x7f0000000180)) pipe(&(0x7f0000000180)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 13:51:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x5d, 0x2, 0x9d, "59afc9eda6e5aca56f4e02f2808b9f93", "30c9f307151202cc33cc2ecedc5239bfcdeee2cecc8934d2e09ecd4c81214118dbb9dcbf568390beb655625818958544233969989b39fbeb6ccb5c2b39222b3f53342db70b956517"}, 0x5d, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x2ee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) socket$key(0xf, 0x3, 0x2) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000180)={0x0, 0x80000}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000000), 0x4) recvmmsg(0xffffffffffffff9c, &(0x7f0000008880)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000240)=""/62, 0x3e}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000e1, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) pwritev(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000002c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) 13:51:16 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x40, &(0x7f00000000c0)) 13:51:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001800)={0x14, 0x16, 0x28e3a129d07139f9, 0x0, 0x0, {0x1f}}, 0x14}}, 0x0) 13:51:16 executing program 0: sched_setaffinity(0x0, 0xa64, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000), 0x1c) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = dup2(r2, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 13:51:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x5d, 0x2, 0x9d, "59afc9eda6e5aca56f4e02f2808b9f93", "30c9f307151202cc33cc2ecedc5239bfcdeee2cecc8934d2e09ecd4c81214118dbb9dcbf568390beb655625818958544233969989b39fbeb6ccb5c2b39222b3f53342db70b956517"}, 0x5d, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x2ee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000000), 0x4) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000008880)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000240)=""/62, 0x3e}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000e1, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) pwritev(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0xfffffeff000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000002c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) [ 219.284201][ T26] audit: type=1400 audit(1567777876.069:39): avc: denied { create } for pid=10477 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 13:51:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x25, 0x0, 0x0) [ 219.384028][ T26] audit: type=1400 audit(1567777876.099:40): avc: denied { write } for pid=10477 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 13:51:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000000), 0x0) 13:51:16 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x8000000006, 0x0, 0x0, 0x50000}]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) [ 219.514175][ T26] audit: type=1400 audit(1567777876.299:41): avc: denied { read } for pid=10484 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 13:51:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) io_setup(0x3, &(0x7f0000000540)=0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) io_submit(r1, 0x2, &(0x7f0000000580)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1}]) 13:51:16 executing program 0: sched_setaffinity(0x0, 0xa64, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:16 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x2, 0x4, 0x7fff, 0x1}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000040), &(0x7f0000000040)}, 0x20) [ 219.735108][ T26] audit: type=1400 audit(1567777876.519:42): avc: denied { map_create } for pid=10509 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 13:51:16 executing program 5: 13:51:16 executing program 0: sched_setaffinity(0x0, 0xa64, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802106003ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x400000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xb, 0x0, 0xca}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 219.787123][ T26] audit: type=1400 audit(1567777876.519:43): avc: denied { map_read map_write } for pid=10509 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 13:51:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) io_setup(0x3, &(0x7f0000000540)=0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) io_submit(r1, 0x2, &(0x7f0000000580)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1, r3}]) 13:51:16 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x1000) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x2, 0x32, 0xffffffffffffffff, 0x0) 13:51:16 executing program 4: syz_genetlink_get_family_id$tipc(0x0) creat(0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) mmap$binder(&(0x7f0000dff000/0x200000)=nil, 0x200000, 0x1, 0x11, r1, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000004c0)={0x2b, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1163484000"/35, @ANYPTR64=&(0x7f0000000080)=ANY=[]], 0x0, 0x0, 0x0}) 13:51:16 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xa246d6afe2c05f5e, 0x0}}], 0x400000000000004, 0x0, 0x0) pipe(&(0x7f0000000180)) pipe(&(0x7f0000000180)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 13:51:16 executing program 0: sched_setaffinity(0x0, 0xa64, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:16 executing program 1: [ 220.032806][T10540] debugfs: File '10529' in directory 'proc' already present! 13:51:16 executing program 3: [ 220.091272][ T26] audit: type=1400 audit(1567777876.879:44): avc: denied { map } for pid=10529 comm="syz-executor.4" path="/dev/binder4" dev="devtmpfs" ino=18478 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 13:51:16 executing program 0: sched_setaffinity(0x0, 0xa64, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) [ 220.145104][T10540] debugfs: File '10529' in directory 'proc' already present! 13:51:17 executing program 3: 13:51:17 executing program 1: 13:51:17 executing program 4: 13:51:17 executing program 2: 13:51:17 executing program 0: sched_setaffinity(0x0, 0xa64, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:17 executing program 5: 13:51:17 executing program 4: 13:51:17 executing program 3: 13:51:17 executing program 1: 13:51:17 executing program 2: 13:51:17 executing program 5: 13:51:17 executing program 4: 13:51:17 executing program 0: sched_setaffinity(0x0, 0xa64, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:17 executing program 1: 13:51:17 executing program 3: 13:51:17 executing program 2: 13:51:17 executing program 5: 13:51:17 executing program 3: 13:51:17 executing program 4: 13:51:17 executing program 1: 13:51:17 executing program 0: sched_setaffinity(0x0, 0xa64, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:17 executing program 2: 13:51:17 executing program 5: 13:51:17 executing program 1: 13:51:17 executing program 2: 13:51:17 executing program 4: 13:51:17 executing program 3: 13:51:17 executing program 0: sched_setaffinity(0x0, 0xa64, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:17 executing program 5: 13:51:17 executing program 1: 13:51:17 executing program 2: 13:51:17 executing program 4: 13:51:17 executing program 3: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) shutdown(r0, 0x1) 13:51:17 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x11, 0x800000003, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) getresuid(&(0x7f0000000100)=0x0, &(0x7f00000001c0), &(0x7f00000002c0)) setfsuid(r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) getresuid(&(0x7f0000000100)=0x0, &(0x7f00000001c0), &(0x7f00000002c0)) setfsuid(r3) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in=@dev, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getsockname(r1, &(0x7f0000004480)=@can, &(0x7f0000002300)=0x80) 13:51:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x2cb, 0x400000000000) 13:51:18 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000740)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, 0x0) 13:51:18 executing program 0: sched_setaffinity(0x0, 0xa64, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r5 = dup2(r3, r4) ioctl$KVM_IOEVENTFD(r1, 0x4020ae46, &(0x7f00000001c0)={0x0, 0x0, 0x0, r5}) ioctl$KVM_IOEVENTFD(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, r2}) 13:51:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newqdisc={0xd4, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@TCA_STAB={0xb0, 0x8, [{{0x1c, 0x1, {0x5, 0x3ff, 0x6, 0x9, 0x0, 0x3, 0x3ff, 0x5}}, {0x10, 0x2, [0x1, 0x7, 0x9, 0x0, 0x3]}}, {{0x1c, 0x1, {0x40, 0x33, 0xffffffffffffff00, 0x80000001, 0x2, 0x2, 0x3, 0x5}}, {0x10, 0x2, [0x5, 0x6, 0x1, 0x6, 0x3]}}, {{0x1c, 0x1, {0x101, 0x0, 0x81, 0x2, 0x2, 0x7, 0x100}}, {0x4}}, {{0x1c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}}, {0x18, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x361, 0x0, 0x0, 0x0, 0x0]}}]}]}, 0xd4}}, 0x0) 13:51:18 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 13:51:18 executing program 0: sched_setaffinity(0x0, 0xa64, &(0x7f0000000200)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) [ 221.340691][T10639] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 13:51:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x8000000006, 0x0, 0x0, 0x50000}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x0, 0x0) 13:51:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e22, 0x0, @ipv4}, 0x1b) recvfrom$inet6(r2, 0x0, 0x0, 0x12000, &(0x7f0000000240)={0xa, 0x0, 0x0, @rand_addr="91b05922016e2aacf58ee38fe8adc736"}, 0x719000) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 13:51:18 executing program 5: getpid() sysfs$1(0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) msync(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x7) recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) creat(0x0, 0x0) epoll_create1(0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000180), 0x0) bind$inet6(r1, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) pipe(&(0x7f0000000340)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) sendmsg(0xffffffffffffffff, 0x0, 0xedecbfa7fe12a99e) creat(&(0x7f0000000140)='./bus\x00', 0x100010010) 13:51:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) [ 221.685018][T10674] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 221.687397][T10666] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:51:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000740)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x2, 0x800, 0x0, &(0x7f0000000000)) 13:51:18 executing program 4: socket$bt_hidp(0x1f, 0x3, 0x6) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22, 0xfffffffffffffffd, 0x0, 0x0, 0x1f, 0x20000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) syz_extract_tcp_res(0x0, 0x5c, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000440)={'filter\x00', 0x0, 0x4, 0x3a, [], 0x7, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=""/58}, &(0x7f00000004c0)=0x78) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) read(r2, &(0x7f0000000000)=""/81, 0xe2bf2c0a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@dev}}, 0xffffffffffffffff) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000500)=@gcm_256={{0x304}, "6d8df93a2bd02204", "a172e186c47dc606fe2e9d3b1ecee38b2fc677de093b788e950bf0845d5bc075", "b07b481d", "317034ca89953202"}, 0x38) perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x6, 0x0, 0x6, 0x0, 0x0, 0x7ff, 0x4001, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x0, 0x7, 0x400, 0x7f, 0x0, 0x143, 0x0, 0x1, 0x0, 0xffffffffffffff96, 0x3, 0x1000, 0x200, 0x0, 0xfffffffffffffff8, 0x4, @perf_bp={&(0x7f0000000000), 0x6}, 0x8, 0x9, 0x3, 0x9, 0x40}, 0x0, 0x6, 0xffffffffffffffff, 0xb) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffffffffffc, r3}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)) 13:51:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000000)=0x9, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 13:51:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) [ 222.110575][T10694] raw_sendmsg: syz-executor.5 forgot to set AF_INET. Fix it! 13:51:19 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x401, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) io_setup(0x0, 0x0) pipe2(0x0, 0x800) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x800) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000340)={'broute\x00'}, &(0x7f0000000040)=0x78) io_setup(0x100b05, &(0x7f0000000300)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 13:51:19 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000140)=0x5, 0x4) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 13:51:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newqdisc={0x5c, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x38, 0x8, [{{0x1c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}}, {0x18, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}]}]}, 0x5c}}, 0x0) 13:51:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x9004) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x2cb, 0x400000000000) 13:51:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sysfs$1(0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) msync(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x7) recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) writev(r1, &(0x7f00000023c0), 0x1000000000000252) creat(&(0x7f00000001c0)='./file0\x00', 0x0) epoll_create1(0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x12000, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000180), 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) socket$inet6_udp(0xa, 0x2, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) socket$inet6(0xa, 0x400000000001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@hci, &(0x7f0000000300)=0x80) creat(&(0x7f0000000140)='./bus\x00', 0x100010010) 13:51:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:19 executing program 4: r0 = socket(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r2) 13:51:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x2cb, 0x400000000000) 13:51:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:19 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x8000000006, 0x0, 0x0, 0x50000}]}) r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, 0x0, 0x0) 13:51:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) [ 222.721796][T10733] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:51:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='bridge_slave_1\x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:51:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000500)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000500)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_int(r2, 0x29, 0x6, &(0x7f00000000c0), 0xfdcc) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000100)=""/128) 13:51:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="500100002a000b04000000000000100000000000", @ANYRES32=r2, @ANYBLOB="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"/322], 0x150}}, 0x0) 13:51:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'bridge_slave_0\x00', &(0x7f00000001c0)=@ethtool_sset_info={0x37, 0x0, 0x4}}) 13:51:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) 13:51:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="3100000013000900690006342fc56aef40be44081000000046000107000000540d0003c0", 0x24}], 0x1) write(0xffffffffffffffff, &(0x7f0000000140)="2400000052001f0600000007000904000a", 0x11) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x3, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 13:51:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:20 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYRESOCT], 0x17) 13:51:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 13:51:20 executing program 5: 13:51:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:20 executing program 4: 13:51:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000140)=0x5, 0x4) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 13:51:20 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x5f}], 0x48, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 13:51:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue0\x00'}) 13:51:20 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RMKNOD(r0, &(0x7f0000000180)={0x14, 0x13, 0x2, {0x2, 0x1, 0x6}}, 0x14) 13:51:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:20 executing program 3: 13:51:20 executing program 5: [ 223.915460][ T26] audit: type=1326 audit(1567777880.699:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10835 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c6ba code=0x0 13:51:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:20 executing program 1: 13:51:20 executing program 3: 13:51:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:20 executing program 5: 13:51:20 executing program 1: 13:51:21 executing program 4: 13:51:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:21 executing program 3: 13:51:21 executing program 1: 13:51:21 executing program 5: [ 224.699961][ T26] audit: type=1326 audit(1567777881.489:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10835 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c6ba code=0x0 13:51:21 executing program 5: 13:51:21 executing program 1: 13:51:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:21 executing program 4: 13:51:21 executing program 3: 13:51:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:21 executing program 4: 13:51:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:21 executing program 5: 13:51:21 executing program 1: 13:51:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:21 executing program 3: 13:51:21 executing program 4: 13:51:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) 13:51:21 executing program 1: 13:51:21 executing program 5: 13:51:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:21 executing program 3: 13:51:22 executing program 1: 13:51:22 executing program 4: 13:51:22 executing program 5: 13:51:22 executing program 3: 13:51:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) 13:51:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:22 executing program 1: 13:51:22 executing program 4: 13:51:22 executing program 5: 13:51:22 executing program 3: 13:51:22 executing program 5: 13:51:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:22 executing program 4: 13:51:22 executing program 3: 13:51:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) 13:51:22 executing program 1: 13:51:22 executing program 4: 13:51:22 executing program 3: 13:51:22 executing program 5: 13:51:22 executing program 1: 13:51:22 executing program 0: 13:51:22 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:22 executing program 4: 13:51:22 executing program 3: 13:51:22 executing program 1: 13:51:22 executing program 5: 13:51:22 executing program 4: 13:51:22 executing program 0: 13:51:22 executing program 3: 13:51:22 executing program 1: 13:51:22 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:22 executing program 5: 13:51:22 executing program 4: 13:51:22 executing program 0: 13:51:22 executing program 1: 13:51:22 executing program 3: 13:51:22 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:23 executing program 5: 13:51:23 executing program 0: 13:51:23 executing program 4: 13:51:23 executing program 3: 13:51:23 executing program 1: 13:51:23 executing program 5: 13:51:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(r0, 0x0, 0x0) 13:51:23 executing program 4: 13:51:23 executing program 3: 13:51:23 executing program 0: 13:51:23 executing program 5: 13:51:23 executing program 3: 13:51:23 executing program 1: 13:51:23 executing program 4: 13:51:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(r0, 0x0, 0x0) 13:51:23 executing program 4: 13:51:23 executing program 1: 13:51:23 executing program 5: 13:51:23 executing program 0: getpid() fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000001c0)='security.SMACK64IPOUT\x00', 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f00000001c0)=ANY=[]) close(r0) creat(&(0x7f0000000400)='./file1\x00', 0x0) 13:51:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000003840)=ANY=[@ANYBLOB="1c0000001600f93900000000000000001f020000080001001e000000b9b6be00b57ab65de243a14f2bd939ddb2308355ae94371ea1b6e29f78447177b1f81c58103a5219de5dd6e54b343f6d42402484332229e01b98f8a7903c03072a39ae4d18ab88dcbcf7ca7a78ffa4cb37193508e9a100184bec0036369d1bf49f7320f30c2dd44b564f6d03bb0e188abb66879a1a5a07fd0f"], 0x1c}}, 0x0) 13:51:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(r0, 0x0, 0x0) 13:51:23 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./control\x00', 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='./control\x00') 13:51:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1}) 13:51:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) creat(0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r1, 0x100, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x6, @media='udp\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x20008864) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r2, 0x0, &(0x7f0000000540)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000140), 0xffffff35) 13:51:23 executing program 4: sched_setaffinity(0x0, 0xa64, &(0x7f0000000200)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 13:51:23 executing program 4 (fault-call:3 fault-nth:0): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:23 executing program 5: keyctl$set_reqkey_keyring(0xe, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000080)=""/148, 0x94}], 0x100002db, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x18300, 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000280)=r1) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, 0x0, 0x40800) ioctl(0xffffffffffffffff, 0x401, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') 13:51:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 13:51:23 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000180)="a3ec9dff64e1f2494e9303a7655274a3abd13297d4", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x103400) ioctl$RTC_PIE_OFF(r2, 0x7006) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x40100, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000100)=0x1fad) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="006386dd07ba7c147844b1df5f58367e522e89227ba33996b5592dc1672328a2409507ac32b28e7a62eff1b3f44dbffdd1c4e45f417953d34b6522599c63169b39f77568b7d56496a9a8db32d410ebaeaf530d24d81e69384ca7cf72"], 0x90ad) [ 227.122350][T11068] FAULT_INJECTION: forcing a failure. [ 227.122350][T11068] name failslab, interval 1, probability 0, space 0, times 1 [ 227.190661][T11068] CPU: 0 PID: 11068 Comm: syz-executor.4 Not tainted 5.3.0-rc7+ #0 [ 227.198769][T11068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.198775][T11068] Call Trace: [ 227.198797][T11068] dump_stack+0x172/0x1f0 [ 227.198817][T11068] should_fail.cold+0xa/0x15 [ 227.198832][T11068] ? lock_downgrade+0x920/0x920 [ 227.198851][T11068] ? fault_create_debugfs_attr+0x180/0x180 [ 227.231709][T11068] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 227.237435][T11068] __should_failslab+0x121/0x190 [ 227.242377][T11068] should_failslab+0x9/0x14 [ 227.246873][T11068] kmem_cache_alloc+0x47/0x710 [ 227.251634][T11068] ? trace_hardirqs_off+0x62/0x240 [ 227.256747][T11068] dst_alloc+0x10e/0x200 [ 227.260987][T11068] rt_dst_alloc+0x83/0x3f0 [ 227.265406][T11068] ip_route_output_key_hash_rcu+0x8d7/0x2d70 [ 227.265417][T11068] ? __kasan_check_read+0x11/0x20 [ 227.265436][T11068] ? ip_route_input_noref+0x270/0x270 [ 227.281782][T11068] ? ip_route_output_key_hash+0x161/0x360 [ 227.287506][T11068] ip_route_output_key_hash+0x1ef/0x360 [ 227.293059][T11068] ? ip_route_output_key_hash_rcu+0x2d70/0x2d70 [ 227.293072][T11068] ? __kasan_check_read+0x11/0x20 [ 227.293093][T11068] ? lock_downgrade+0x920/0x920 [ 227.309283][T11068] ip_route_output_flow+0x28/0xc0 [ 227.309297][T11068] udp_sendmsg+0x1bc9/0x2830 [ 227.309314][T11068] ? ip_reply_glue_bits+0xc0/0xc0 [ 227.309329][T11068] ? udp_push_pending_frames+0xf0/0xf0 [ 227.309348][T11068] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 227.309365][T11068] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 227.309383][T11068] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 227.309402][T11068] ? tomoyo_socket_bind_permission+0x360/0x360 [ 227.309416][T11068] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 227.309436][T11068] ? copy_msghdr_from_user+0x2da/0x440 [ 227.309455][T11068] inet_sendmsg+0x9e/0xe0 [ 227.309468][T11068] ? inet_sendmsg+0x9e/0xe0 [ 227.309481][T11068] ? inet_send_prepare+0x4f0/0x4f0 [ 227.309494][T11068] sock_sendmsg+0xd7/0x130 [ 227.309509][T11068] ___sys_sendmsg+0x3e2/0x920 [ 227.309525][T11068] ? copy_msghdr_from_user+0x440/0x440 [ 227.309542][T11068] ? lock_downgrade+0x920/0x920 [ 227.309557][T11068] ? __fget+0xa3/0x560 [ 227.309571][T11068] ? getname+0x1a/0x20 [ 227.309586][T11068] ? __fget+0x384/0x560 [ 227.309601][T11068] ? ksys_dup3+0x3e0/0x3e0 [ 227.309615][T11068] ? get_pid_task+0xc9/0x190 [ 227.309630][T11068] ? __fget_light+0x1a9/0x230 [ 227.309643][T11068] ? __fdget+0x1b/0x20 [ 227.309657][T11068] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 227.309671][T11068] ? sockfd_lookup_light+0xcb/0x180 [ 227.309686][T11068] __sys_sendmmsg+0x1bf/0x4d0 [ 227.309703][T11068] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 227.309728][T11068] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 227.309748][T11068] ? fput_many+0x12c/0x1a0 [ 227.309762][T11068] ? fput+0x1b/0x20 [ 227.309774][T11068] ? ksys_write+0x1cf/0x290 [ 227.309788][T11068] ? __ia32_sys_read+0xb0/0xb0 [ 227.309803][T11068] ? switch_fpu_return+0x1fa/0x4f0 [ 227.309819][T11068] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 227.309842][T11068] __x64_sys_sendmmsg+0x9d/0x100 [ 227.309865][T11068] do_syscall_64+0xfd/0x6a0 [ 227.309881][T11068] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.309892][T11068] RIP: 0033:0x459879 [ 227.309906][T11068] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 227.309914][T11068] RSP: 002b:00007f1be9988c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 227.309926][T11068] RAX: ffffffffffffffda RBX: 00007f1be9988c90 RCX: 0000000000459879 [ 227.309934][T11068] RDX: 0400000000000030 RSI: 0000000020007fc0 RDI: 0000000000000003 [ 227.309941][T11068] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 227.309949][T11068] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1be99896d4 [ 227.309956][T11068] R13: 00000000004c706e R14: 00000000004dc6e8 R15: 0000000000000004 [ 227.606777][T11079] device nr0 entered promiscuous mode 13:51:24 executing program 4 (fault-call:3 fault-nth:1): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 13:51:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x16f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r5 = dup(r4) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r6 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xf860, 0x80) getsockopt$inet_sctp6_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000500)=0x8) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000000c0)={"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"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0x100005) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 13:51:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x6, &(0x7f00000000c0)="4b0009e95e617d547bf070f2f9c95ebac8aacc48222c052fd7114c7a667c7ed7ea381a57f8f473d160cfce113f4fe54051029e54def790e061c17fd86e43c008b768a9d0a50d6917") r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000140)={@dev, @empty, 0x0}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f00000001c0)={@ipv4={[], [], @multicast2}, r3}, 0x14) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-512,ctr(twofish))\x00'}, 0x58) 13:51:24 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) set_mempolicy(0x1, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/p\xf2o\x05\x00\x00\x00\x00\x00\x00\x00api20\x00', 0xad13ac6137d9528f, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000380)={'filter\x00', 0x7, 0x4, 0x4a8, 0x140, 0x140, 0x140, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000100), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@local, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast2, @broadcast, 0x4}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @mac=@broadcast, @local, @broadcast, 0x8, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2711, 0x0, &(0x7f0000000180)) socket$l2tp(0x18, 0x1, 0x1) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000000c0)={0x2, 0x5, 0x7624}, 0xc) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) 13:51:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 227.825790][T11098] FAULT_INJECTION: forcing a failure. [ 227.825790][T11098] name failslab, interval 1, probability 0, space 0, times 0 [ 227.861059][T11075] device nr0 entered promiscuous mode [ 227.901100][T11094] kvm: vcpu 0: requested 128 ns lapic timer period limited to 200000 ns [ 227.915445][T11098] CPU: 1 PID: 11098 Comm: syz-executor.4 Not tainted 5.3.0-rc7+ #0 [ 227.923370][T11098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.933432][T11098] Call Trace: [ 227.936822][T11098] dump_stack+0x172/0x1f0 [ 227.941189][T11098] should_fail.cold+0xa/0x15 [ 227.945796][T11098] ? fault_create_debugfs_attr+0x180/0x180 [ 227.951612][T11098] ? page_to_nid.part.0+0x20/0x20 [ 227.956673][T11098] ? ___might_sleep+0x163/0x280 [ 227.961537][T11098] __should_failslab+0x121/0x190 [ 227.966488][T11098] should_failslab+0x9/0x14 [ 227.971000][T11098] kmem_cache_alloc_node+0x268/0x740 [ 227.976292][T11098] ? stack_trace_consume_entry+0x190/0x190 [ 227.982113][T11098] __alloc_skb+0xd5/0x5e0 [ 227.986447][T11098] ? netdev_alloc_frag+0x1b0/0x1b0 [ 227.991577][T11098] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 227.997394][T11098] ? kasan_slab_alloc+0xf/0x20 [ 228.002165][T11098] ? kmem_cache_alloc+0x121/0x710 [ 228.007199][T11098] ? dst_alloc+0x10e/0x200 [ 228.011620][T11098] ? rt_dst_alloc+0x83/0x3f0 [ 228.016221][T11098] ? ip_route_output_key_hash_rcu+0x8d7/0x2d70 [ 228.022387][T11098] ? ip_route_output_key_hash+0x1ef/0x360 [ 228.028111][T11098] ? ip_route_output_flow+0x28/0xc0 [ 228.033323][T11098] alloc_skb_with_frags+0x93/0x580 [ 228.038441][T11098] ? lock_downgrade+0x920/0x920 [ 228.043564][T11098] sock_alloc_send_pskb+0x7ad/0x920 [ 228.048766][T11098] ? __kasan_check_read+0x11/0x20 [ 228.053824][T11098] ? proto_register+0x990/0x990 [ 228.058687][T11098] ? rt_add_uncached_list+0x147/0x1a0 [ 228.064062][T11098] ? trace_hardirqs_on+0x67/0x240 [ 228.069088][T11098] ? rt_add_uncached_list+0x147/0x1a0 [ 228.074467][T11098] ? __local_bh_enable_ip+0x15a/0x270 [ 228.079844][T11098] sock_alloc_send_skb+0x32/0x40 [ 228.084787][T11098] __ip_append_data.isra.0+0x16d5/0x30f0 [ 228.090428][T11098] ? ip_reply_glue_bits+0xc0/0xc0 [ 228.095469][T11098] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 228.101891][T11098] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.108162][T11098] ? ip_setup_cork+0x548/0x870 [ 228.112934][T11098] ip_make_skb+0x249/0x2c0 [ 228.117355][T11098] ? ip_reply_glue_bits+0xc0/0xc0 [ 228.122387][T11098] ? ip_flush_pending_frames+0x30/0x30 [ 228.127863][T11098] ? ip_route_output_key_hash_rcu+0x2d70/0x2d70 [ 228.134115][T11098] ? __kasan_check_read+0x11/0x20 [ 228.139153][T11098] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.145399][T11098] ? xfrm_lookup_route+0x5b/0x1f0 [ 228.150445][T11098] udp_sendmsg+0x1e3b/0x2830 [ 228.155047][T11098] ? ip_reply_glue_bits+0xc0/0xc0 [ 228.160076][T11098] ? udp_push_pending_frames+0xf0/0xf0 [ 228.165531][T11098] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.171771][T11098] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.178003][T11098] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 228.183891][T11098] ? tomoyo_socket_bind_permission+0x360/0x360 [ 228.190039][T11098] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.196276][T11098] ? copy_msghdr_from_user+0x2da/0x440 [ 228.201730][T11098] inet_sendmsg+0x9e/0xe0 [ 228.206050][T11098] ? inet_sendmsg+0x9e/0xe0 [ 228.210565][T11098] ? inet_send_prepare+0x4f0/0x4f0 [ 228.215673][T11098] sock_sendmsg+0xd7/0x130 [ 228.220091][T11098] ___sys_sendmsg+0x3e2/0x920 [ 228.224764][T11098] ? copy_msghdr_from_user+0x440/0x440 [ 228.230214][T11098] ? lock_downgrade+0x920/0x920 [ 228.235059][T11098] ? __fget+0xa3/0x560 [ 228.239123][T11098] ? getname+0x1a/0x20 [ 228.243181][T11098] ? __fget+0x384/0x560 [ 228.247330][T11098] ? ksys_dup3+0x3e0/0x3e0 [ 228.251739][T11098] ? get_pid_task+0xc9/0x190 [ 228.256339][T11098] ? __fget_light+0x1a9/0x230 [ 228.261027][T11098] ? __fdget+0x1b/0x20 [ 228.265088][T11098] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.271319][T11098] ? sockfd_lookup_light+0xcb/0x180 [ 228.276509][T11098] __sys_sendmmsg+0x1bf/0x4d0 [ 228.281182][T11098] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 228.286209][T11098] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 228.292443][T11098] ? fput_many+0x12c/0x1a0 [ 228.296997][T11098] ? fput+0x1b/0x20 [ 228.300804][T11098] ? ksys_write+0x1cf/0x290 [ 228.305306][T11098] ? __ia32_sys_read+0xb0/0xb0 [ 228.310067][T11098] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 228.316134][T11098] __x64_sys_sendmmsg+0x9d/0x100 [ 228.321065][T11098] do_syscall_64+0xfd/0x6a0 [ 228.325560][T11098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.331440][T11098] RIP: 0033:0x459879 13:51:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 13:51:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 13:51:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x0, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x0, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) [ 228.335329][T11098] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 228.355199][T11098] RSP: 002b:00007f1be9988c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 228.363622][T11098] RAX: ffffffffffffffda RBX: 00007f1be9988c90 RCX: 0000000000459879 [ 228.371588][T11098] RDX: 0400000000000030 RSI: 0000000020007fc0 RDI: 0000000000000003 [ 228.379570][T11098] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 228.387530][T11098] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1be99896d4 [ 228.395491][T11098] R13: 00000000004c706e R14: 00000000004dc6e8 R15: 0000000000000004 13:51:25 executing program 0: write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffecf) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$rxrpc(0x21, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) modify_ldt$write(0x1, 0x0, 0x0) r0 = syz_open_dev$media(0x0, 0xb6c, 0x80) mkdir(0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r1 = request_key(&(0x7f0000000000)='id_resolver\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffff9) keyctl$get_security(0x11, r1, &(0x7f00000001c0)=""/115, 0x59) r2 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)="bf4e179ffba1dfd2e6cfa9df445d13530ab50e1752694d7a60dd77159d818256db71a9489b98b766b72cc75c2f7f2c4932914761c98fe0d3d31032fce95e12a06a373148693c64f019e2", 0x4a, r1) r3 = request_key(&(0x7f0000000000)='id_resolver\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffff9) keyctl$get_security(0x11, r3, &(0x7f00000001c0)=""/115, 0x59) keyctl$instantiate(0xc, r2, &(0x7f0000000280)=@encrypted_update={'update ', 'default', 0x20, 'trusted:', '/dev/input/mice\x00'}, 0x28, r3) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x6379, "5de6a7cb9333fd0c3d3566811b74ba283fe652035af06b09cbc107dea89723d0", 0x3, 0x1}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f00000000c0)={0x81, 0x1200e0, "405b89b72e760c1a351ee541351c4c4963401dd32db1d017", {0xfffffffffffffffc, 0xdf78}, 0x9}) unshare(0x40000000) 13:51:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r0, 0x1, 0x1f, 0x0, &(0x7f0000000080)=0x4c23b13840d3d696) 13:51:25 executing program 4 (fault-call:3 fault-nth:2): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/i/rdma_cm\x00\x80\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) r1 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2711, 0x0, &(0x7f0000000180)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@initdev, @in=@initdev}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000000)=0xe8) 13:51:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8000000000000}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x3) ioctl$TCFLSH(r2, 0x80047456, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000040)) 13:51:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x0, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) [ 228.601683][T11139] FAULT_INJECTION: forcing a failure. [ 228.601683][T11139] name failslab, interval 1, probability 0, space 0, times 0 13:51:25 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffb3, &(0x7f0000000040)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40000, 0x0) r2 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2711, 0x0, &(0x7f0000000180)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000040)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000140)=0xe8) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x800) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) mq_timedreceive(r4, &(0x7f0000000200)=""/21, 0x15, 0xd4, &(0x7f0000000280)={r5, r6+10000000}) ioctl$TUNSETOWNER(r1, 0x400454cc, r3) [ 228.649530][T11135] IPVS: ftp: loaded support on port[0] = 21 [ 228.677319][T11139] CPU: 0 PID: 11139 Comm: syz-executor.4 Not tainted 5.3.0-rc7+ #0 [ 228.685242][T11139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.685247][T11139] Call Trace: [ 228.685267][T11139] dump_stack+0x172/0x1f0 [ 228.685290][T11139] should_fail.cold+0xa/0x15 [ 228.707529][T11139] ? fault_create_debugfs_attr+0x180/0x180 [ 228.713358][T11139] ? page_to_nid.part.0+0x20/0x20 [ 228.718391][T11139] ? ___might_sleep+0x163/0x280 [ 228.723254][T11139] __should_failslab+0x121/0x190 [ 228.728198][T11139] should_failslab+0x9/0x14 [ 228.732707][T11139] kmem_cache_alloc_node_trace+0x274/0x750 [ 228.738517][T11139] ? kasan_unpoison_shadow+0x35/0x50 [ 228.738532][T11139] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 13:51:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) [ 228.738547][T11139] __kmalloc_node_track_caller+0x3d/0x70 [ 228.738564][T11139] __kmalloc_reserve.isra.0+0x40/0xf0 [ 228.738578][T11139] __alloc_skb+0x10b/0x5e0 [ 228.738592][T11139] ? netdev_alloc_frag+0x1b0/0x1b0 [ 228.738608][T11139] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 228.775955][T11139] ? kasan_slab_alloc+0xf/0x20 [ 228.780721][T11139] ? kmem_cache_alloc+0x121/0x710 [ 228.785745][T11139] ? dst_alloc+0x10e/0x200 [ 228.790162][T11139] ? rt_dst_alloc+0x83/0x3f0 [ 228.794754][T11139] ? ip_route_output_key_hash_rcu+0x8d7/0x2d70 [ 228.800951][T11139] ? ip_route_output_key_hash+0x1ef/0x360 [ 228.806673][T11139] ? ip_route_output_flow+0x28/0xc0 [ 228.811877][T11139] alloc_skb_with_frags+0x93/0x580 [ 228.816992][T11139] ? lock_downgrade+0x920/0x920 [ 228.821845][T11139] sock_alloc_send_pskb+0x7ad/0x920 [ 228.827039][T11139] ? __kasan_check_read+0x11/0x20 [ 228.827055][T11139] ? proto_register+0x990/0x990 [ 228.827068][T11139] ? rt_add_uncached_list+0x147/0x1a0 [ 228.827080][T11139] ? trace_hardirqs_on+0x67/0x240 [ 228.827092][T11139] ? rt_add_uncached_list+0x147/0x1a0 [ 228.827107][T11139] ? __local_bh_enable_ip+0x15a/0x270 [ 228.827122][T11139] sock_alloc_send_skb+0x32/0x40 [ 228.827143][T11139] __ip_append_data.isra.0+0x16d5/0x30f0 [ 228.847375][T11139] ? ip_reply_glue_bits+0xc0/0xc0 [ 228.847396][T11139] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 228.847413][T11139] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.847428][T11139] ? ip_setup_cork+0x548/0x870 [ 228.858142][T11139] ip_make_skb+0x249/0x2c0 [ 228.858158][T11139] ? ip_reply_glue_bits+0xc0/0xc0 13:51:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000280)={0x2, 'syz_tun\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) syz_emit_ethernet(0x1301, &(0x7f00000002c0)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [], {@ipx={0x8137, {0xffff, 0x101e, 0xc37, 0x0, {@random=0x80, @broadcast, 0x6}, {@current, @current, 0x2}, "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"}}}}, 0x0) [ 228.858172][T11139] ? ip_flush_pending_frames+0x30/0x30 [ 228.858182][T11139] ? ip_route_output_key_hash_rcu+0x2d70/0x2d70 [ 228.858200][T11139] ? __kasan_check_read+0x11/0x20 [ 228.868734][T11139] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.868748][T11139] ? xfrm_lookup_route+0x5b/0x1f0 [ 228.868763][T11139] udp_sendmsg+0x1e3b/0x2830 [ 228.868781][T11139] ? ip_reply_glue_bits+0xc0/0xc0 [ 228.868796][T11139] ? udp_push_pending_frames+0xf0/0xf0 [ 228.868810][T11139] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.868827][T11139] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.868842][T11139] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 228.868858][T11139] ? tomoyo_socket_bind_permission+0x360/0x360 [ 228.868875][T11139] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.906072][T11139] ? copy_msghdr_from_user+0x2da/0x440 [ 228.906099][T11139] inet_sendmsg+0x9e/0xe0 [ 228.928577][T11139] ? inet_sendmsg+0x9e/0xe0 [ 228.938149][T11139] ? inet_send_prepare+0x4f0/0x4f0 [ 228.938163][T11139] sock_sendmsg+0xd7/0x130 [ 228.938176][T11139] ___sys_sendmsg+0x3e2/0x920 [ 228.938191][T11139] ? copy_msghdr_from_user+0x440/0x440 [ 228.938208][T11139] ? lock_downgrade+0x920/0x920 [ 228.938221][T11139] ? __fget+0xa3/0x560 [ 228.938233][T11139] ? getname+0x1a/0x20 [ 228.938249][T11139] ? __fget+0x384/0x560 [ 228.956149][T11139] ? ksys_dup3+0x3e0/0x3e0 [ 228.956162][T11139] ? get_pid_task+0xc9/0x190 [ 228.956181][T11139] ? __fget_light+0x1a9/0x230 [ 229.038860][T11139] ? __fdget+0x1b/0x20 [ 229.042912][T11139] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 229.049136][T11139] ? sockfd_lookup_light+0xcb/0x180 [ 229.054317][T11139] __sys_sendmmsg+0x1bf/0x4d0 [ 229.058980][T11139] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 229.063992][T11139] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 229.070226][T11139] ? fput_many+0x12c/0x1a0 [ 229.074625][T11139] ? fput+0x1b/0x20 [ 229.078414][T11139] ? ksys_write+0x1cf/0x290 [ 229.082913][T11139] ? __ia32_sys_read+0xb0/0xb0 [ 229.087685][T11139] ? switch_fpu_return+0x1fa/0x4f0 [ 229.092781][T11139] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 229.098832][T11139] __x64_sys_sendmmsg+0x9d/0x100 [ 229.103752][T11139] do_syscall_64+0xfd/0x6a0 [ 229.108239][T11139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.114110][T11139] RIP: 0033:0x459879 [ 229.117989][T11139] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 229.137575][T11139] RSP: 002b:00007f1be9988c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 229.145982][T11139] RAX: ffffffffffffffda RBX: 00007f1be9988c90 RCX: 0000000000459879 [ 229.153954][T11139] RDX: 0400000000000030 RSI: 0000000020007fc0 RDI: 0000000000000003 [ 229.161926][T11139] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 229.169891][T11139] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1be99896d4 [ 229.177845][T11139] R13: 00000000004c706e R14: 00000000004dc6e8 R15: 0000000000000004 [ 229.206013][T11159] IPVS: sync thread started: state = BACKUP, mcast_ifn = syz_tun, syncid = 0, id = 0 13:51:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:26 executing program 5: syz_emit_ethernet(0x52, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaa010000000000000086dd6082ab9c001c0001fe8000000000000000000000000000bbfe800000002039f7f3581feb944f00aa2c000000000000000000ffff", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) 13:51:26 executing program 3: add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000100)={'.yz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xff, 0x80) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000080)) [ 229.418495][T11171] IPVS: ftp: loaded support on port[0] = 21 13:51:26 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4000) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x213880, 0xdc9498c1d16ccfa6) sendfile(r0, r1, 0x0, 0x8400fffffffa) creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 13:51:26 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r3 = dup(r2) ioctl$BLKFLSBUF(r3, 0x1261, &(0x7f0000000140)=0x800) ioctl$sock_bt_cmtp_CMTPCONNDEL(r3, 0x400443c9, &(0x7f0000000100)={{0x26e, 0x1, 0x7f, 0x2, 0x3ff, 0x1}, 0x6}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r3, 0x14, 0x3}, 0x14) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000001080)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000080)="a674867a8ffc0ecb8a7c3bc472c0af38f6ed35dc9812e35d", 0x18}], 0x112) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) 13:51:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 13:51:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000400)="11dca50d5c0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) r2 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2711, 0x0, &(0x7f0000000180)) r3 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r3, 0x114, 0x2711, 0x0, &(0x7f0000000180)) r4 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r4, 0x114, 0x2711, 0x0, &(0x7f0000000180)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRESOCT=r0, @ANYRES16=r2, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="7d4999a35a024683fc42673e505ce63c047b8a69f9c09bbf5c2802af208c96c91a267a51cda25853c2f30a267fea76b0fa1ca210d17987a273e63216b3ce76548435d252763e5377b128bb835680176cf3e7df32ae21f9467038a89558ba19b972a9fb34025e090579c08263fbd18b27", @ANYPTR64, @ANYRES32, @ANYRES16=r3, @ANYRES32=r2], @ANYPTR, @ANYRESHEX=r0, @ANYRESDEC, @ANYRESOCT=r4], @ANYPTR], 0x4}}, 0x0) 13:51:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:26 executing program 3: r0 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2711, 0x0, &(0x7f0000000180)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x401, 0x3, 0x1, 0x100, 0x1, 0xfffffffffffffffb, [], 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x3c) r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r3 = dup(r2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@remote}}, &(0x7f0000000500)=0xe8) r5 = syz_open_dev$usbmon(0x0, 0x45, 0x0) ioctl$RNDCLEARPOOL(r5, 0x5206, &(0x7f0000000200)=0x1) ioctl$KDDISABIO(r5, 0x4b37) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000280)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r5, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r6, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r6, 0x4) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000740)=r6, 0x4) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x18000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=@setlink={0x158, 0x13, 0x20, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1000, 0x80ad}, [@IFLA_XDP={0xf4, 0x2b, [@IFLA_XDP_FD={0x74, 0x1, {0x6, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x7, 0x1, 0x0, r1}, @generic={0x200000000000000, 0x200, 0x8, 0x8, 0x6}, @jmp={0x5, 0x1, 0x6, 0xb, 0x7, 0xffffffffffffffe0, 0xfffffffffffffff0}, @alu={0x0, 0x1c0000000, 0xc, 0x3, 0x2, 0x2, 0xffffffffffffffff}, @map={0x18, 0x1, 0x1, 0x0, r3}, @generic={0x8001, 0xbc30, 0x10001, 0x2000000000000000, 0x2}]}, &(0x7f0000000340)='GPL\x00', 0x100000000, 0x2c, &(0x7f0000000380)=""/44, 0x40f00, 0x5, [], r4, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0xd, 0x2}, 0x10}}, @IFLA_XDP_FD={0x74, 0x1, {0xe, 0x5, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x3, 0x2, 0x7, 0x1, 0x2, 0x10}, @jmp={0x5, 0x1, 0x0, 0x9, 0xb93329099a852bcf, 0x80, 0xfffffffffffffffc}]}, &(0x7f0000000600)='syzkaller\x00', 0x96, 0xd9, &(0x7f0000000640)=""/217, 0x100, 0x0, [], 0x0, 0x1, r7, 0x8, &(0x7f0000000780)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x3, 0x5, 0x200}, 0x10}}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x4e8961b501142b5e}]}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0xffff}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x8000800000000000}, @IFLA_LINKMODE={0x8, 0x11, 0x8}, @IFLA_PHYS_PORT_ID={0x24, 0x22, "ea8f4adeb2d82a77037d4ad098a84eaae317b801000000000010174907000000"}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x1}]}, 0x158}, 0x1, 0x0, 0x0, 0x20040840}, 0x8) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x4d45f5932b333018, 0x0, 0x2000000, {0x0, 0x0, 0x0, 0x0, 0x1603e}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x810a}, 0x0) 13:51:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:26 executing program 1: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x205f1202dc5971d7) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f00000000c0)=0x5) exit_group(0x9) clone(0x7fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r3 = dup(r2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) r4 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r4, 0x114, 0x2711, 0x0, &(0x7f0000000180)) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r5) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x1) r6 = inotify_init() mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="7472616e733d66d622340501d201fe6b642c7266646e6f3d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r6, @ANYRESHEX=0x0]) [ 229.717409][T11183] input: syz1 as /devices/virtual/input/input5 [ 229.831252][T11199] input: syz1 as /devices/virtual/input/input6 13:51:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000002, 0x0) 13:51:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x23, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x578, 0x0, 0x240, 0x240, 0x240, 0x398, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4, &(0x7f0000000040), {[{{@ipv6={@rand_addr="9a1ec05f004f5aad532d2b707130b4fe", @ipv4={[], [], @multicast2}, [0xffffff00, 0xff000000, 0xff, 0xffffffff], [0xff, 0xff, 0xf9d679d282c0d46f, 0xb7bebf19d344c25b], 'netdevsim0\x00', 'veth1_to_team\x00', {}, {}, 0xc, 0x100000001, 0xd, 0x51}, 0x0, 0x218, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={0x150, 'hashlimit\x00', 0x2, {'syzkaller0\x00', {0x1, 0x1ff, 0x4, 0x9, 0xbe, 0x1, 0x8, 0x78, 0x80}, 0xffffffffffffffc1}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0xfff, 0x9}}}, {{@uncond, 0x0, 0x118, 0x158, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x2, 0x9}}, @common=@mh={0x28, 'mh\x00', 0x0, {0x5, 0x8, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x4, 0x1, "51630f0dca906c60b43aae58a4f6064bfef4dedd9de099a1d3fc64b283e3"}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, [0x7fffff00, 0x7f7fff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff000000, 0x0, 0xff000000], 'ip_vti0\x00', 'gretap0\x00', {0x80}, {}, 0x11, 0x8, 0x0, 0xf1d238b05ac34a30}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast1, 'nr0\x00', 0x7}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5d8) r1 = socket(0x200040000000015, 0x805, 0xa4) r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r3 = dup(r2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r3, 0xc018620c, &(0x7f0000000140)={0x2}) getsockopt(r1, 0x114, 0x2711, 0x0, &(0x7f0000000180)) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000300)) lsetxattr$trusted_overlay_origin(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)='trusted.overlay.origin\x00', &(0x7f00000009c0)='y\x00', 0x2, 0x1) r5 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r5, 0x114, 0x2711, 0x0, &(0x7f0000000180)) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000200)=0x80000) fstatfs(r1, &(0x7f00000001c0)=""/1) 13:51:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:26 executing program 1: r0 = socket$inet(0x2, 0x4, 0x7) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='illinois\x00', 0x9) r1 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 13:51:26 executing program 5: r0 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2711, 0x0, &(0x7f0000000180)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x42300, 0x0) fadvise64(r0, 0x0, 0x3, 0x0) r1 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2711, 0x0, &(0x7f0000000180)) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xfd, 0x200000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a40)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000001b40)=0xe8) r3 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r3, 0x114, 0x2711, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000001b80)={'veth1_to_team\x00', r2}) r5 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001440)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0x11, 0x2, &(0x7f0000000040)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x254, 0x0, 0x0, 0x0, 0x5b}], &(0x7f0000000080)='GPL\x00', 0xc1, 0x0, 0x0, 0x40f00, 0x2, [], r4, 0x1, r5, 0x8, &(0x7f0000001480)={0x5, 0x4}, 0x8, 0x10, &(0x7f00000014c0)={0x0, 0xb, 0x80000000, 0x7436}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000009500"/32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 229.969717][ T26] audit: type=1400 audit(1567777886.759:47): avc: denied { prog_load } for pid=11209 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 13:51:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@xdp, 0x80, 0x0}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) r1 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2711, 0x0, &(0x7f0000000180)) r2 = socket$inet(0x2, 0x1, 0x3) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={r4, 0xffffffff}, 0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={r4, 0x6b, "f65b39c8335b4daef82255868aefa655c2ff5324332f009322d237d5c03513691c8569c2ec8c3fa925fdd9480c7af743a36d4ad03c1e83fc8f833ee7824891d45eb091b2288d545f07275ffb1077aa7645ed128910abc778404fa6794e687c7378767fa43fddc0524dda81"}, &(0x7f0000000400)=0x73) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000440)={r5, 0x10000, 0x5}, 0x8) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r7 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x2711, 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r6, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=@newtclass={0x50, 0x28, 0x8613aea103686078, 0x70bd29, 0x25dfdbff, {0x0, r8, {0xcac233f0a0080299, 0x7}, {0x16, 0x4}, {0x4, 0x8}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8, 0x1, 0xfffffffffffffffe}}}, @tclass_kind_options=@c_dsmark={{0xc, 0x1, 'dsmark\x00'}, {0xc, 0x2, @TCA_DSMARK_VALUE={0x8, 0x5, 0x4}}}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000080}, 0x80) 13:51:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000003, 0x0) 13:51:26 executing program 5: syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x36a7, 0x0) r0 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2711, 0x0, &(0x7f0000000180)) ioctl(r0, 0xffffffffffffffaa, &(0x7f0000000040)="f428d8434c861793e3050000002fdbba74ff83a8cf8283dfda648e04990ed4fdbb4d") 13:51:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xfffffffffffffddf, [@volatile={0xe, 0x0, 0x0, 0x9, 0x1}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x7b, 0x0, 0x0, 0x2}]}, {0x0, [0x61, 0x30, 0x0, 0x0, 0x0, 0x30, 0x5f]}}, &(0x7f00000000c0)=""/255, 0x21, 0x45, 0x1}, 0x20) r0 = open(&(0x7f0000000000)='./file0\x00', 0xe50100, 0x18) r1 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2711, 0x0, &(0x7f0000000180)) fsetxattr$security_ima(r1, &(0x7f0000000040)='security.ima\x00', &(0x7f00000002c0)=@v1={0x2, "bac307a7ae5ea5cd"}, 0x9, 0x1) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000200)={0xe, 0xa, 0x6, 0x9, 0xa8, "e55100892ad9ab532fe5e069355e1a2b5e3f951c18b0d3097bd073a2f5e33761df3195bf07a9f03f80d4a68147b3e90790396730d553a65a04ce4fb5785af09cba385a73eeb463f3e6df628eca90738d2900cea23346fac06bbd626276bf144c7dd3a284d2d91e28a3fb14acf19eafecfe4ee325ef816041caa28bb3b4fd74a69d681ff4b29b448016a49dcf79856bbaa0bb3fcf8ef16ce23f338adbab209a74649b2974677076ad"}, 0xb4) [ 230.111970][ T26] audit: type=1400 audit(1567777886.789:48): avc: denied { ioctl } for pid=11209 comm="syz-executor.0" path="socket:[33586]" dev="sockfs" ino=33586 ioctlcmd=0x8904 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 13:51:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000021c0)=[{0x0}, {0x0}], 0x2}, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x4, 0x70, 0x240000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffff19, 0x0, 0x1, 0xfffffffffffffffc, 0x401, 0x0, 0x1f, 0xa7, 0x35c, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x40, 0x7, 0x0, 0x0, 0x80, 0xf9, 0x0, 0x0, 0x5, 0xfff, 0xa7e, 0xfffffffffffffffe, 0xffffffff, 0x6, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xd}, 0x802, 0x0, 0x0, 0x0, 0x0, 0xcd, 0x1f}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, 0x0, 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x1802a140) 13:51:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000004, 0x0) 13:51:27 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) memfd_create(&(0x7f0000000040)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x4) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) fallocate(0xffffffffffffffff, 0x0, 0x6, 0x2) creat(&(0x7f00000000c0)='./bus\x00', 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000840)=ANY=[@ANYBLOB], 0x1) socket$inet6(0xa, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x3) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000800)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @local}}, 0x0, 0x20000000005, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 13:51:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:27 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, &(0x7f00000000c0)={@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x6, 0x10000, 0x1, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) getsockopt$sock_timeval(r0, 0x1, 0xe, &(0x7f0000000000), &(0x7f0000000080)=0x10) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r2 = dup(r1) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) ioctl$EVIOCGABS0(r2, 0x80184540, &(0x7f0000000180)=""/4096) 13:51:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x100, 0x0) r2 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2711, 0x0, &(0x7f0000000180)) r3 = dup3(0xffffffffffffffff, r2, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000380)={0x16000, 0x10c000}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r5 = dup(r4) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000000480)={{0x9, 0x2}, 'port0\x00', 0x2, 0x100000, 0x4, 0x3, 0x7, 0xe41, 0x3fffffffc, 0x0, 0xd25815b075b519a0, 0x9}) r6 = syz_open_dev$sndpcmc(&(0x7f0000000780)='/dev/snd/pcmC#D#c\x00', 0x0, 0x200) r7 = getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00)={&(0x7f0000004300)=ANY=[@ANYBLOB="d0130000100000022cbd7000fbdbdf25160000", @ANYRES32=r7, @ANYBLOB, @ANYRES32=r8, @ANYBLOB="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"/587, @ANYBLOB="0c003a00040000000000000000000dcb081407c07302d0e74ad16789e592b1a84c57659847f7deca476616e344448849fc965e482a8d1c3d4e04a209c5df3fa6db0990297cd779094f524d719a60f651b65178dd500e3e3142280bc26d1a24356ba3a895edf6f8e8d7c6e67f213aa5ec515b2b072854f8036379b3750c006c00010001000000000008005000", @ANYRES32=r7, @ANYBLOB="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"], 0x8}, 0x1, 0x0, 0x0, 0x841}, 0x20000000) r9 = openat$full(0xffffffffffffff9c, 0x0, 0x903, 0x0) r10 = getgid() write$FUSE_DIRENTPLUS(r9, &(0x7f00000008c0)=ANY=[@ANYBLOB="b800000000000000080000000000000005000000000000000200000000000000070000000000000000010000000000003f0000000000000001000000000000000600000000000000ff0f00000000000000020000000000000200000000000000040000000000000006000000450000000100000000000000ff", @ANYRES32, @ANYRES32=r10, @ANYBLOB="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"], 0x81) r11 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x4040c0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r11, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000740)=0xe8) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x10, &(0x7f00000007c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=r8, @ANYBLOB=',group_id=', @ANYRESDEC=r10, @ANYBLOB="2c626c6b73697a653d3078303030303030303030303030303230302c616c6c6f775f6f746865722c61707072616973655f747970653d696d040000002c7065726d69745f646972656374696f2c7375626a5f747970653d2f6465762f6d6564696123002c61756469742c726f6f74636f6e746578743d73797374656d5f752c6f626a5f747970653d2c002f"]) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) r12 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x4495, 0x98200) ioctl$KVM_GET_DEVICE_ATTR(r12, 0x4018aee2, &(0x7f0000000340)={0x0, 0xffffffff7fffffff, 0x9, &(0x7f0000000300)=0xd0}) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000200)={0x0, @reserved}) r13 = syz_open_dev$media(&(0x7f00000003c0)='/dev/media#\x00', 0x3, 0x70240) accept$inet(r13, &(0x7f0000000400)={0x2, 0x0, @dev}, &(0x7f0000000440)=0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000000c0)=@get={0x1, 0x0, 0x1}) 13:51:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000005, 0x0) [ 230.524303][T11281] sock: process `syz-executor.3' is using obsolete getsockopt SO_BSDCOMPAT 13:51:27 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) r2 = socket(0x200040000000015, 0x805, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x20, 0x4000) open_by_handle_at(r3, &(0x7f00000000c0)={0x1a, 0x5, "e081a97b518c373c889408368208c673297a"}, 0xc0000) getsockopt(r2, 0x114, 0x2711, 0x0, &(0x7f0000000180)) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80}, 0x1c) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) 13:51:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000006, 0x0) 13:51:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xe) pipe(&(0x7f0000000040)) poll(&(0x7f0000000180)=[{r0}], 0x1, 0x0) 13:51:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:28 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000002740)=@bcast) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x7, 0x400000) timerfd_settime(r1, 0x3, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000100)) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="c573f07316d95d96ee9c92566f83143a78ec217a02ae2325749e7cdaaa08669e0171ffcc550021b4573dd2117609597c64549d790acf62f6c172ebd036f3950c5d9c4f04584b2c63391d9c9c2c6525bfe3347ac45e1ee04239d2217c643673f2a32132c5a5d24aea54caad99e6c4fe", 0x6f) 13:51:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000007, 0x0) 13:51:28 executing program 5: eventfd(0x5) getitimer(0x2, &(0x7f0000000040)) r0 = socket(0x200040000000015, 0x805, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r2 = dup(r1) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f0000000280)={0x9, 0x1ebe, 0x3, 0x7fffffff, 0x1, 0xfff, 0x7ff000000000}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x400, 0x0) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000240)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0xff}) getsockopt(r0, 0x114, 0x2711, 0x0, &(0x7f0000000180)) r4 = accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10, 0x800) ioctl(r4, 0xa0000000000000, &(0x7f00000000c0)="a6b820bd3880cac48f0c17efca6705cdb0121fa50731d46174eb83c2b6fb95b9571fd367048c15696a483776be332cd545a87b58865c32bb524a8afadb044960600d3262b1dd3f00ae1e338a5dd7efc8142decb014f0c02c05f4d4345233e31f54861b8e2f4ba2b631d0326fdf5410b2293c74063a4f57c8ba6c0595565e505df31344b791e9f41197c5e74ed51d4f7efc2d9504d2153e140f9186146e3597c4") 13:51:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 13:51:28 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) memfd_create(&(0x7f0000000040)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x4) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) fallocate(0xffffffffffffffff, 0x0, 0x6, 0x2) creat(&(0x7f00000000c0)='./bus\x00', 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000840)=ANY=[@ANYBLOB], 0x1) socket$inet6(0xa, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x3) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000800)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @local}}, 0x0, 0x20000000005, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 13:51:28 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="02000000010000000000000002000000323c74e40dc10a8e92c67c5f7b1175daf491e925425c25ba3e05887103bcd286b126dae8f295f21ba0de42e5e8730abc241e2e3c23e0e4462375973e9a67cce8cc5d0820200d95f601a79bacb1029d97ab1225a948e6e6c974a1c31c8dbce9c00ae10bf316b144555e0cb889956dd3cbedc743b90968fe2b0a7b3772a2ad8651790cb28b9886253316e127345b6e11c04738fd8b5187", @ANYRES32=0xee01, @ANYBLOB="040000000000000010000400000000002000000000000000"], 0x2c, 0x0) chown(&(0x7f0000000180)='./file0\x00', r1, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x18, r3, 0x39296c73170e9169, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200004}, 0xc, &(0x7f0000000040)={&(0x7f0000000600)={0x2bc, r3, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x5c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4f0e}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xdb}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA={0x70, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f9f}]}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xcb8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20c}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffffffff7f}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_LINK={0xfc, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4e4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800000000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1a5c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0xfffffffffffffe7c, 0x3, 0x2}]}]}]}, 0x2bc}, 0x1, 0x0, 0x0, 0x40000}, 0x40010040) 13:51:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000008, 0x0) 13:51:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) [ 231.431815][T11337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=11337 comm=syz-executor.1 13:51:28 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000780)='/dev/snd/pcmC#D#c\x00', 0x0, 0x200) r1 = getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000680)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) getxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=@random={'user.', '\x00'}, &(0x7f0000000600)=""/110, 0x6e) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00)={&(0x7f0000004300)=ANY=[@ANYBLOB="d0130000100000022cbd7000fbdbdf25160000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=r2, @ANYBLOB="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"/587, @ANYBLOB="0c003a00040000000000000000000dcb081407c07302d0e74ad16789e592b1a84c57659847f7deca476616e344448849fc965e482a8d1c3d4e04a209c5df3fa6db0990297cd779094f524d719a60f651b65178dd500e3e3142280bc26d1a24356ba3a895edf6f8e8d7c6e67f213aa5ec515b2b072854f8036379b3750c006c00010001000000000008005000", @ANYRES32=r1, @ANYBLOB="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"], 0x8}, 0x1, 0x0, 0x0, 0x841}, 0x20000000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)={{{@in=@multicast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) r5 = getuid() r6 = request_key(&(0x7f0000000000)='id_resolver\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffff9) keyctl$get_security(0x11, r6, &(0x7f00000001c0)=""/115, 0x59) r7 = request_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', r6) keyctl$get_persistent(0x16, r5, r7) setreuid(r3, r4) r8 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r9 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r9, 0x114, 0x2711, 0x0, &(0x7f0000000180)) ioctl$sock_kcm_SIOCKCMATTACH(r9, 0x89e0, &(0x7f00000003c0)={r0, r8}) r10 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r11 = dup(r10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r11, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) ioctl$BLKRAGET(r11, 0x1263, &(0x7f00000001c0)) 13:51:28 executing program 1: clock_settime(0x15832cf8d2c4cd93, &(0x7f0000000000)={0x77359400}) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x800) ioctl$TIOCEXCL(r0, 0x540c) 13:51:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000009, 0x0) 13:51:28 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x400, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x6) preadv(r0, &(0x7f0000001640)=[{&(0x7f00000000c0)=""/178, 0xb2}], 0x10000000000000c2, 0x2) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x3b4, 0x0) r3 = socket$inet(0x2, 0x1, 0x3) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={r5, 0xffffffff}, 0x8) r6 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r7 = dup(r6) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r7, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) ioctl$VIDIOC_G_FMT(r7, 0xc0d05604, &(0x7f0000001280)={0xa, @pix_mp={0x4, 0x4, 0x32314752, 0x7, 0x2, [{0x8, 0x7}, {0xfff, 0x5f98}, {0x3, 0x100}, {0x7, 0x3}, {0xd6, 0xffffffffffff7fff}, {0x100000001}, {0x78b, 0x40}, {0x8, 0x7}], 0xffffffff, 0x24, 0x2, 0x7c4f1b7d47cffa32}}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000180)={r5}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000200)={r8, 0x1000, "8743560f137c7cf4454fe8cc1e6c0540c4ebd397107eacae80e9a932b9a94a6e71d4b22a0c5b9c5e5678ba74355013a44f0c98ff3b00312f8954471e8d36c2ff229806ffe44c7dbccdfaee061bc64d652bb6065b4559d124ba6002e68eb005d59cfdeb8273db7ff7ebfe67bb618474940ff86245b5325a880d1d8bfaaddcb7c4998612e1de0f0c17ef8f947b784b564682e1bf25654891a604256659b911be652d08ffb9fc99925b7e48feb886e5bd938d66a4ea07ec75c90d64fdd7223e613ebf05d13cf942c57c5a2318a5cff1a48a5ae802e8d491f67008340c63ea2b6fd9586cddfd2cde769851c64474b5debcbe96ae2e9d9dd1984ef056fd5d768bbf8045adcdaef01257efaadc8d2d9d660ba98b4c3684b9e6dc77f73055a0b7d34541192bc7b47f0beb3296e1faa205d3f76428f277e8d24487cd810706529ca370184cbfdfde411fd52fbb1ad1dc4f124bc9d640ea670b4052253bf3392584c11f8869228d12e6c6ec9c45672aeb73a4f3b0bc3dd897a50a339bb10442177f0098a9b551d1deda54c105e0c0c72bbcc026b10a34c7961f2b56122a002e514b24a0525afa8aa2ecd205b2e4749ea4512b95ced18e778bea43614408c4c055f7f1ff77f3eec16da3fc69cc45f551fc7ea010e37f04879cd184d3eef0220c22001b9118b38a7727a5aca341e32f7c025cc853e82dd62fc28fc942df0367b10b367693a62939a9a687921db92ea2297121dd8f0c5b96b7217f05fdaa536fee0f6318bb44049d268c44769b64caac78635c6aafd33cc7c358e8867deac4257d02adc66adcfea2ece9eab3b38ff563ab67d032b2e46204300219733aae7c7c90e9c1bb2bd20d2c50fee38834987524bf57928a01e3733db99d9192756c86ef9ae394be1265846e67e5f242698a136b79786792a4e7b64d500ddf0c844b5928de54627fbf484a1133ace29ce8240d18074a17998acb096156d0fcbdf6bf12e75a2c54570032ccbd11eb66693a4c426f7f22da6c850e6f553377a0fd8576ead0f0fed93565a96a91e565acde9bc37e859e856e576114f972afdd6f3652a767498836141a2d81f12c902c5b2225c028012037f0f309210dcd24b093fc5c2a1e2c794bb0821c4e122cd3b164458257ce6b14bd0007a2162c0786fa1e3be6a398d70f628fcc4307401ac5ef365f1ecfb1089a32e16a85018b2c3f8aba8301a4e5f3c021f290b3f7912fb221157163e48a0aa92e50cc64b71f43b109e5bfff2cc8cbc4772ad7cb1b0f3af139a87cc50b4e80919fb68b223a57fb563a297a0fea9119be161bd7aaf0a6952c922cb43c3f662a052e67ad49968935783fec35c22317463d8c0b3721f3ed96733d96e8593c273dd2cdd04807bc6fa554b7f59a04ec508586ff2372163a6041340ecb61026537b1fcacbeffe770dd3228049103f1c5c4add7e9aa0eaabc0e84159baf74e9371b05edda61aae9ff0f68b77b6fbc662d85e8571828ef6bfc0fce3bc7adfcc8a11f6f29f8ecc0669b529ac9a4353733727adb8e15d9911f55a0a42e2ba6c17dc9d315da6b2be2b571de70dd54b9783e22366214d0a87411ae3b34d3c61cd83d30460e65e2fe819d0f8e49503126121bb654791a0d460b11695545d0f5808023cad9402f21e1daab08e2d293dac026678930cb833f66216720dc44e441eddd09044d3c818f48cebc0cf4d79846056662b9bcf714c7e9938056c3d9345bc721cd3848d79ed0160d1a9531a73304cf0b55e02cc120668ce3ad8c2bd78a47f95e241857cafdee91c75acc88b04f131b50ad5c8d16055e2c7e48328111de0ba17927fedeccf7ee8334dab31d64541159a634fc1e7632413262dcb5bc21531ee4aa09a99d050b3284aefedb524346dbc53273b2710f6d022d516ad12d38ff7582d0fab1f71860fc6c3aa619c850829d61f969e4135c4cee865963a69d6f9c3876de396624579a04c4b1951e7c5fe566c279025b5dc05915651bd0af3b62fab477a96aea2268371a14e9223e70db40ee316623bca1e9a3beee25e1eb23a7c2c939def51892cbfd64a9ec22f34d1cce9fc4ef82eff80e5d741ffbc54d3ca7f8aeb7684bedc4662564944d4a9f9974e3191bc74e95030d4ec8a7e2282ad022e1dc809517a360be61d7f2ae1d05888211b4c10849b53215e018c63cb80162b5437bc75790138792446d0b7514d168fa51cb40649d3f441c580325a428c74990a1ebfab2e25c39f044038a3a1f4b5a11d849b8e996592e23042fa49ae95e1d8652123dc897aa636dbc2c0214c14803553d90787396bf5fcf020a0b17f7b49eddec31124b3084e90036ad986f59730f55ea0bf5dc0bbf4f7c6fc3f42faea4edb72792628a1a22ca86b845d6cbb6224905062fecaa1ce5c5b07e10ac343fc3e29e07e7afae2ff6d27c54cfa1a396c05b00fc7b4278012c7ba69ba5d9ba9b5d2720e2eb77021fc9fe5df05cf6bc0a54978dd91fc1d31e9f66de736c70a5b7a0e56a6a63993e9228d6322f30a353eb0bfd63fca102e81f486ee4fdc8f95acffa496dc3ff91cb0d96f1b3a428e68249add8fbfb48e22a104c0b9b592d008bcbd8ab9c5519ed0d9ce516e2ec6f114039596f7d9571f74f920e1e5a57d0e637c64b23e459d1a8dc01ee242b1296f6fe66720f6c9a6d62eb2425c069cbe8ab4a474359e160de0aa072758b56bd853fe5ca1418f3ef45d746474efb1b426910752516946274ceb6ff86a8c45baef372f20b01e83393edc5d53d8c313888e697409de45a497a8900e75c14fd25adeb4b524e0714643c69e1189242521e6adb2904493430f839725a7bdf268316ab60576ed818bd0c86a5647a5d7d8a58725677c66b46b6914150c82cbd40089df8885692e3277b26589bcabcfa33117af11d55853f0eb3bf2c367ff800b1136b49a7b51c4d1d16180c88ee14ba05a54f27c424acd08554d1a9b2b02d17d4b230ffed7b4b2b654c8eb570e03ca3a0f265ab94513a6b0a7c505915060ef3f3cc80324a7f043c4fcd35981ad9f19233040444d8d2afffc92752e761c4f2feacb804d6d75dc01baf3daaada142a7dfb691e35ae32a67ad14a4badee9f8baa3803f3f1fcca32fc17f276dac2cb84c59b4ccc98a538e5b5028873a45d0b55d80a1f9ee658bfb5988a03a97daf3fd97a6bbe30030b9024207ece400964eb4119d7c4389cc034b827858891a042f4f653a2ea2f2d99f8f0513c6cfe59fe9307f9c2803429d48212ee8b44bbdc12efbe41182f186aea5bc9556c6c6830d084afab3cdb0654992c0eb459b0fb03b6eae81247b58af112262507a753df904848a0eddb86396ac1d802f0167122df06a85cfcc7eb2269d6f9332eb10cfb7f24faf726479d222954ee83c46686d79f15cfe265662d8ca482ba44efe86bc91342ae6e68883e7a82d2b5a1b5dd8c4229aca8cd43f0a471232d7622998c74b93c49aaedf8df6997d526c2464c11c91392bd6398bc9c1da961005046a7be464813e5409b93a7de0de5f8151f5cd5f9422a7a7bbda82410ac5d610d5429ce1829b76e4936f0c3112a1856f9fcd561fdfd3466e95fb60999886f3dc7870980dbbfee9ba2ed50eff8a51e64c919a06fbf963d264bf6d0bce618c293589bf1343fec646c11557f80ea79f71f9f80a9c6b2b02ecee20dd3d06eb1a4172970a207593482295ea8ea7a891040f68903b683782c49e68fee88b6710d5ec23e4eb76b8f8547eb9964210d41cabaef302775967372853bd0caaa675f3c43febd3274bf9289aaf7155fed76acd2171fd47f26b159fc81a223ea0ec2ed30f6d52d72aa1b2a96dd54bf7a3a9f13a4700ad228e8ee4560104a4d6517f805c4512a4a6906e3d6deb4f32e42d7f95410ce08f0940b94819fd9c18469bed3e8224b6313151bef5b27c836b9aba863b46e19c34d0f1f2da8c2f3cb98c73269e156d84afd74ce1fbdabdbd3f29387b9fd9b753960c39f0c07a672aa106878adac814a475a8e2c38e353e3387c23f0e05bcc617248f115f4ddbd8ba4459bc13dc0ed758733cfff6816bc251a100be598090b71e8cf51063a990977772fb25bc4a9b6ba39e6ea301381d21adcee89b108faaae1e0e52cda0c275b983799ea8c4025aca516b88593d20ea45309db7bf7756db3d5600d719c25aaa63085ef37a7a3019df44d34ec267a90ea34da4311c594fc47f2ced81d992b4e09ad85a1bc4215c18d7b793df0e9e5d9c4951b3173acb52a2f294fae1ecf8dbb65f474d583b8f57608a3885dd08c776da4d2882ffcf1fd4e7af4f114d8e2a82174c460f40d9c4ce4d78b9ff5d68b83e6d51caeb98196ac01c68d9a914986972350593f7caf2f95636e9bc5701871e5441b9bc345b41046ab92796f66a754257b0dde5ef61448019cb93d6ed672bf3e2e951bc4db465ee267d9446f740921ed655b231e69c6057f107839497fd8e1d1ea77a51a6480924479b81b83539759ffa9bef866c3cf369721bd4e4a7cd65109e88bc7b98d197b66ca1ccc4497525c46922d734517af4c662711cb0ed0af78f56a2cdf9f3ec9a220c352848d40eb6faea6dac0b4c8dbd846a25b1a311d8f7918a095e536f9d2c983e07c6caba0a3975d685ef065d5dbeb0be16e1dd68222ce6207566d09c4c30a55d79d1888078491d663ef4706723ecfef3e35401273cee40d3f0ec983db3eacaff154e25db8dec4d0e3f71f5a13d1799c6052e0c7f3982d6d75d853878244a883b631778c698bbd03752ddd203d04880868e7059c747286af4d434497faae880c6fb68c8a7de59068012260a49c1da04039402441d43218ef99312f15a1e180030a85a1aa0d1ed4e9886d21c582dd2e4ed5c3ff66018fd04d538cf7648ac4af9253833f873b92db3eb764300d455e473c543f93f00486ca7302b7378340fd475561a90a9a5fd6da120ee1a3ff419a9e5bd78d8c7b67810ef170b1b7bf4e79d4c2f1844bff5de79ba06448cd7f217622ef3085831531348595f1bb58cbd1dd5148bfc6ce2b481e48790847ec4c316c661bf3cbea5d642e0f22c098c99a2837c3bc27210418300cea2206ec947b302d546e3d7cce105ea2c49e95791250ddc086a3cb89a28ee6b325e8d36a5d390b4b3a2e8c59b9d56ce5f31ab857a60d1d3f01d6736de81a65671ab82411a448a586fb6ce3fb468260f979774d1dc11a2622b9b206c6dab58b6ad94c3fe2709bc4c186f361a65b11b28ef41905243077799323d9d15f23561d65a54b5b31ebfd88d2d64c5b90f20609fac0f9d3d3391b43a430bf05a8af180936742fce35c59149567c57cd9ae27a6331b8c499a3fc088fd3ef0803f300e012c180a8a069288b7e751106803fcec8c5bee1743c2c025a889cececfbfcda1a779d7b27b364f0707b1e33786a7ac5aecac113b2a5d7d72b15e39d396e78492b48d3cca60d915d8265f08e6617316211a7b9159ab7fc239e5df9a134eaaa286ec3e5f02cfd95eee83cb8cc6801d96024a1b5252d4f407421fc159101bba4d1c159fecc670a0f5e183bdd1e301bc3805bd9597459c6fd958f774236ecc1c6590f5125da6d7e6c77e4fbafcf2a14e78ede5da8d84f24836a02e06d454d24d922b4ad7f927936e2447d7c01ab9cb0d6eba7d8a414e29e9fc9e69c10df45f2d81b6ffb9a52d21c3477c528f3e479ff29ea835a12160d60fd4b6782d95986ed6f34ff99382b4121cb798ee5be22b4cbf369026fe30ee425a7ddb3402e177489bfc70a5b90fda8e86c3947a8dfd9412c9ffcdea132008ddefaf8317db273a52165151585a4d3129449c718b5a43f74b6eaf3b0bc47c54d6"}, &(0x7f0000001240)=0x1008) 13:51:28 executing program 5: syz_emit_ethernet(0x6a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x34, 0x0, 0x0, @rand_addr="fc16b693a5ac24c7810425fe87fc8110", @local, {[@hopopts={0x0, 0x3, [], [@calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0xffffff90, [0x0]}}, @jumbo]}], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r2 = dup(r1) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) r3 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r4 = dup(r3) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r4, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000040)="b941030000b815760000ba000000000f30660fc775b166baf80cb8a8ba7186ef66bafc0cb006ee646564260f01c403146bb8010000000f01d90f6353002e3e0f4f9d0f000000d9fd0f01df", 0x4b}], 0x1, 0x4, &(0x7f0000000100), 0x0) 13:51:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 13:51:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000000a, 0x0) 13:51:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$llc(0x1a, 0x802, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x1}, 0x10) getsockname$llc(r1, 0x0, &(0x7f00000000c0)) 13:51:28 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r1 = openat$cgroup_ro(r0, &(0x7f00000005c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbcq\x9a\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98q\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00'/372, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) fcntl$setstatus(r1, 0x4, 0x0) 13:51:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000880)='oom_score\x00') syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x101100, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x200, 0x4, 0x400, 'queue1\x00'}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x3f4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x0, 0x40) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f00000013c0)={0x0, 0x0, 0x0, {0x0, @sdr}}) openat$null(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000013c0)={0x0, 0x0, 0x0, {0x0, @sdr}}) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000940)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x9) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x8800000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x0, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0xae64, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000080), 0x0) syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x71, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_CREATE_BUFS(r4, 0xc100565c, &(0x7f00000013c0)={0x0, 0x0, 0x0, {0x0, @sdr}}) r5 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_CREATE_BUFS(r5, 0xc100565c, &(0x7f00000013c0)={0x0, 0x0, 0x0, {0x0, @sdr}}) close(r5) 13:51:28 executing program 2 (fault-call:3 fault-nth:0): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x41) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x11}]}, 0x30}}, 0x0) 13:51:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000000b, 0x0) 13:51:28 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x207}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_tables_names\x00') write$P9_RSTAT(r0, &(0x7f00000000c0)={0x3d, 0x7d, 0x6, {0x0, 0x36, 0x0, 0x7, {0x0, 0x0, 0x6}, 0x40000, 0x10000, 0x6, 0xd927, 0x0, '', 0x0, '', 0x2, '\xc7}', 0x1, ':'}}, 0x3d) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x10200000008) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x2) [ 232.230395][T11404] netlink: 'syz-executor.3': attribute type 17 has an invalid length. [ 232.250268][T11405] Unknown ioctl -1064545486 [ 232.251200][T11403] FAULT_INJECTION: forcing a failure. [ 232.251200][T11403] name failslab, interval 1, probability 0, space 0, times 0 13:51:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000000c, 0x0) [ 232.292744][T11404] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 232.327360][T11403] CPU: 0 PID: 11403 Comm: syz-executor.2 Not tainted 5.3.0-rc7+ #0 [ 232.335292][T11403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.345434][T11403] Call Trace: [ 232.348742][T11403] dump_stack+0x172/0x1f0 [ 232.353090][T11403] should_fail.cold+0xa/0x15 [ 232.357713][T11403] ? release_sock+0x156/0x1c0 [ 232.362395][T11403] ? fault_create_debugfs_attr+0x180/0x180 [ 232.368209][T11403] ? page_to_nid.part.0+0x20/0x20 [ 232.373250][T11403] ? ___might_sleep+0x163/0x280 [ 232.377712][ T26] audit: type=1800 audit(1567777889.159:49): pid=11405 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16529 res=0 [ 232.378134][T11403] __should_failslab+0x121/0x190 [ 232.406413][T11403] should_failslab+0x9/0x14 [ 232.410918][T11403] kmem_cache_alloc_node+0x268/0x740 [ 232.416217][T11403] __alloc_skb+0xd5/0x5e0 [ 232.420568][T11403] ? netdev_alloc_frag+0x1b0/0x1b0 [ 232.425680][T11403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 232.431923][T11403] ? netlink_autobind.isra.0+0x228/0x310 [ 232.437562][T11403] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 232.443807][T11403] netlink_sendmsg+0x972/0xd60 [ 232.448578][T11403] ? netlink_unicast+0x710/0x710 [ 232.453516][T11403] ? tomoyo_socket_sendmsg+0x26/0x30 [ 232.458803][T11403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 232.465042][T11403] ? security_socket_sendmsg+0x8d/0xc0 [ 232.470501][T11403] ? netlink_unicast+0x710/0x710 [ 232.475443][T11403] sock_sendmsg+0xd7/0x130 [ 232.479865][T11403] ___sys_sendmsg+0x803/0x920 [ 232.484558][T11403] ? copy_msghdr_from_user+0x440/0x440 [ 232.490028][T11403] ? __fget+0xa3/0x560 [ 232.494103][T11403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 232.500355][T11403] ? __fget+0x384/0x560 [ 232.504517][T11403] ? ksys_dup3+0x3e0/0x3e0 [ 232.508940][T11403] ? __fget_light+0x1a9/0x230 [ 232.513612][T11403] ? __fdget+0x1b/0x20 [ 232.517696][T11403] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 232.517719][T11403] __sys_sendmsg+0x105/0x1d0 [ 232.517734][T11403] ? __sys_sendmsg_sock+0xd0/0xd0 [ 232.517758][T11403] ? switch_fpu_return+0x1fa/0x4f0 [ 232.538692][T11403] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 232.544770][T11403] __x64_sys_sendmsg+0x78/0xb0 [ 232.549551][T11403] do_syscall_64+0xfd/0x6a0 [ 232.554055][T11403] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.559948][T11403] RIP: 0033:0x459879 [ 232.559961][T11403] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 232.559967][T11403] RSP: 002b:00007f1245167c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 13:51:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00'}) r2 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2711, 0x0, &(0x7f0000000180)) r3 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000140)={'l\x93\xc2\xff\x06 \x00\x00\x00\x15\x00\x00\x00\x00\x0e\x00', 0xfd}) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd72, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 232.559978][T11403] RAX: ffffffffffffffda RBX: 00007f1245167c90 RCX: 0000000000459879 [ 232.559985][T11403] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 232.559997][T11403] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 232.615858][T11403] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12451686d4 [ 232.623836][T11403] R13: 00000000004c77c2 R14: 00000000004dd018 R15: 0000000000000005 13:51:29 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000040)={0x3f, 0x6}) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r4 = dup(r3) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r4, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) r5 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r5, 0x114, 0x2711, 0x0, &(0x7f0000000180)) ioctl$LOOP_SET_FD(r4, 0x4c00, r5) getsockopt(r2, 0x114, 0x271f, &(0x7f0000000000)=""/13, &(0x7f000033bffc)=0xd) 13:51:29 executing program 2 (fault-call:3 fault-nth:1): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) [ 232.650992][T11415] netlink: 'syz-executor.3': attribute type 17 has an invalid length. [ 232.673054][T11415] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 232.690943][T11405] Unknown ioctl -1064545486 13:51:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000000d, 0x0) [ 232.708164][ T26] audit: type=1800 audit(1567777889.499:50): pid=11412 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16529 res=0 13:51:29 executing program 3: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x1, 0x44031, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='gi\xe4\x9c\f\x1f\xfdj5\x99px\xaf9\x00'/30) 13:51:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000340)=ANY=[@ANYBLOB="1f0000000000000000000040050001000000e7fc4b0900000000000000b7871001000000000000002560b700ef"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x2, [{0x48c, 0x0, 0x2}]}) r3 = syz_open_dev$sndpcmc(&(0x7f0000000780)='/dev/snd/pcmC#D#c\x00', 0x0, 0x200) r4 = getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00)={&(0x7f0000004300)=ANY=[@ANYBLOB="d0130000100000022cbd7000fbdbdf25160000", @ANYRES32=r4, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="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"/587, @ANYBLOB="0c003a00040000000000000000000dcb081407c07302d0e74ad16789e592b1a84c57659847f7deca476616e344448849fc965e482a8d1c3d4e04a209c5df3fa6db0990297cd779094f524d719a60f651b65178dd500e3e3142280bc26d1a24356ba3a895edf6f8e8d7c6e67f213aa5ec515b2b072854f8036379b3750c006c00010001000000000008005000", @ANYRES32=r4, @ANYBLOB="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"], 0x8}, 0x1, 0x0, 0x0, 0x841}, 0x20000000) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x4, &(0x7f00000002c0)=[{&(0x7f00000000c0)="465f1ab1e1993573ac38734f77952760725691e58e4a9b1fc53324805bd4dea77a", 0x21, 0x10000}, {&(0x7f0000000380)="e839fa977eb58fa7f368066ce279dd3cc0d79733dd592e35ed55355b5312f1d056522420d4876f4420f2e0b6fd08955ddcbbbd0e4de079a7ea5acebf7b34fb0e0cc10f31836aea51c9d8269815b1de576e82c41dabc39c83cb8bafe2fab5bdae241aa2265ca0f986dcda6c37a0dec3c171173af6b0731a7d1b96fa89b46bfdad773af17699f918e8e351742eaf6e927bba12d1b6eb3ad9c1a46cd32162f937e18280855aa82e911b96b092b2c7bede05765e496b5998cb87ba6afa14175a49e625f4f6fa3b22ca26ffde4deb5242e005fcac6cadeba1ed861997b1ec26bbe062594b907a408c9cafeb893afdfe775a5d349294f27543f20e41b362b8a3917ad9b94359f19cc7efb1bab86ae70f52d6bf5951d3ee0d0daf1db0ccf4d898274f5bfe772c6d10878407dae2b854898afb3c0a43176e12b1207323179fc2696beb6d636439180bc34d00ed3a09f0bfc611b00ac5235953be7e05cfad58a4e05e42c441bf166e16d95e781424d5ca50fbd23046553d072a8945a9d51af22fc528c49ec022b4978427604838b784e3f950c479fa38352bebd4a0e229abb062e7eea9880047ca249f1ab2c97101d4a8694fc4fa5c74e9f2857ee4052fb6f9658402c8eb7730bfdd9dc124f7fa33810c3934560d34d67455e41e5ca851497a34cc323be4452c1c9d88fa8622b9d2d5356ea0ceaf2706a678e6e35cac5713353b5e25c20b79d3aec01fd31e5b842009368cfa6ae44a5ebb7c7fd825a2592a36c93e982345696dbbde7d1efbe5600d130f3efafaac8663e5328e56e79fb9bc7cedc836c26f8b81d93fce8508b258b2623be12e9e10edbe3918bf853e83defcc40dfb06a2f9e9045da10ee265716dd61a3b1ebd9b039bd8f3f3c8440e4bce497f28dd41cb29826a75128f9ace669bb6d1f0385a86a15a7d310177fece4aa20677ff17f55fd03b0969b895d62669bb5044c513c645170bc56575e83c9d7d5521e3cf5e26fde915fe9b46927e04c1e09cee9a4348c43a02b1277050b83f3f8ef4bd357737e1cd47254c0d4ffd0640f9c5782aa35eaef6f616e208d761bb2b8f8df4382ea681502fad604ea678fef35de9c6fdf93c2a386ac23f0858ea5bd8c57f352090d5e190d84059f69e49fe2480a716890b1e9e1ff2d61aa7806ba5157c12fa3acb1f5c53f717de25bf2b06d228f4b97a652293f60120744f83c1934965bb6a06cc5c08585447b0d6dfaf36f83b49e4d460d1c6fb4bbdf26aafbe00163e61aeb2636d199a7ac846037b4c4ce92e869e09b3d87ed56c9ad888c3b00ef17e3a783a5b24c8e90593953cc4c4febc85abf637c629a569965e63bc7713dcf51714f42524568a87d721347c4e46b4b2a22aec34ca3056433f5206c6cfd827d9dbd3ccb3c207e6845db748ab97b10077f712d7b6863bb0dc067c5038e2efdf2feca92860184ce7ae3ec03a8222892b2d2d64355d87f3a0dec519a0e6cd8b7d2ea9564f4a00c228a26929a0ddc97ce2550c468b6e54e6e215664d953d15fbf2506dfbdce3bb4702e34c0f73a3a1068e5ee8524768da99ce83599e8fc5091cd75ee65e2f189f272e0ccab0e19323a11d186a6ff1f600374152b610c32fae045190237212226c83173069079b7089aaa361245171edac5d1a9ffe5ffad55a62ec05a5aa74663f75470a5746d9a70dcb6267a3e0765a68fa35b6a83fac55c10248ddb84ab9f13e69238f6df400719fdd8449cc314f12e3c05a255fcb14fcc05c9282fc2253ca769659d9aeb46495609d3fc390adc4050e49a841018eb8c0a966fca27e6e12efabe50cece56f35e50f08599b7f306f3c265e64f273a33522bec007804f1133938485ddb5dc605f3265d14d5ecb97f19293c5fc2b53909af19508bc714ac97c03a536b42a3ab25be53b1b3cec16e62680416a3ef9fa2f174b045d321debdc8b760f5beafe30baed363d070f3548ac5c2955ca5f99cf0ab83a7e7e7ae3979f8f82cbe1c71a930f076279ad28d23839fb1e410aa3090683ae1bdb2ec020731e8b3d0c08b012b7dc85ba00613414fa5f25d989d26c492bcb955c69a115c8220de643b6705289fd58158b04f7fb84269c1e19c304656e4c605faf309ff4c3ab7be3b280fc5ad5eda6cf8f490d45c0099b2b06a2f56cc673873c28456e8fbdfe08e71f29d632aed597ca7d85a722814e75a6d918514ea34b492cadf9ebfe70af74569492b1e53c13a71f83697273a9ab3b45fdc4dbc91c08e3262f0b8dab2932974bb49a7a4959e29c3b31a29580b4832180023f5612baa78beb3dd41b4a28963e463fcc28187cb934b13ad4308b5f81213a136aaf39af18d0a0bac2bb36b98c97f65deb7d6cc9c36fe782b761d4862a220de469aef62d67294d1c5d6cfd96ce151cb76644eeef1879265022698da872bb8766d7db8c0ab046a28ed6d8bf1a732977c500b7df37fa0c5fb9fd86b980371303e77af7c3099ac188c39056871ef639bf8a9dda34ce75e7d0e95ad40018151d68900f9a9c5834e87c29f23513eb6b7d026a7ceaffc30d4c2f4af3a8d5329e7463501a5e8cdaed81ec8b7fcd84dbcc0767e4423be0bc984bbacb8a7d35cba2ff863954edd6450728a3e0e0fbf56fcbff05bc931eb477d16d7887cd4a503bd6f69d59fd43bb4be79a5ce5989e38fe2395112be84c42f82adc70fb462db6ca59057a6c9d311b8c1fee5770fbdcb1da70b5b5be98476516107703068b0f1a01517d298a22e8a8c0595d607d8b74d21e50a625b31b1dd831e0c20e88379958147cf4955e21a43de81e2fc42bae54877984fe3196c2c1d9bdc49d7de096e60e07c6d052cc906051af42b246de377869511fc796cfc841115619a1230270b829c058f257009541e33a522302ac181af47437a05a7599bfac5335baa27c8a26490d4a90578b3de8342a8fa3a998ec0970f84085b719c16ce88933020cf1837a51ab78ea212ae8a7aa2c1df7fbeb6b7e41e14686b10736aec2c4ecd6b8eced26bcfe0af705a8b100e528ff0e95bef65c084e44bd15c72f2ff190e2b217e28cba208774c96f2a7c37ef8d41568a69e6459e663faf9a0d1d836d2e343f72c1e26e865d16b6b2799a62636efa37a70f9336384c999c31c4046c418a5c958f03130b285540d0a965092dd77fbccc00e2a382c2ee52c23461873a21f61dd06a995c39b4099abe119c46fc71f18e65573f9bcc9f9a9ebd2d3e49fd2a141f2a34fd3f0cff93742dabff7dbf6e797f66bd816e6e4ff7d574a9be448430fbb479742416a5c3672fbe07325025ca5d9ad74879554a41bd36c25657431d202e37ef5ca71ea589a70b446c31118475824abbc69d480b9947e43775be051d761f13ede056bf6c9756feae16c1a2d307f7ad68ffaa220111277b0d618293b1c3f2752e588866cc8fa6c2a70d2f26bc0adf11cf3e97af1195ec8edbadb2665cf387d9fc2214e71b104065c6e8eefaf4c87457d81f53bcd8de525c1c7246984fda35db72bf7459e3720e4236f52f07bfb72925b97a27a14c0a4ceb52fb91b14b25025c2dc747105a4d1bf4cd2fd193a2c741e5754065750e1325be507da9e3ac138269926be34eb6cef018c8475026f2bd837180a7c071122a4f399ae0c61c56f14f3b8deff51bc782cbec6ad3cb63826d4f2b79a422799d1f47656154c9f32ae38efa17b8de5f6351088d898ee6b894cc62e17dcd941f87f7a96fa213357222db8f246ebe375571cbf13a3c380bffe858c843169af971b4e1cef75924af804f273cb150e58ad16c0e5cb8d2989e6ac8dc53951ec64492d6c4d02b79c0cf9c0e453de21ec1c11201bc0dd6af06965a1088107fd5e78d9328fd56c717cd1f9dbcb9b54a10c50d7979d6e94962c424467d77d9437030b5d16232b6cc58fe255ef84f9adb3d9c07e2c1d37e155b7c78c9a0d96658e797ad8cafc18cca8eda4d5500d1fb80583623d4fb6b2adc71c9170c471a0dba10a1ff198702678d4a8c4cbc687c1a190083bacb9a686a1fe3ffe9f4f4d6ad1b3c709378ddb5d58e20cc5a0684788a209512015b2ea7ba0677fd9bc5651b71f4525754aafffef0c5bbc8d8e3e2a8eb8c167b0da01e1a6bd61ba191f5e19c5af5e2ef2da5a569a166e3fa7c8f30e40c41b73bb09f341c108cfe8b75d54bacc114f9c93ad41229451e0f2adbbb8bf61342f1c5e5ea1b7ed01498abd253129190f9a9bb09cdac49a0454b6e0bb3d02f9cfe602ba7fa2b7ffb05ddd86ff2a5b3661d4abbe70e8ba152f6aae458d50a6fec089bf996816108f45dd98724e169d8616a19d44b1977ad6259c30de2d5bd28b3637afc7ec99def2752b37dd5421d7529d3a0abf3fbb24dc7464eb86266e67cf67f7985fbe28c95449e8379930b7391a2d494282407d5e653bc1b75b03519f633dbe28381eec5f8a9a2bef25ffdcdc55eff61fb880f6f53650a8420e147d8e785046035a60a79ef16b80d0beecaa1661a6c34d6ed1fca6e5405b7e2bee8e631d8e8e5d70af42870550b3aaf5dfffc800f85e6dab44dbe7c8172e1c87f9fb8d9a6d9cdd8299e261ab7cfadf5e37088edd8910f85e56de1c4ed7228cd1df42ea1b5ffb8e0117b999d83dc7d576df30c9873b398599c5bdbf976552a8d59be1ae264b702d58c531de75a258e494f21b15d050acfe08b6d4531346e1ea8243327a6bb802bdbe74dd5858411605967f35ecea8884a088fa7c6f4b73e1fd31b92fbd3bf3998ad256cd29c972a0b73ffdfddbfbf66b02e575d1542629c9ca8d78c5b0d6ddf709b0ae6da54fcaf39943e510f804f1a72901030af52c3387d0b4760cfc846b73584cf847b9a30d7d49b2c2862e6a196a65f4f2d0ce17d604559c75647bb801befefa18787358e3804a1d6b3be944c14597950e7a9fdff76d795b6e27887a0a598e736e3f47883f8707c8ee4bb2acef9312183289d16e0729785d9c619737aee0c1c2603884d9a0813bac3ff90899797eee586b7e43a0467d7fae69ed818da2aee48f8d077ec8674e19f63a46adcf75e803daa9f7c620669506a04da17c59ff7d0b4cba6eb1545cd19f0fc36c4b8a0643c34a9939676cad0806b0d3722facc08b4f202bb26c2f994178fc5c04562f00af47fbcb00e2492410e64480a4ecac85b6047b0b8660aa03b24c18a4165bd7786b4bcb482943caebfbc1c69fb79c3e4ca16f05aae20d7a477b5524e65d5f89ce662298082d142e07e90360213a558651b1ba141dbc3507f00d9d9653be8ea8f144314f6776edbf2a9adb4d6f0aaf16f2f98da6815e0539fbe68379283a8d68601a020f7a6375a82071951c366cc402e2e2ed72bfc18b3cfee7d86507a2d33dfaec4fa3bf071dc5252ebd2a2a93069727c6ff8d9ae283a453e1734f9e31ee79ec005a396b64df95e673d603f1c7e11b5c436a9dcd0b93332b35f34db8cc7f056af7db521ad6bd9876e9a37e52bd77ab758444eaf423119524827ee5f19d095ae6561504dddb49c182422714ee0a3aa19f3df80d2d998684a218a5d85fa6753d5973cebb4f6ea9b78bfe448f4b1e7203da3629c098a07184e0e19230fc8c9214c2fd2a69821a2d716c44ad1e44938953134938796521f696cebf28f15e0d264be164a73ff571e25ed1ca8b166c04855c900b04efbd0cc6a8a2b3eeb05e671f90ce1bfa90a1868a48b1cc9af97614cee8ebc8670a47240673157a2467a254d6ed6d48d7d0537dd9514144844dd9735ae4ecf9d6681c325ff1457f3c185603d7d7dcbf6bfe083ab27b01dd3cd17716abf8d37a83b868b2fd0f2cee4cb45fa464c0ae7e5b9d179e79aa5ca3838faf40041de", 0x1000, 0x80}, {&(0x7f0000000100)="285e3776b56e12a53dca05947c35812a420e8c3732aac09cae5921c5c93b11f9c38515b9bc9a099a308a1f4f3c9ed19a8c8f379cbf074ba54c0892a00b306892b0e17eb869888479d80b2f9f00d2e9ce79265b32c3962a0021d561bee39c6c2d5410912aac289f25b34f38a477b1aa7b4f3b9a64aa9bc01f5dfa2c6661bf6112dd33f2cb7dc0dc7ebc65d08f0d7a294647a8e67fa955c322d11a57", 0x9b, 0x8001}, {&(0x7f0000000240)="59e8d5f0e506f376b520e6c28da55a1f7eb289f276cf59c9885d95eeeead7fc582c5c391e493deef9e18a9c10bcab22f52acac16a65ed5c1d74be518546651bf48f0c02e57a0e1bde5b2d70c20a832123a757a39bf11b5e92db688235089b22827e0f0a35d07932b864d58cd6e", 0x6d, 0x40}], 0x20000, &(0x7f0000001380)={[{@stripe={'stripe', 0x3d, 0x3}}, {@block_validity='block_validity'}, {@usrjquota='usrjquota='}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4}}], [{@audit='audit'}, {@measure='measure'}, {@seclabel='seclabel'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@permit_directio='permit_directio'}, {@euid_eq={'euid', 0x3d, r5}}]}) 13:51:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2711, 0x0, &(0x7f0000000180)) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x40000000000014a, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='projid_map\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 232.822338][T11433] FAULT_INJECTION: forcing a failure. [ 232.822338][T11433] name failslab, interval 1, probability 0, space 0, times 0 13:51:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000000e, 0x0) [ 232.899009][ T26] audit: type=1400 audit(1567777889.689:51): avc: denied { map } for pid=11441 comm="syz-executor.3" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=34684 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 [ 232.928370][T11433] CPU: 1 PID: 11433 Comm: syz-executor.2 Not tainted 5.3.0-rc7+ #0 [ 232.936274][T11433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.946335][T11433] Call Trace: [ 232.949644][T11433] dump_stack+0x172/0x1f0 [ 232.953986][T11433] should_fail.cold+0xa/0x15 [ 232.958583][T11433] ? __kasan_check_read+0x11/0x20 [ 232.963623][T11433] ? fault_create_debugfs_attr+0x180/0x180 [ 232.969445][T11433] ? page_to_nid.part.0+0x20/0x20 [ 232.974479][T11433] ? ___might_sleep+0x163/0x280 [ 232.979347][T11433] __should_failslab+0x121/0x190 [ 232.984288][T11433] should_failslab+0x9/0x14 [ 232.988776][T11433] kmem_cache_alloc_node_trace+0x274/0x750 [ 232.994567][T11433] ? kasan_unpoison_shadow+0x35/0x50 [ 232.999844][T11433] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 233.005637][T11433] __kmalloc_node_track_caller+0x3d/0x70 [ 233.011257][T11433] __kmalloc_reserve.isra.0+0x40/0xf0 [ 233.016617][T11433] __alloc_skb+0x10b/0x5e0 [ 233.021017][T11433] ? netdev_alloc_frag+0x1b0/0x1b0 [ 233.026132][T11433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.032363][T11433] ? netlink_autobind.isra.0+0x228/0x310 [ 233.037981][T11433] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 233.044208][T11433] netlink_sendmsg+0x972/0xd60 [ 233.048957][T11433] ? netlink_unicast+0x710/0x710 [ 233.053881][T11433] ? tomoyo_socket_sendmsg+0x26/0x30 [ 233.059157][T11433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.065375][T11433] ? security_socket_sendmsg+0x8d/0xc0 [ 233.070840][T11433] ? netlink_unicast+0x710/0x710 [ 233.075763][T11433] sock_sendmsg+0xd7/0x130 [ 233.080166][T11433] ___sys_sendmsg+0x803/0x920 [ 233.084827][T11433] ? copy_msghdr_from_user+0x440/0x440 [ 233.090275][T11433] ? __fget+0xa3/0x560 [ 233.094330][T11433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.100555][T11433] ? __fget+0x384/0x560 [ 233.104712][T11433] ? ksys_dup3+0x3e0/0x3e0 [ 233.109116][T11433] ? __fget_light+0x1a9/0x230 [ 233.113777][T11433] ? __fdget+0x1b/0x20 [ 233.117847][T11433] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 233.124084][T11433] __sys_sendmsg+0x105/0x1d0 [ 233.128661][T11433] ? __sys_sendmsg_sock+0xd0/0xd0 [ 233.133679][T11433] ? switch_fpu_return+0x1fa/0x4f0 [ 233.138778][T11433] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 233.144835][T11433] __x64_sys_sendmsg+0x78/0xb0 [ 233.149591][T11433] do_syscall_64+0xfd/0x6a0 [ 233.154080][T11433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.159976][T11433] RIP: 0033:0x459879 [ 233.163856][T11433] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 233.183441][T11433] RSP: 002b:00007f1245167c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 233.191835][T11433] RAX: ffffffffffffffda RBX: 00007f1245167c90 RCX: 0000000000459879 [ 233.199789][T11433] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 233.207741][T11433] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 233.215697][T11433] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12451686d4 [ 233.223652][T11433] R13: 00000000004c77c2 R14: 00000000004dd018 R15: 0000000000000005 13:51:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000580)=[{&(0x7f0000000100)=""/127, 0xffffff76}], 0x14, &(0x7f0000000d40)=[{&(0x7f0000001880)=""/4096, 0x20000502}], 0x1, 0x0) 13:51:30 executing program 5: mbind(&(0x7f0000401000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x10010008) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d6f0bcf6c7bf070") mbind(&(0x7f0000402000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x800000000000, 0x0) mlock(&(0x7f0000401000/0x3000)=nil, 0x3000) 13:51:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000000f, 0x0) 13:51:30 executing program 2 (fault-call:3 fault-nth:2): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) [ 233.427659][ T26] audit: type=1400 audit(1567777890.219:52): avc: denied { setopt } for pid=11462 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 13:51:30 executing program 1: accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/access\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'veth1\x00', {0x2, 0x0, @loopback}}) [ 233.472023][T11469] FAULT_INJECTION: forcing a failure. [ 233.472023][T11469] name failslab, interval 1, probability 0, space 0, times 0 13:51:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000010, 0x0) 13:51:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00'/14) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)='+4', 0xffffffffffffffcf}], 0x1) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080)=0x100, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff}) getpeername$ax25(r1, &(0x7f00000002c0)={{0x3, @null}, [@bcast, @rose, @default, @netrom, @bcast, @remote, @null, @default]}, &(0x7f0000000240)=0x25) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) syz_open_procfs(r2, &(0x7f0000000200)='net/bnep\x00') 13:51:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000011, 0x0) 13:51:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000012, 0x0) [ 233.776167][T11469] CPU: 0 PID: 11469 Comm: syz-executor.2 Not tainted 5.3.0-rc7+ #0 [ 233.784113][T11469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.794172][T11469] Call Trace: [ 233.794200][T11469] dump_stack+0x172/0x1f0 [ 233.801799][T11469] should_fail.cold+0xa/0x15 [ 233.806402][T11469] ? fault_create_debugfs_attr+0x180/0x180 [ 233.806424][T11469] ? netlink_remove_tap+0x4d0/0x4d0 [ 233.817411][T11469] __should_failslab+0x121/0x190 [ 233.822360][T11469] should_failslab+0x9/0x14 [ 233.826875][T11469] kmem_cache_alloc+0x47/0x710 [ 233.831645][T11469] ? lock_acquire+0x190/0x410 [ 233.836330][T11469] ? netlink_deliver_tap+0x146/0xbf0 [ 233.841629][T11469] skb_clone+0x154/0x3d0 [ 233.845888][T11469] netlink_deliver_tap+0x94d/0xbf0 [ 233.851009][T11469] netlink_unicast+0x5a2/0x710 [ 233.855785][T11469] ? netlink_attachskb+0x7c0/0x7c0 [ 233.860910][T11469] ? _copy_from_iter_full+0x25d/0x8a0 [ 233.866293][T11469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.872548][T11469] netlink_sendmsg+0x8a5/0xd60 [ 233.877328][T11469] ? netlink_unicast+0x710/0x710 [ 233.882284][T11469] ? tomoyo_socket_sendmsg+0x26/0x30 [ 233.887619][T11469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.893873][T11469] ? security_socket_sendmsg+0x8d/0xc0 [ 233.899345][T11469] ? netlink_unicast+0x710/0x710 [ 233.904291][T11469] sock_sendmsg+0xd7/0x130 [ 233.908721][T11469] ___sys_sendmsg+0x803/0x920 [ 233.913405][T11469] ? copy_msghdr_from_user+0x440/0x440 [ 233.918880][T11469] ? __fget+0xa3/0x560 [ 233.922982][T11469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.929243][T11469] ? __fget+0x384/0x560 [ 233.933408][T11469] ? ksys_dup3+0x3e0/0x3e0 [ 233.937849][T11469] ? __fget_light+0x1a9/0x230 [ 233.942527][T11469] ? __fdget+0x1b/0x20 [ 233.946617][T11469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 233.952879][T11469] __sys_sendmsg+0x105/0x1d0 [ 233.957505][T11469] ? __sys_sendmsg_sock+0xd0/0xd0 [ 233.962522][T11469] ? switch_fpu_return+0x1fa/0x4f0 [ 233.967627][T11469] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 233.973683][T11469] __x64_sys_sendmsg+0x78/0xb0 [ 233.978435][T11469] do_syscall_64+0xfd/0x6a0 [ 233.982929][T11469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.988804][T11469] RIP: 0033:0x459879 [ 233.992682][T11469] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 234.012270][T11469] RSP: 002b:00007f1245167c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 13:51:30 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x101104, 0x0) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000280)={0x0, 0x0, 0x2080}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0xc9) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, 0x0, &(0x7f0000000140)}, 0x17f) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000000)={r1, 0x0, 0x0}, 0x18) 13:51:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x13, 0x0, &(0x7f0000000140)=0x10b) 13:51:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000013, 0x0) [ 234.020667][T11469] RAX: ffffffffffffffda RBX: 00007f1245167c90 RCX: 0000000000459879 [ 234.028627][T11469] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 234.036582][T11469] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 234.044554][T11469] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12451686d4 [ 234.052512][T11469] R13: 00000000004c77c2 R14: 00000000004dd018 R15: 0000000000000005 13:51:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="480000001400197f09004b0101048c590a66ffffff010001000000000028213e0a20ad56cc7a45a6e20600d4ff5bffff00c7e5ed5e00000000000000000000eaf6389b186b1c0a7e", 0x48}], 0x1) 13:51:31 executing program 2 (fault-call:3 fault-nth:3): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:31 executing program 5: r0 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2711, 0x0, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000280), &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xede3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x61c80618be5e3e9c, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x0, 0x775}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x13, 0x9, "430c3bc4993f375e0da354302814e684758784f4c72ead352339c7a2407cbe559b1b6e60dd9a981cd16c1891c31340126a1128894f95215ed0255e5d335bba71", "42390672866d186e8ddd804ae58a99d03ca9e2e33e866c9262f0ab330db74165", [0x100, 0x80000000]}) setxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="040ce63acfc0d06e"], 0x8, 0x6) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x400, 0x0) connect$can_bcm(r1, &(0x7f0000000000), 0x10) sendmsg$can_raw(r1, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x3, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000240)={0x4, 0x5, 0x0, 0x4cbf}) 13:51:31 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000100)=0x101) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) r1 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2711, 0x0, &(0x7f0000000180)) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x40000, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0x1, &(0x7f00000000c0)=0xdb8, 0x4) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 13:51:31 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x20100, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r3 = dup(r2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x2, 0x2) r4 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r5 = dup(r4) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r7, 0x4008ae8a, &(0x7f0000000340)=ANY=[@ANYBLOB="1f0000000000000000000040050001000000e7fc4b0900000000000000b7871001000000000000002560b700ef"]) ioctl$KVM_SET_MSRS(r7, 0x4008ae89, &(0x7f0000000000)={0x1, 0x2, [{0x491}]}) 13:51:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000014, 0x0) [ 234.446088][T11526] FAULT_INJECTION: forcing a failure. [ 234.446088][T11526] name failslab, interval 1, probability 0, space 0, times 0 [ 234.475142][T11526] CPU: 0 PID: 11526 Comm: syz-executor.2 Not tainted 5.3.0-rc7+ #0 [ 234.483093][T11526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.493164][T11526] Call Trace: [ 234.496460][T11526] dump_stack+0x172/0x1f0 [ 234.500792][T11526] should_fail.cold+0xa/0x15 [ 234.505401][T11526] ? avc_has_extended_perms+0x10f0/0x10f0 [ 234.511155][T11526] ? fault_create_debugfs_attr+0x180/0x180 [ 234.516966][T11526] ? page_to_nid.part.0+0x20/0x20 [ 234.521997][T11526] ? ___might_sleep+0x163/0x280 [ 234.526857][T11526] __should_failslab+0x121/0x190 [ 234.531803][T11526] should_failslab+0x9/0x14 [ 234.536320][T11526] kmem_cache_alloc_node_trace+0x274/0x750 [ 234.542158][T11526] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 234.547969][T11526] ? lock_downgrade+0x920/0x920 [ 234.552828][T11526] __kmalloc_node+0x3d/0x70 [ 234.557336][T11526] qdisc_alloc+0xbb/0xa90 [ 234.561657][T11526] ? do_raw_read_unlock+0x3f/0x70 [ 234.566677][T11526] ? _raw_read_unlock+0x2d/0x50 [ 234.571525][T11526] qdisc_create+0xec/0x1210 [ 234.576023][T11526] ? nla_memcpy+0xb0/0xb0 [ 234.580355][T11526] ? tc_get_qdisc+0xc10/0xc10 [ 234.585055][T11526] ? __nla_parse+0x43/0x60 [ 234.589470][T11526] tc_modify_qdisc+0x524/0x1c50 [ 234.594318][T11526] ? trace_hardirqs_on+0x67/0x240 [ 234.599349][T11526] ? qdisc_create+0x1210/0x1210 [ 234.604210][T11526] ? rtnetlink_rcv_msg+0x1ea/0xb00 [ 234.609327][T11526] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 234.615829][T11526] ? qdisc_create+0x1210/0x1210 [ 234.620684][T11526] rtnetlink_rcv_msg+0x463/0xb00 [ 234.625622][T11526] ? rtnetlink_put_metrics+0x580/0x580 [ 234.631093][T11526] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 234.636385][T11526] ? __copy_skb_header+0x250/0x550 [ 234.641503][T11526] netlink_rcv_skb+0x177/0x450 [ 234.646266][T11526] ? rtnetlink_put_metrics+0x580/0x580 [ 234.651723][T11526] ? netlink_ack+0xb30/0xb30 [ 234.656311][T11526] ? netlink_deliver_tap+0x254/0xbf0 [ 234.661598][T11526] rtnetlink_rcv+0x1d/0x30 [ 234.666011][T11526] netlink_unicast+0x531/0x710 [ 234.670776][T11526] ? netlink_attachskb+0x7c0/0x7c0 [ 234.675886][T11526] ? _copy_from_iter_full+0x25d/0x8a0 [ 234.681254][T11526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.687580][T11526] netlink_sendmsg+0x8a5/0xd60 [ 234.692349][T11526] ? netlink_unicast+0x710/0x710 [ 234.697291][T11526] ? tomoyo_socket_sendmsg+0x26/0x30 [ 234.702588][T11526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.708832][T11526] ? security_socket_sendmsg+0x8d/0xc0 [ 234.714299][T11526] ? netlink_unicast+0x710/0x710 [ 234.719242][T11526] sock_sendmsg+0xd7/0x130 [ 234.723658][T11526] ___sys_sendmsg+0x803/0x920 [ 234.728338][T11526] ? copy_msghdr_from_user+0x440/0x440 [ 234.733796][T11526] ? __fget+0xa3/0x560 [ 234.737863][T11526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 13:51:31 executing program 3: socket$inet6_sctp(0xa, 0x80000000000001, 0x84) socket(0x11, 0x4, 0x8) r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000080)={0x8, 0x0, [{0x1, 0x2, 0x0, 0x0, @sint={0x5}}, {0x9, 0x1, 0x0, 0x0, @sint={0x0, 0x6d}}, {0x101, 0x3, 0x0, 0x0, @sint={0x5, 0x77e0}}, {0x8, 0x4, 0x0, 0x0, @msi={0x8, 0x2, 0x4}}, {0x0, 0x4, 0x0, 0x0, @sint={0x5526, 0x7}}, {0xfffffffffffffffe, 0x2, 0x0, 0x0, @msi={0x3, 0x0, 0x4}}, {0x7fffffff, 0x5, 0x0, 0x0, @msi={0x7, 0x6, 0x9}}, {0x7, 0x89a40b772de6db58, 0x0, 0x0, @msi={0x100000000, 0x1}}]}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000040)=0x1cd) [ 234.744098][T11526] ? __fget+0x384/0x560 [ 234.748255][T11526] ? ksys_dup3+0x3e0/0x3e0 [ 234.752675][T11526] ? __fget_light+0x1a9/0x230 [ 234.757349][T11526] ? __fdget+0x1b/0x20 [ 234.761426][T11526] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 234.767683][T11526] __sys_sendmsg+0x105/0x1d0 [ 234.772368][T11526] ? __sys_sendmsg_sock+0xd0/0xd0 [ 234.777400][T11526] ? switch_fpu_return+0x1fa/0x4f0 [ 234.782506][T11526] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 234.788574][T11526] __x64_sys_sendmsg+0x78/0xb0 [ 234.793335][T11526] do_syscall_64+0xfd/0x6a0 [ 234.797840][T11526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.803730][T11526] RIP: 0033:0x459879 [ 234.807610][T11526] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 234.827197][T11526] RSP: 002b:00007f1245167c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 234.835590][T11526] RAX: ffffffffffffffda RBX: 00007f1245167c90 RCX: 0000000000459879 13:51:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000015, 0x0) 13:51:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x8f5dc88a9f636ae9, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @broadcast}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) r1 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2711, 0x0, &(0x7f0000000180)) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000001f00)) r2 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2711, 0x0, &(0x7f0000000180)) sendmsg$inet6(r2, &(0x7f0000000400)={&(0x7f0000000140)={0xa, 0x4e24, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}, 0x1c, &(0x7f00000003c0)=[{&(0x7f00000001c0)="311887f3199ff0edbe15784217fdc766b1169a2a469ad2bcb59b3ab6f706a38d225bc572a64bc7ea5b1b57c95c580aa9a70b3ffdfc9718f8cccfb21ebff3148c159cad39fc02294c6aa25340c9253f52988002714782bed43299113e7c51ef8e0841c29da4b6d96c2cbb61267ff34adad3a290f2c00f060f3f446dbe6a0924c34573f9c4ce6c6416255b4848ade5dc09f612b51cdeb0109b0f112ae11d97516c4b66419d712a1e65e10d8ee2f5c8", 0xae}, {&(0x7f00000002c0)="6468edf00fbe345b43a4b6aa8b6c6e776f889c2baae7905e223a0254ce46ce751cb1768f8a5d014f4430072c698983da3439f29e87fb5bad880f904cb4353c4ed2e8278f8c6d4d5b403bcc5eb7770252077777ad0b527813f1539c26cc2ca8fbf1e6d67d9371b5f4af848c36b69a061c36feb42abd8bb57e93b8649d53effad84353c3c3cce472ccbc02e42af5e5532abb28425c6676231a0b1fccdbd3c643b6d58f691df5554a804871818a94f34af8c924ed5e2500b1475051c28a3a328f7dd372480d81a3702d60cd5374256efc073675f59c3e7e", 0xd6}], 0x2}, 0x41000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syncfs(0xffffffffffffffff) [ 234.843543][T11526] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 234.851496][T11526] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 234.859449][T11526] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12451686d4 [ 234.867404][T11526] R13: 00000000004c77c2 R14: 00000000004dd018 R15: 0000000000000005 13:51:31 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="27020800140007070000000000a5ea0700"/27, 0xe) r1 = socket$packet(0x11, 0x3, 0x300) getrlimit(0xd, &(0x7f0000000000)) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f00000000c0)=0x9, 0x4) recvmmsg(r0, &(0x7f0000006500), 0x1ce, 0x40010000, &(0x7f0000006700)={0x0, 0x1c9c380}) 13:51:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000016, 0x0) 13:51:31 executing program 2 (fault-call:3 fault-nth:4): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:31 executing program 0: socketpair$unix(0x1, 0x2001000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_S_MODULATOR(r2, 0x40445637, &(0x7f0000000080)={0x8, "117d9e528c6eba8efd8b3147337b6abf9a0e38fd3838c867e78c8b5b2f3e3373", 0x1508, 0x1000, 0xcc80, 0x2, 0x3}) r3 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r3, 0x114, 0x2711, 0x0, &(0x7f0000000180)) r4 = fcntl$dupfd(r3, 0x80c, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000008ff8)=0x3f) shutdown(r1, 0x1) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 13:51:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000017, 0x0) 13:51:32 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) epoll_pwait(r1, &(0x7f0000000000)=[{}, {}], 0x2, 0x3, &(0x7f0000000040)={0x2}, 0x8) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000060a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 13:51:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000018, 0x0) 13:51:32 executing program 0: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$llc(r0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x10) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r2 = dup(r1) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) r3 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r3, 0x114, 0x2711, 0x0, &(0x7f0000000180)) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000100)={0x800, 0x20, 0x9, 0x58c, 0x100000001}) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f0000000080)=""/128) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x3, &(0x7f00000016c0)=[{0x0, 0x0, 0x7fffffff}, {&(0x7f00000006c0)="a171d91bb313a3612bcf8571dedf0b5083c622d543bb9902ca6cd43744a5e9b5e60977bc8f8872385f749b8de8fb8a3e79f3c0a837732d24ee3cda574b5e8c83904f346b4a9e489e3d638b513e14ae85fa5ab07622ceff41b1532a0deb560309638a02229f2aa8b351d2763909a0ddc975ba527d2acf86963140e253794b3de8147d089c29af0b9bdfcf2cc726491856e3ddf92153e81424b3ac29b59376136b9ec361a94f1787fdd13f02eb32a137af0d8e5a1b3199908a50bf019b81a65ec58d09a362ccf4448a7552276cf117520860bda9aa2f8496e9c6d7f7beb800c8416b5fabedb62dd3eb964ad8f33abfc58146f73f1602d99e5067", 0xf9}, {0x0}], 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:51:32 executing program 1: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x400, 0xa, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffe, 0x1, 0x0, 0x1000000000000000, 0xff, 0x0, 0x4, 0x0, 0xffffffffffff095f, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x100, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0xaaaaaaaaaaaaab7, &(0x7f00000016c0)=[{0x0, 0xfeea, 0x7fffffff}, {&(0x7f00000006c0)="a171d91bb313a3612bcf8571dedf0b5083c622d543bb9902ca6cd43744a5e9b5e60977bc8f8872385f749b8de8fb8a3e79f3c0a837732d24ee3cda574b5e8c83904f346b4a9e489e3d638b513e14ae85fa5ab07622ceff41b1532a0deb560309638a02229f2aa8b351d2763909a0ddc975ba527d2acf86963140e253794b3de8147d089c29af0b9bdfcf2cc726491856e3ddf92153e81424b3ac29b59376136b9ec361a94f1787fdd13f02eb32a137af0d8e5a1b3199908a50bf019b81a65ec58d09a362ccf4448a7552276cf117520860bda9aa2f8496e9c6d7f7beb800c8416b5fabedb62dd3eb964ad8f33abfc58146f73f1602d99e5067", 0xfffffe2e}, {0x0, 0x1f7}], 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x9, 0x20000) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000ac0)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xffffff99) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000007c0)={r3, 0x20}, 0x8) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000008c0)={r3, 0x8, 0x30}, &(0x7f0000000900)=0xc) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000200)={0x5, &(0x7f0000000140)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x3, 0x9965, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000580)={r5, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f0000000300)={r4, &(0x7f0000000480)=""/112}) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f0000000100)={r4, 0x4}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x5402, &(0x7f0000000000)={0x4698}) ioctl$KDDISABIO(r6, 0x4b37) [ 235.359902][ T26] audit: type=1400 audit(1567777892.149:53): avc: denied { create } for pid=11572 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 235.368045][T11574] FAULT_INJECTION: forcing a failure. [ 235.368045][T11574] name failslab, interval 1, probability 0, space 0, times 0 [ 235.384919][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 235.384966][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 235.385053][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 235.385093][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 235.421899][T11574] CPU: 0 PID: 11574 Comm: syz-executor.2 Not tainted 5.3.0-rc7+ #0 [ 235.425206][ T26] audit: type=1400 audit(1567777892.179:54): avc: denied { write } for pid=11572 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 235.429797][T11574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.429801][T11574] Call Trace: [ 235.429820][T11574] dump_stack+0x172/0x1f0 [ 235.429839][T11574] should_fail.cold+0xa/0x15 [ 235.429852][T11574] ? avc_has_extended_perms+0x10f0/0x10f0 [ 235.429866][T11574] ? fault_create_debugfs_attr+0x180/0x180 [ 235.429879][T11574] ? page_to_nid.part.0+0x20/0x20 [ 235.429893][T11574] ? ___might_sleep+0x163/0x280 [ 235.429909][T11574] __should_failslab+0x121/0x190 [ 235.429923][T11574] should_failslab+0x9/0x14 [ 235.429934][T11574] kmem_cache_alloc_node_trace+0x274/0x750 [ 235.429948][T11574] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 235.429963][T11574] ? lock_downgrade+0x920/0x920 [ 235.429977][T11574] __kmalloc_node+0x3d/0x70 [ 235.429997][T11574] qdisc_alloc+0xbb/0xa90 [ 235.464772][T11574] ? do_raw_read_unlock+0x3f/0x70 [ 235.472352][T11574] ? _raw_read_unlock+0x2d/0x50 [ 235.472373][T11574] qdisc_create+0xec/0x1210 [ 235.547112][T11574] ? nla_memcpy+0xb0/0xb0 [ 235.551451][T11574] ? tc_get_qdisc+0xc10/0xc10 [ 235.556142][T11574] ? __nla_parse+0x43/0x60 [ 235.560565][T11574] tc_modify_qdisc+0x524/0x1c50 [ 235.565421][T11574] ? trace_hardirqs_on+0x67/0x240 [ 235.570454][T11574] ? qdisc_create+0x1210/0x1210 [ 235.575315][T11574] ? rtnetlink_rcv_msg+0x1ea/0xb00 [ 235.580437][T11574] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 235.586694][T11574] ? qdisc_create+0x1210/0x1210 [ 235.591561][T11574] rtnetlink_rcv_msg+0x463/0xb00 [ 235.596516][T11574] ? rtnetlink_put_metrics+0x580/0x580 [ 235.601990][T11574] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 235.607300][T11574] ? __copy_skb_header+0x250/0x550 [ 235.612421][T11574] netlink_rcv_skb+0x177/0x450 [ 235.617213][T11574] ? rtnetlink_put_metrics+0x580/0x580 [ 235.622683][T11574] ? netlink_ack+0xb30/0xb30 [ 235.627275][T11574] ? netlink_deliver_tap+0x254/0xbf0 [ 235.627294][T11574] rtnetlink_rcv+0x1d/0x30 [ 235.627304][T11574] netlink_unicast+0x531/0x710 [ 235.627318][T11574] ? netlink_attachskb+0x7c0/0x7c0 [ 235.627332][T11574] ? _copy_from_iter_full+0x25d/0x8a0 [ 235.627349][T11574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.627365][T11574] netlink_sendmsg+0x8a5/0xd60 [ 235.637054][T11574] ? netlink_unicast+0x710/0x710 [ 235.637069][T11574] ? tomoyo_socket_sendmsg+0x26/0x30 [ 235.637084][T11574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.637096][T11574] ? security_socket_sendmsg+0x8d/0xc0 [ 235.637107][T11574] ? netlink_unicast+0x710/0x710 [ 235.637122][T11574] sock_sendmsg+0xd7/0x130 [ 235.637140][T11574] ___sys_sendmsg+0x803/0x920 [ 235.673150][T11579] XFS (loop0): Invalid superblock magic number [ 235.673636][T11574] ? copy_msghdr_from_user+0x440/0x440 [ 235.710837][T11574] ? __fget+0xa3/0x560 [ 235.714897][T11574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.721260][T11574] ? __fget+0x384/0x560 [ 235.725403][T11574] ? ksys_dup3+0x3e0/0x3e0 [ 235.729815][T11574] ? __fget_light+0x1a9/0x230 [ 235.734488][T11574] ? __fdget+0x1b/0x20 [ 235.738540][T11574] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 235.744803][T11574] __sys_sendmsg+0x105/0x1d0 [ 235.749445][T11574] ? __sys_sendmsg_sock+0xd0/0xd0 [ 235.754458][T11574] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 235.760511][T11574] __x64_sys_sendmsg+0x78/0xb0 [ 235.765265][T11574] do_syscall_64+0xfd/0x6a0 [ 235.769769][T11574] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.775786][T11574] RIP: 0033:0x459879 [ 235.777020][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 235.779689][T11574] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:51:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000019, 0x0) 13:51:32 executing program 2 (fault-call:3 fault-nth:5): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x2}}}]}, 0x58}}, 0x0) 13:51:32 executing program 5: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x1, 0x0) write$rfkill(r0, &(0x7f0000000040)={0x0, 0x0, 0x2}, 0x8) [ 235.779697][T11574] RSP: 002b:00007f1245167c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 235.785451][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 235.805003][T11574] RAX: ffffffffffffffda RBX: 00007f1245167c90 RCX: 0000000000459879 [ 235.805010][T11574] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 235.805016][T11574] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 235.805022][T11574] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12451686d4 [ 235.805029][T11574] R13: 00000000004c77c2 R14: 00000000004dd018 R15: 0000000000000005 [ 235.932497][T11598] FAULT_INJECTION: forcing a failure. [ 235.932497][T11598] name failslab, interval 1, probability 0, space 0, times 0 [ 236.007080][T11598] CPU: 1 PID: 11598 Comm: syz-executor.2 Not tainted 5.3.0-rc7+ #0 [ 236.015011][T11598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.025085][T11598] Call Trace: [ 236.028382][T11598] dump_stack+0x172/0x1f0 [ 236.032720][T11598] should_fail.cold+0xa/0x15 [ 236.037330][T11598] ? qdisc_alloc+0xbb/0xa90 [ 236.041847][T11598] ? fault_create_debugfs_attr+0x180/0x180 [ 236.047679][T11598] ? page_to_nid.part.0+0x20/0x20 [ 236.052713][T11598] ? ___might_sleep+0x163/0x280 13:51:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000001a, 0x0) [ 236.057575][T11598] __should_failslab+0x121/0x190 [ 236.062520][T11598] should_failslab+0x9/0x14 [ 236.067029][T11598] kmem_cache_alloc_trace+0x2d3/0x790 [ 236.072406][T11598] ? fault_create_debugfs_attr+0x180/0x180 [ 236.078230][T11598] ? page_to_nid.part.0+0x20/0x20 [ 236.083256][T11598] tcf_block_get_ext+0x882/0x1610 [ 236.088287][T11598] tcf_block_get+0xb9/0x100 [ 236.092795][T11598] ? tcf_block_get_ext+0x1610/0x1610 [ 236.098084][T11598] ? walker_check_empty+0x70/0x70 [ 236.103110][T11598] ? lockdep_init_map+0x1be/0x6d0 [ 236.108138][T11598] ? dsmark_dump.cold+0x40/0x40 [ 236.112999][T11598] ? __kasan_check_write+0x14/0x20 [ 236.118117][T11598] sfb_init+0x36/0xa7 [ 236.122103][T11598] ? sfb_change+0xe90/0xe90 [ 236.126608][T11598] qdisc_create+0x4ee/0x1210 [ 236.131247][T11598] ? tc_get_qdisc+0xc10/0xc10 [ 236.135933][T11598] ? __nla_parse+0x43/0x60 [ 236.140351][T11598] tc_modify_qdisc+0x524/0x1c50 [ 236.145209][T11598] ? trace_hardirqs_on+0x67/0x240 [ 236.150243][T11598] ? qdisc_create+0x1210/0x1210 13:51:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000001b, 0x0) [ 236.155099][T11598] ? rtnetlink_rcv_msg+0x1ea/0xb00 [ 236.160220][T11598] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 236.166467][T11598] ? qdisc_create+0x1210/0x1210 [ 236.171323][T11598] rtnetlink_rcv_msg+0x463/0xb00 [ 236.176269][T11598] ? rtnetlink_put_metrics+0x580/0x580 [ 236.181736][T11598] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 236.187030][T11598] ? __copy_skb_header+0x250/0x550 [ 236.192147][T11598] netlink_rcv_skb+0x177/0x450 [ 236.196921][T11598] ? rtnetlink_put_metrics+0x580/0x580 [ 236.202385][T11598] ? netlink_ack+0xb30/0xb30 13:51:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000001c, 0x0) [ 236.206988][T11598] ? netlink_deliver_tap+0x254/0xbf0 [ 236.212282][T11598] rtnetlink_rcv+0x1d/0x30 [ 236.216703][T11598] netlink_unicast+0x531/0x710 [ 236.221474][T11598] ? netlink_attachskb+0x7c0/0x7c0 [ 236.226593][T11598] ? _copy_from_iter_full+0x25d/0x8a0 [ 236.231969][T11598] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.238212][T11598] netlink_sendmsg+0x8a5/0xd60 [ 236.242984][T11598] ? netlink_unicast+0x710/0x710 [ 236.247927][T11598] ? tomoyo_socket_sendmsg+0x26/0x30 13:51:33 executing program 5: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000005940)=[{{&(0x7f0000000280)={0xa, 0x0, 0x0, @local, 0x8}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000340)="18", 0x1}], 0x1}}, {{&(0x7f0000000700)={0x2, 0x0, 0x0, @loopback}, 0x17, &(0x7f0000001940)=[{&(0x7f0000000740)='%', 0x1}], 0x1}}], 0x2, 0x4004040) r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) r1 = socket$inet(0x2, 0x1, 0x3) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4c00) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, &(0x7f0000000300)) r3 = socket(0x5, 0x80807, 0x0) getsockopt(r3, 0x114, 0x2711, 0x0, &(0x7f0000000180)) r4 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r4, 0x114, 0x2711, 0x0, &(0x7f0000000180)) shutdown(r4, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r3, 0x10f, 0x83, &(0x7f0000000000), &(0x7f0000000100)=0x4) ioctl$KDDISABIO(r1, 0x4b37) r5 = socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000080)=ANY=[@ANYBLOB="c8b901df3dbcabf849568f9096f7385da4f64232084fa63e122117800e008121557e19af08000000005efe272c52d7a64b662f48eb0000000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000200)={r6, 0xffffffff}, 0x8) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) r7 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) dup(r7) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x1, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffb1d032aeea929193f89cf4bd8b50dc75c015153358ead9ff3d649e1cfba471b4"}) r8 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r8, 0x114, 0x2711, 0x0, &(0x7f0000000180)) vmsplice(r8, &(0x7f0000001780)=[{&(0x7f00000003c0)="81492432facb330793c80ceefcdfca0d83035b757411a3c3a36087fad81d71f40b08f7abb862c665f6b8ba8116fc84c74e8963ee9720232947c39243daa82206fc6b19cb13f52b6327c58dfe1ad1d1d38e1a1e52d073066d64da847804e63f0197a3fe0923df3872a596425315c0f4102fd6942a9dbaac57e563c269a43bd38a434586892029400662f190878bb5ccaa45da41423a8b5cfedf2612079241e337", 0xa0}, {&(0x7f0000000480)="ea48bb52b770f32f42ca42f968032ef299de55276460b3c42485e39faf44706519aeb1a21e5d7c268e1ea4350d855c131e8dd30e1584f8e2592267fc799cc5bf888d1ce34b9b", 0x46}, {&(0x7f0000000500)="21a58d97ec8a8d86e269f12ac876c7398c135b59eb8d206a920d024f112f83c17a6ab702e866683d9c9e3c2c75f7a78808df056eb722aeba3788b049b025bb204d05a7854fc01f0c0f0a42c4bf14dcc5f36a1511683bce511f27c37de6cc06f9c80141860514b4a662ef80dcb607baddf294d5fb662bf0f3846d642c128b700064001f57676dce8b6daacb25d68922db8dfb3408294e0daf36b2f3028ff26cbe424796d65d799cdca15979174071bbf798d01c3c2c795cc1ad2d1e50a5ee29027ebafd07263e6d46bd92610108d5e198bf44f217bb9832991045a7dc148d2f0108502217522c", 0xe6}, {&(0x7f0000000600)="ddd60d250397219e50218295b70dc90e587e4b18eaaca07ec903e99bea900b12ff442ecea0403045973a1629cdd9ac340ab4bbdc4081eb4d79c900100970cb97a04cbd8d64cc5af22d497d2b9460954c594fa5796386a3248f343a7d8a3975d1dab6721fa502680c6aea8cc657db8383530ae06d071bd9b97745693c004e9b67002615c489a8fc98a3a2c2cf2a46ae7196f614a4c2f6b7bcbca159fec1a164052831088c9a86481ed5f42b605e1986ee340fc2dd910a39d811c282918d3ca4cf", 0xc0}, {&(0x7f0000000780)="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", 0x1000}], 0x5, 0x8) r9 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r9, 0x114, 0x2711, 0x0, &(0x7f0000000180)) r10 = accept(r9, &(0x7f0000001800)=@hci, &(0x7f00000006c0)=0x80) r11 = socket$inet(0x2, 0x1, 0x3) r12 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r11, 0x84, 0x18, &(0x7f0000000200)={r13, 0xffffffff}, 0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000001880)={r13, 0x7e3, 0x0, 0x9, 0x1f}, &(0x7f00000018c0)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r10, 0x84, 0x72, &(0x7f0000001900)={r14, 0xc000000000000}, 0xc) syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f00000019c0)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000040)=r6, 0x4) [ 236.253212][T11598] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.259454][T11598] ? security_socket_sendmsg+0x8d/0xc0 [ 236.264919][T11598] ? netlink_unicast+0x710/0x710 [ 236.269863][T11598] sock_sendmsg+0xd7/0x130 [ 236.274283][T11598] ___sys_sendmsg+0x803/0x920 [ 236.278972][T11598] ? copy_msghdr_from_user+0x440/0x440 [ 236.284440][T11598] ? __fget+0xa3/0x560 [ 236.288519][T11598] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.294776][T11598] ? __fget+0x384/0x560 [ 236.299051][T11598] ? ksys_dup3+0x3e0/0x3e0 [ 236.303485][T11598] ? __fget_light+0x1a9/0x230 13:51:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000001d, 0x0) [ 236.308170][T11598] ? __fdget+0x1b/0x20 [ 236.312242][T11598] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 236.318504][T11598] __sys_sendmsg+0x105/0x1d0 [ 236.323117][T11598] ? __sys_sendmsg_sock+0xd0/0xd0 [ 236.328157][T11598] ? switch_fpu_return+0x1fa/0x4f0 [ 236.333281][T11598] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 236.339360][T11598] __x64_sys_sendmsg+0x78/0xb0 [ 236.344230][T11598] do_syscall_64+0xfd/0x6a0 [ 236.348748][T11598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.354649][T11598] RIP: 0033:0x459879 [ 236.358634][T11598] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 236.378327][T11598] RSP: 002b:00007f1245167c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 236.386745][T11598] RAX: ffffffffffffffda RBX: 00007f1245167c90 RCX: 0000000000459879 [ 236.394718][T11598] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 13:51:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000001e, 0x0) 13:51:33 executing program 3: chdir(0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r4, 0x114, 0x2711, 0x0, &(0x7f0000000180)) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) r6 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r6, 0x114, 0x2711, 0x0, &(0x7f0000000180)) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f00000002c0)) connect$inet(r5, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) getsockname(r5, &(0x7f0000001bc0)=@can={0x1d, 0x0}, &(0x7f0000001c40)=0x80) sendmmsg$inet(r5, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001d40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @multicast2, @multicast2}}}], 0x20}}], 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000100)={@remote, 0x30, r7}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r8 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x4008, 0x7ff, 0xffffffff, 0x0}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f0000000240)={0x9, 0x8000, 0xffffffff, 0x1, r9}, 0x10) socket$packet(0x11, 0x2, 0x300) ftruncate(r8, 0x28007d) sendfile(r8, r8, 0x0, 0x2008000fffffffe) r10 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_FILES(r10, 0x3, 0x0, 0x0) [ 236.402693][T11598] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 236.410668][T11598] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12451686d4 [ 236.418645][T11598] R13: 00000000004c77c2 R14: 00000000004dd018 R15: 0000000000000005 [ 236.497047][T11598] kasan: CONFIG_KASAN_INLINE enabled [ 236.502529][T11598] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 236.548150][T11598] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 236.555144][T11598] CPU: 0 PID: 11598 Comm: syz-executor.2 Not tainted 5.3.0-rc7+ #0 [ 236.563038][T11598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.573115][T11598] RIP: 0010:qdisc_put+0x25/0x90 [ 236.577972][T11598] Code: 00 00 00 00 00 55 48 89 e5 41 54 49 89 fc 53 e8 c1 52 bf fb 49 8d 7c 24 10 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 04 3c 03 7e 54 41 8b 5c 24 10 31 ff 83 e3 01 [ 236.584812][ T3907] kobject: 'loop4' (00000000bf99b3ed): kobject_uevent_env [ 236.597589][T11598] RSP: 0018:ffff88804f72f488 EFLAGS: 00010202 [ 236.597600][T11598] RAX: dffffc0000000000 RBX: ffff88805ab26200 RCX: ffffc9000a3d7000 [ 236.597607][T11598] RDX: 0000000000000002 RSI: ffffffff85b3228f RDI: 0000000000000010 [ 236.597613][T11598] RBP: ffff88804f72f498 R08: ffff88804d59c640 R09: fffffbfff11cae77 [ 236.597620][T11598] R10: fffffbfff11cae76 R11: ffffffff88e573b3 R12: 0000000000000000 [ 236.597626][T11598] R13: ffff88805ab26200 R14: ffff88805abc6b40 R15: ffff88805ab2623c [ 236.597636][T11598] FS: 00007f1245168700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 236.597650][T11598] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 236.607380][ T3907] kobject: 'loop4' (00000000bf99b3ed): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 236.610805][T11598] CR2: 00000000007126b4 CR3: 0000000093358000 CR4: 00000000001406f0 [ 236.610816][T11598] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 236.610829][T11598] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 236.647469][ T3907] kobject: 'loop5' (00000000b4d19d37): kobject_uevent_env [ 236.650684][T11598] Call Trace: [ 236.671897][ T3907] kobject: 'loop5' (00000000b4d19d37): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 236.676311][T11598] sfb_destroy+0x61/0x80 [ 236.676329][T11598] ? sfb_zero_all_buckets+0x20/0x20 [ 236.730409][T11598] qdisc_create+0xbc6/0x1210 [ 236.734984][T11598] ? tc_get_qdisc+0xc10/0xc10 [ 236.739646][T11598] ? __nla_parse+0x43/0x60 [ 236.744082][T11598] tc_modify_qdisc+0x524/0x1c50 [ 236.748912][T11598] ? trace_hardirqs_on+0x67/0x240 [ 236.753918][T11598] ? qdisc_create+0x1210/0x1210 [ 236.758751][T11598] ? rtnetlink_rcv_msg+0x1ea/0xb00 [ 236.763845][T11598] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 236.770064][T11598] ? qdisc_create+0x1210/0x1210 [ 236.774902][T11598] rtnetlink_rcv_msg+0x463/0xb00 [ 236.779825][T11598] ? rtnetlink_put_metrics+0x580/0x580 [ 236.785261][T11598] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 236.790545][T11598] ? __copy_skb_header+0x250/0x550 [ 236.795656][T11598] netlink_rcv_skb+0x177/0x450 [ 236.800404][T11598] ? rtnetlink_put_metrics+0x580/0x580 [ 236.805859][T11598] ? netlink_ack+0xb30/0xb30 [ 236.810429][T11598] ? netlink_deliver_tap+0x254/0xbf0 [ 236.815693][T11598] rtnetlink_rcv+0x1d/0x30 [ 236.820091][T11598] netlink_unicast+0x531/0x710 [ 236.824836][T11598] ? netlink_attachskb+0x7c0/0x7c0 [ 236.829930][T11598] ? _copy_from_iter_full+0x25d/0x8a0 [ 236.835301][T11598] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.841524][T11598] netlink_sendmsg+0x8a5/0xd60 [ 236.846284][T11598] ? netlink_unicast+0x710/0x710 [ 236.851220][T11598] ? tomoyo_socket_sendmsg+0x26/0x30 [ 236.856492][T11598] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.862715][T11598] ? security_socket_sendmsg+0x8d/0xc0 [ 236.868171][T11598] ? netlink_unicast+0x710/0x710 [ 236.873094][T11598] sock_sendmsg+0xd7/0x130 [ 236.877536][T11598] ___sys_sendmsg+0x803/0x920 [ 236.882194][T11598] ? copy_msghdr_from_user+0x440/0x440 [ 236.887638][T11598] ? __fget+0xa3/0x560 [ 236.891709][T11598] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.897935][T11598] ? __fget+0x384/0x560 [ 236.902075][T11598] ? ksys_dup3+0x3e0/0x3e0 [ 236.906472][T11598] ? __fget_light+0x1a9/0x230 [ 236.911126][T11598] ? __fdget+0x1b/0x20 [ 236.915190][T11598] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 236.921440][T11598] __sys_sendmsg+0x105/0x1d0 [ 236.926027][T11598] ? __sys_sendmsg_sock+0xd0/0xd0 [ 236.931138][T11598] ? switch_fpu_return+0x1fa/0x4f0 [ 236.936350][T11598] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 236.942415][T11598] __x64_sys_sendmsg+0x78/0xb0 [ 236.947183][T11598] do_syscall_64+0xfd/0x6a0 [ 236.951734][T11598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.957657][T11598] RIP: 0033:0x459879 [ 236.961542][T11598] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 236.981125][T11598] RSP: 002b:00007f1245167c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 236.989525][T11598] RAX: ffffffffffffffda RBX: 00007f1245167c90 RCX: 0000000000459879 [ 236.997482][T11598] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 237.005442][T11598] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 237.013400][T11598] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12451686d4 [ 237.021363][T11598] R13: 00000000004c77c2 R14: 00000000004dd018 R15: 0000000000000005 [ 237.029318][T11598] Modules linked in: [ 237.036880][T11598] ---[ end trace f043aaac2ca24517 ]--- [ 237.042603][T11598] RIP: 0010:qdisc_put+0x25/0x90 [ 237.047571][T11598] Code: 00 00 00 00 00 55 48 89 e5 41 54 49 89 fc 53 e8 c1 52 bf fb 49 8d 7c 24 10 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 04 3c 03 7e 54 41 8b 5c 24 10 31 ff 83 e3 01 [ 237.067357][T11598] RSP: 0018:ffff88804f72f488 EFLAGS: 00010202 [ 237.073505][T11598] RAX: dffffc0000000000 RBX: ffff88805ab26200 RCX: ffffc9000a3d7000 [ 237.081584][T11598] RDX: 0000000000000002 RSI: ffffffff85b3228f RDI: 0000000000000010 [ 237.090108][T11598] RBP: ffff88804f72f498 R08: ffff88804d59c640 R09: fffffbfff11cae77 13:51:33 executing program 1: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x6, 0x220080) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x659) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@migrate={0xb8, 0x21, 0x281, 0x0, 0x0, {{@in=@multicast2, @in=@local}}, [@migrate={0x5c, 0x11, [{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev}, {@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@multicast2}]}, @policy_type={0xc, 0x10, {0x2}}]}, 0xb8}}, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) 13:51:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000021, 0x0) 13:51:33 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000009640)={r1, 0x1, 0x6, @remote}, 0x10) r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r3 = dup(r2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x400448c9, &(0x7f0000000240)={{}, 0x2, 0x0, 0x0, 0x0, 0x0, "dabd439fc845f992ccdcb3e61c7ad4b47806d0508ecd9efd3b42f696561bedec7ea04aebef19bb18a63c688d8dd2b87b103f26da9943401a31137dcdefa4ff7e88246d556384c1d8b571d127555d5c737e8663f8a0bac18e2d4262c691ac43ffa1d032aeea929193f89c02be8b50dc75c015153358ead9ff3d649e1cfba471b4"}) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000100)={0x0, 0x0, 0x2080}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @link_local}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x2, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) [ 237.098268][T11598] R10: fffffbfff11cae76 R11: ffffffff88e573b3 R12: 0000000000000000 [ 237.106527][T11598] R13: ffff88805ab26200 R14: ffff88805abc6b40 R15: ffff88805ab2623c [ 237.114701][T11598] FS: 00007f1245168700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 237.123791][T11598] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 237.130493][T11598] CR2: 00007f1419aebdb8 CR3: 0000000093358000 CR4: 00000000001406f0 [ 237.223873][T11598] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 237.267439][T11598] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 237.288406][T11598] Kernel panic - not syncing: Fatal exception [ 237.295877][T11598] Kernel Offset: disabled [ 237.300209][T11598] Rebooting in 86400 seconds..