[ 37.648821] audit: type=1800 audit(1570901099.635:32): pid=7364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 38.486355] audit: type=1800 audit(1570901100.555:33): pid=7364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.195' (ECDSA) to the list of known hosts. 2019/10/12 17:25:10 fuzzer started syzkaller login: [ 48.170911] kauditd_printk_skb: 2 callbacks suppressed [ 48.170924] audit: type=1400 audit(1570901110.245:36): avc: denied { map } for pid=7548 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/10/12 17:25:11 dialing manager at 10.128.0.105:38531 2019/10/12 17:25:12 syscalls: 2516 2019/10/12 17:25:12 code coverage: enabled 2019/10/12 17:25:12 comparison tracing: enabled 2019/10/12 17:25:12 extra coverage: extra coverage is not supported by the kernel 2019/10/12 17:25:12 setuid sandbox: enabled 2019/10/12 17:25:12 namespace sandbox: enabled 2019/10/12 17:25:12 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/12 17:25:12 fault injection: enabled 2019/10/12 17:25:12 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/12 17:25:12 net packet injection: enabled 2019/10/12 17:25:12 net device setup: enabled 2019/10/12 17:25:12 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 17:28:00 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) socket$inet6(0xa, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x0) [ 218.773581] audit: type=1400 audit(1570901280.845:37): avc: denied { map } for pid=7566 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1150 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 218.888007] IPVS: ftp: loaded support on port[0] = 21 17:28:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) setuid(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, 0x0) setuid(r5) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000100)=0xe8) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x800086, &(0x7f00000002c0)={[{@mode={'mode', 0x3d, 0x4}}], [{@uid_eq={'uid', 0x3d, r5}}, {@subj_role={'subj_role', 0x3d, '/dev/ptmx\x00'}}, {@fowner_eq={'fowner', 0x3d, r6}}, {@obj_role={'obj_role', 0x3d, 'vboxnet0'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x34, 0x31, 0x39, 0x0, 0x37, 0x4], 0x2d, [0x63, 0x63, 0x39], 0x2d, [0x0, 0x0, 0x35], 0x2d, [0x0, 0x37, 0x64, 0x39], 0x2d, [0x31, 0x33, 0x0, 0x0, 0x0, 0x30, 0x3175ca9c54c4b1da]}}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/ptmx\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/ptmx\x00'}}]}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17, 0x0, 0x35b}) [ 219.000024] chnl_net:caif_netlink_parms(): no params data found [ 219.071168] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.077908] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.090576] device bridge_slave_0 entered promiscuous mode [ 219.110735] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.117206] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.132002] device bridge_slave_1 entered promiscuous mode [ 219.146190] IPVS: ftp: loaded support on port[0] = 21 17:28:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x80000000000004, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000001c0), &(0x7f0000000240)}, 0x20) [ 219.175665] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.200144] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.269576] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.277438] team0: Port device team_slave_0 added [ 219.289401] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 219.296654] team0: Port device team_slave_1 added [ 219.309389] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 219.316844] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 219.326705] IPVS: ftp: loaded support on port[0] = 21 17:28:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) setsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f0000000240)=0x1, 0x4) getdents(r2, 0x0, 0x500) getdents64(r2, 0x0, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000200)={0x0, 0x8001, 0x1, 0x0}) r3 = gettid() r4 = gettid() sendmmsg$unix(r1, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c, 0x1, 0x2, {r3}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r4}}}], 0x70}], 0xfd, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x3, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000380)="90ab31ca3fe738793975fff6741f645243089d36a16bff9adeea4158dd01c3aab76b18f361ac1d7f23a1f352e5ef590a1fe65150f2855f2b835fa1ff7119675b0468d70718e5d886e6f9ef9282b7a067d217f570f075941783be2456962f61321f4e", 0x62}, {&(0x7f00000004c0)="f6a8e26eb4b2a88b96585c9dd692e2c120cd6b45ab201e67f1312f47cccde6bf12233a73dab10244d140311b8efbb5c4f3b534d002b86bece0344ed6b41c3f4b7834ac841cd96d1f2fb659f411fbeda264c94031f45057cd3a89ada251e89393798b6b62d6", 0x65, 0x7}], 0x2, &(0x7f0000000440)={[{@map_normal='map=normal'}, {@check_relaxed='check=relaxed'}, {@map_acorn='map=acorn'}], [{@permit_directio='permit_directio'}]}) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r5, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) sendmsg$TIPC_NL_NET_SET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[@ANYBLOB="15bc0d46068bb887014f8c3daa986df4bc81b2cf4fce75f8f65810235adf99b60fde67afecd477fbe58d1f9448469a413d30d45d8ade3b00977feaf674700818fde7c719706a2dccae89267ce77a4c561c50158076df34aade7871dc07c6538c2f0be8218c1997d3035d73e4dc34b78b709b1adb7ed4a8ab2847731c2fdb0a0dc749b3b07a72d8e36c46612b698583da0f5483235d607f2601514af57e7917a49ea91fc648747953081860194ef0cb6d42ffb7fee141e4d080136d1c57b385804f3458123b9def40bbff738b92964f14a93eb260ece2ac54fb97112423e71f704619021594b54599fcfbc27e56bfb94f52c4dc66db277689f3f64e71b1eff3e862c41aa504e1d515bf57e97e84cf9808a09880759aea984e36474a9e2f94e9f1d076346577126afd2b04d89bf0dd21521b880285b3b44623022da8bf35a342e70505956c1a732b168a9d3caad0747b1f2f37072eebdde7fe83aaa5b3b635b3b8f2953460480f85e179217b84f16d0bd07d2d28b06af6c2ccbf3e32726a5a9a93ad27c8f9201e6eea7ed7a996e08a756cfc168e538bfcf8e0dda80e544b417c4f80dc3712c18d104085118688e75ca119ed4dadea31e3fdd5cd814cfd9ea44bff1ece97ab2dd675ee91249cbe691514aeee0df407fddc1f4e761783dcb4a0f4857e753b7de8eb81cf71d4eb75a2a53dbc", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f000000280005000800010065746800040002000800010065746800080001007564700008000100696200000c0006000800010000000000200007000804020000000000080002006d0000000c0004000000000000000000080104001400010062726f6164636173742d6c696e6b00000c00010073797a30000000000c00010073797a30000000004c000700080004000000000008000100000000000800020000000000080002000000000008000400000000000800020000000000080002000000000008000300ffffffff08000100000000005400070008000100000000000800040000000000080004000000000008000400000000000800040000000000080004000000000008000300000000000800030000000000080001000c00000008000100000000000c00010073797a31000000000c00010073797a30000000000c00010073797a30000000001400010062726f6164636173742d6c696e6b00004800050008000100696200003c0002000800010000000000080001000000000008000100000000000800010000000000080002000000000008000300010001000800010000000000dc0001000800030000000000080003000000000044000400200001000a004e2300000000ff02000000000000000000000000000100000000200002000a00000000000000ff0200000000000000000000000000010600000038000400200001000a0000000000000000000000000000000000000000000001000000001400020002004e217f00000100000000000000000c0002000800020000000000380004001400010002000000ffffffff0000000000000000200002000a00000000000000ff02000000000000"], 0x3}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) [ 219.411383] device hsr_slave_0 entered promiscuous mode [ 219.448825] device hsr_slave_1 entered promiscuous mode [ 219.520078] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 219.527144] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 219.614027] IPVS: ftp: loaded support on port[0] = 21 [ 219.615902] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.626218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.633225] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.639634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.667235] chnl_net:caif_netlink_parms(): no params data found 17:28:01 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000040)=0x9, 0x4) [ 219.883686] chnl_net:caif_netlink_parms(): no params data found [ 219.904077] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.908108] IPVS: ftp: loaded support on port[0] = 21 [ 219.913147] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.923129] device bridge_slave_0 entered promiscuous mode [ 219.938858] chnl_net:caif_netlink_parms(): no params data found [ 219.946967] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.953798] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.961293] device bridge_slave_1 entered promiscuous mode [ 220.042294] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.055737] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 220.078547] bridge0: port 1(bridge_slave_0) entered disabled state 17:28:02 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @link_local}, 0x10) [ 220.096400] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.112437] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.118907] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.126193] device bridge_slave_0 entered promiscuous mode [ 220.141762] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.149703] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.156779] device bridge_slave_1 entered promiscuous mode [ 220.202367] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.219554] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 220.226808] team0: Port device team_slave_0 added [ 220.235504] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.242413] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.253299] device bridge_slave_0 entered promiscuous mode [ 220.275823] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.284056] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.291759] team0: Port device team_slave_1 added [ 220.297313] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.305262] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.312041] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.319192] device bridge_slave_1 entered promiscuous mode [ 220.347980] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 220.356995] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.371543] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 220.380092] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.396498] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 220.426590] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 220.441193] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 220.441294] IPVS: ftp: loaded support on port[0] = 21 [ 220.450497] team0: Port device team_slave_0 added [ 220.471186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 220.479030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.492579] chnl_net:caif_netlink_parms(): no params data found [ 220.512980] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.521042] team0: Port device team_slave_1 added [ 220.561040] device hsr_slave_0 entered promiscuous mode [ 220.598761] device hsr_slave_1 entered promiscuous mode [ 220.639097] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 220.646248] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 220.653882] team0: Port device team_slave_0 added [ 220.674234] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.682757] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 220.689192] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.695712] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 220.709840] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.717150] team0: Port device team_slave_1 added [ 220.722937] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.734427] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.742289] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.753580] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 220.765068] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 220.780529] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.786947] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.793870] device bridge_slave_0 entered promiscuous mode [ 220.802167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.810528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.818040] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.824446] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.831396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.842401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.850048] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.856374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.882475] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 220.896066] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.902743] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.910141] device bridge_slave_1 entered promiscuous mode [ 220.951419] device hsr_slave_0 entered promiscuous mode [ 220.988759] device hsr_slave_1 entered promiscuous mode [ 221.059037] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 221.067917] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 221.078859] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 221.140182] device hsr_slave_0 entered promiscuous mode [ 221.188914] device hsr_slave_1 entered promiscuous mode [ 221.235421] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 221.243246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 221.251912] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 221.278062] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.287185] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 221.297392] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 221.313034] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.320303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 221.328190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 221.336564] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.344509] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 221.352640] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.372816] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 221.389289] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.396627] team0: Port device team_slave_0 added [ 221.407635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 221.415809] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.425348] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.440169] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 221.447420] team0: Port device team_slave_1 added [ 221.454969] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 221.474788] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 221.483275] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 221.515598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 221.523380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 221.533626] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 221.547919] chnl_net:caif_netlink_parms(): no params data found [ 221.558434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 221.567155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 221.579632] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 221.585672] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 221.680558] device hsr_slave_0 entered promiscuous mode [ 221.718656] device hsr_slave_1 entered promiscuous mode [ 221.759808] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 221.767860] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.783404] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 221.791466] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.797826] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.805554] device bridge_slave_0 entered promiscuous mode [ 221.812487] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 221.825900] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 221.837284] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 221.844888] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.851416] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.858887] device bridge_slave_1 entered promiscuous mode [ 221.869196] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.882749] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 221.895490] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 221.904709] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 221.912419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.920550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.927337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.934462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.945430] audit: type=1400 audit(1570901284.015:38): avc: denied { associate } for pid=7567 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 221.976911] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 221.983792] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.993182] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 222.003373] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 222.009796] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.019506] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 222.029184] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.046852] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.057349] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.077837] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.092528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.103093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.114873] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.121311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.136955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.144993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.158758] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.165142] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.178231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.186526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.200693] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.207113] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.215753] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 222.236984] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 222.248302] hrtimer: interrupt took 47384 ns [ 222.255362] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 222.266184] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.275188] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.284031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.291851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.300725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.309130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.316941] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.323370] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.346421] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.365446] team0: Port device team_slave_0 added [ 222.375661] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.389349] team0: Port device team_slave_1 added [ 222.396710] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 222.412567] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 222.425788] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 222.442610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 17:28:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) [ 222.462824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.471473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.482550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.493139] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.504114] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.540799] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 222.546943] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.574316] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 222.584885] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.592463] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.602169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.619238] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.627371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.636144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.644524] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.654916] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 222.673731] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready 17:28:04 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000300)="01f14d8254660aef550c8096387ded0d0100ed24a506362bc80798bc67189a1e1464a3873802a13832f9170ee70102cd8b1326c772f023649364df6d7321232d0d09d7c6ab45b59014feac546badc86036ecbf33127b8628b574705dc461a79a1e0fd6db41240f9c7e83a97e79740de3b7f2d6b22c006dafe1a0897ebe4d5121d5253876111881eac697474e10a8accbaef05bf07ce61570858ab4039196e7e061332b347366f1f992f77973f59ab367b8be498ea25d357873dbd2718aef7ac7d5b5a847a66f536d1976ef04fdf5ad51465c43984d583ed49db1121c8e895af9", 0x2ed) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000100)={r4}, 0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x8, 0xff24, 0x0, 0x9, 0x6}, &(0x7f0000000200)=0x14) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) connect$rds(r6, &(0x7f0000000100)={0x2, 0x4e21, @empty}, 0x10) connect$l2tp(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x2, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x3a) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, 0x0) r8 = open(0x0, 0x141042, 0x0) ioctl$KDSKBMODE(r8, 0x4b45, 0x0) open(0x0, 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r7, 0x4c80, 0x0) chdir(&(0x7f00000005c0)='./file0\x00') ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000380)) socket$netlink(0x10, 0x3, 0x1) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) socket(0x18, 0x0, 0x0) [ 222.684876] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.695721] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.709301] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.716382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.737751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.745863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.754175] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.762145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.770104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.779638] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.785993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.794395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.807664] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 222.816587] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 222.825167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.833723] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.843128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.853446] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.900974] device hsr_slave_0 entered promiscuous mode [ 222.958896] device hsr_slave_1 entered promiscuous mode [ 222.990052] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 222.997295] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 223.011343] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.025483] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 223.040327] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 223.049511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.057397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.065738] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.072149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.080076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.087938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.096317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.112276] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 223.122247] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 223.137766] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 223.144457] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 223.152402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.162031] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.169769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.183876] 8021q: adding VLAN 0 to HW filter on device bond0 17:28:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x10006, 0x0, 0x0, 0x50000}]}) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$cgroup_int(r0, 0x0, 0x0) [ 223.194736] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 223.206323] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 223.214803] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 223.221787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 223.241186] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.249724] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.261676] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 223.278857] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.288156] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 223.302738] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.319285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.327535] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.336319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.344087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.353301] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 223.378190] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 223.387446] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 17:28:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 223.398080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 223.413233] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.424287] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 223.436326] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 223.444458] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.455124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.463336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.474364] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 223.481362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 223.490835] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 223.498532] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 223.511451] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.522131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.530195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.537867] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.544259] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.554488] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.571081] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 223.582195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.589894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.597686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.605705] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.612219] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.619801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.633389] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 223.667968] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 223.689831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.740489] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.764137] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 223.782769] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 223.814993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.816842] audit: type=1400 audit(1570901285.885:39): avc: denied { map_create } for pid=7622 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 223.827033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 17:28:05 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080)=0x7fffffff, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bridge0\x00', 0x0}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendto$inet6(r0, &(0x7f0000000340)="0383000003004c030d001100fff55b4202938207d9fb86dd398d5375000000007929301e8000d5c01843e06590080800000085472da722162bb401000000c3b50035110f118d0000f5cfe606f6925cbf34658ea132797b1abc5dc62600009b000000faffffff0000", 0x395, 0x0, 0x0, 0x0) [ 223.874121] audit: type=1400 audit(1570901285.925:40): avc: denied { map_read map_write } for pid=7622 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 223.900393] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.916519] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready 17:28:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x18) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x8, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) close(r1) [ 223.931228] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.939229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.967744] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 17:28:06 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000080)={r3, @in={{0x2, 0x0, @empty}}}, 0x90) [ 224.003094] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 224.025685] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 224.037201] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 224.059272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.069916] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 224.081122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.101244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 17:28:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept$inet6(0xffffffffffffffff, 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) [ 224.119473] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.131541] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 224.139292] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.148173] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 224.159585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 224.175238] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.193326] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 224.204600] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 224.217046] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 224.231263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.244359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.270754] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.277193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.307666] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 224.324772] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 224.334892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 17:28:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) select(0x0, 0x0, &(0x7f0000000880)={0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x0, 0xa0}, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, 0x0, &(0x7f00000008c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000206a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x280) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) socketpair(0x0, 0x0, 0x5093, &(0x7f0000000080)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'bridge_slave_1\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="3700000000000000090000000000000001000100810000000000000000000061b8581100"]}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000280)={{0x6c, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x3, 'fo\x00', 0x0, 0x21d6, 0x19}, {@loopback, 0x4e21, 0x2000}}, 0x44) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB='Z'], 0x1) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)=0x20008088) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r6, &(0x7f00000003c0)=ANY=[@ANYBLOB='\f'], 0x1) r7 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f00000001c0)=0x20008088) write$cgroup_type(r7, &(0x7f00000000c0)='threaded\x00', 0x8db9) sendfile(r7, 0xffffffffffffffff, 0x0, 0x8000fffffffe) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) ppoll(&(0x7f0000000440)=[{r2, 0x6a08}, {0xffffffffffffffff, 0x6d7cf690f0f11a1c}, {0xffffffffffffffff, 0x10}, {r4, 0x20}, {r5, 0x8000}, {r6, 0x402}, {0xffffffffffffffff, 0x20}, {r7}, {r0, 0x4000}], 0x9, &(0x7f0000000380)={r8, r9+10000000}, &(0x7f0000000400)={0x5428}, 0x8) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) vmsplice(r1, 0x0, 0x0, 0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, 0x0, 0x0) listen(0xffffffffffffffff, 0x37) [ 224.350723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.363528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.374640] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.381110] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.395091] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 224.398484] audit: type=1400 audit(1570901286.455:41): avc: denied { prog_load } for pid=7653 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 224.441937] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 17:28:06 executing program 3: open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) [ 224.468465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 224.493860] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 224.524387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.534542] audit: type=1400 audit(1570901286.605:42): avc: denied { prog_run } for pid=7653 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 224.583416] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 224.601582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.614983] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.628779] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 224.651983] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 224.672776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 224.684379] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.694956] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 224.706239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 224.714116] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.724251] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 224.733064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 224.740942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.750783] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 224.756829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 224.776975] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 224.787135] 8021q: adding VLAN 0 to HW filter on device batadv0 17:28:06 executing program 4: mkdir(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rfkill\x00', 0x101012, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) write$rfkill(r2, &(0x7f0000000100)={0x0, 0x0, 0x3}, 0x8) [ 224.869240] protocol 88fb is buggy, dev hsr_slave_0 [ 224.874472] protocol 88fb is buggy, dev hsr_slave_1 [ 224.881302] device lo entered promiscuous mode [ 224.914970] device lo left promiscuous mode [ 224.963171] device lo entered promiscuous mode [ 224.988358] protocol 88fb is buggy, dev hsr_slave_0 [ 224.988987] device lo left promiscuous mode 17:28:07 executing program 5: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$selinux_create(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 17:28:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080)=0x7fffffff, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bridge0\x00', 0x0}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendto$inet6(r0, &(0x7f0000000340)="0383000003004c030d001100fff55b4202938207d9fb86dd398d5375000000007929301e8000d5c01843e06590080800000085472da722162bb401000000c3b50035110f118d0000f5cfe606f6925cbf34658ea132797b1abc5dc62600009b000000faffffff0000", 0x395, 0x0, 0x0, 0x0) 17:28:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d008105e00f80ecdb4cb9f207c804a01c000000060006000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 17:28:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000e7a4592283746c7514d5281e3b422c6f44c932162f3eafc0a45b3eb1d54cf8614ef7ff00806b1c7da8eb0cb3a45db780251b5b39380e8a4586782b20197b29ffed8d0599ca756be21772a4cbe403c3e4226552e30b99e1ef2b798a302193122b89935ed66b9a98d6eda2"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:28:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=@newqdisc={0x150, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_MAX_P={0x8, 0x3, 0xfffffffb}, @TCA_RED_PARMS={0x14}]}}]}, 0x150}}, 0x0) 17:28:07 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, 0x0) [ 225.086050] veth1_to_bridge: FDB only supports static addresses [ 225.098364] protocol 88fb is buggy, dev hsr_slave_0 [ 225.103479] protocol 88fb is buggy, dev hsr_slave_1 [ 225.124604] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=112 sclass=netlink_route_socket pig=7693 comm=syz-executor.0 17:28:07 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x1a052, r0, 0x80000000) 17:28:07 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(r0, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) readv(r1, &(0x7f00000002c0), 0x1aa) 17:28:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f0000000040)) 17:28:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) setsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f0000000240)=0x1, 0x4) getdents64(r2, 0x0, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000200)={0x0, 0x8001, 0x1, 0x0}) r3 = gettid() r4 = gettid() sendmmsg$unix(r1, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c, 0x1, 0x2, {r3}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r4}}}], 0x70}], 0xfd, 0x0) r5 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x0, 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000300)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="90ab31ca3fe738793975fff6741f645243089d36a16bff9adeea4158dd01c3aab76b18f361ac1d7f23a1f352e5ef590a1fe65150f2855f2b835fa1ff7119675b0468d70718e5d886", 0x48}, {&(0x7f00000004c0)="f6a8e26eb4b2a88b96585c9dd692e2c120cd6b45ab201e67f1312f47cccde6bf12233a73dab10244d140311b8efbb5c4f3b534d002b86bece0344ed6b41c3f4b7834ac841cd96d1f2fb659f411fbeda264c94031f45057cd3a89ada251e89393798b6b62d6", 0x65, 0x7}], 0x2, &(0x7f0000000440)={[{@map_normal='map=normal'}, {@check_relaxed='check=relaxed'}, {@map_acorn='map=acorn'}], [{@permit_directio='permit_directio'}]}) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r5, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) sendmsg$TIPC_NL_NET_SET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[@ANYRES16=0x0, @ANYBLOB="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"], 0x2}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) 17:28:07 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000100)=""/244) 17:28:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = eventfd2(0x0, 0x0) io_setup(0x3, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x5, r1}]) [ 225.307457] audit: type=1400 audit(1570901287.375:43): avc: denied { map } for pid=7701 comm="syz-executor.1" path="/dev/snd/pcmC0D0c" dev="devtmpfs" ino=16938 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 17:28:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=@newtfilter={0x30, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000019c0)={&(0x7f00000038c0)=@newtfilter={0x30, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0xffe0}}, [@filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0x4}}]}, 0x30}}, 0x0) 17:28:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20986100, 0x0, 0x0, 0x0, &(0x7f0000000100)="d353ff072d68b2e4dc14aa5fa8b3d94c22") 17:28:07 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x1a052, r0, 0x80000000) 17:28:07 executing program 5: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pipe2(0x0, 0x84000) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000140)=0x4) creat(0x0, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f0000000180)={0x10000, 0x2}) creat(&(0x7f0000000040)='./bus\x00', 0x0) epoll_create1(0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket(0x10, 0x0, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r5, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r6, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r6, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 17:28:07 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x1a052, r0, 0x80000000) 17:28:07 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) clone(0x20982500, 0x0, 0x0, 0x0, 0x0) 17:28:07 executing program 0: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1c", 0x30) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 17:28:07 executing program 3: getpid() ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) rmdir(0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa36", 0x3d) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 17:28:07 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x1a052, r0, 0x80000000) 17:28:07 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x342, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000150007031dfffd946fa2830002200a0009000000741d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000002d00), 0x4000000000001b6, 0x40010020, 0x0) [ 225.764150] audit: type=1400 audit(1570901287.835:44): avc: denied { map } for pid=7751 comm="syz-executor.0" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=28142 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 17:28:07 executing program 5: syz_open_dev$dri(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) keyctl$assume_authority(0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) dup3(r1, r0, 0x0) 17:28:07 executing program 1: mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x1a052, 0xffffffffffffffff, 0x80000000) 17:28:08 executing program 1: mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x1a052, 0xffffffffffffffff, 0x80000000) [ 225.926314] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 225.950273] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 226.024006] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 226.061699] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 226.077896] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 226.087374] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 17:28:08 executing program 2: setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000400)={0x0, 'vcan0\x00'}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080), 0x7312e7ba) 17:28:08 executing program 0: clone(0x80006b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x2d8, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3) ptrace$getregs(0x4208, r0, 0x0, 0x0) 17:28:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f0000000400)) 17:28:08 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev={0xfe, 0x80, [], 0x20}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0xfffffffffffffffc}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x20, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 17:28:08 executing program 1: mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x1a052, 0xffffffffffffffff, 0x80000000) 17:28:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) keyctl$assume_authority(0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) dup3(0xffffffffffffffff, r0, 0x0) [ 226.395176] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 226.411900] audit: type=1400 audit(1570901288.485:45): avc: denied { create } for pid=7795 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 17:28:08 executing program 1: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x1a052, r0, 0x80000000) 17:28:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f00000002c0)={'team0\x00', {0x2, 0x0, @multicast2}}) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) pipe(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x1}, 0x0) sched_setattr(0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r1, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a99d58d2267958d4c5320b836f26e80fff0f48bb7a9dbe30fcc0ee3c0d19fc464240758595e7eb33de379d54b1bb38a0e4a0f889ec0c3fba40525614e260a798c62e2171b48742723f0000cde52e8a2eeadce33f9d6de553764b2dc37cd776ae9bc72c0b81fe59309fd1ad681f592a81fc06e67513252392cd38fb", 0x86) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) sendfile(r1, r1, &(0x7f0000000200), 0xff8) r2 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000180)='Z\x00') 17:28:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@bridge_getneigh={0x20, 0x1e, 0x201, 0xc}, 0x20}}, 0x0) 17:28:08 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000100)=0x8) 17:28:08 executing program 5: getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000100)='security.capability\x00', 0x0, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000480), 0xffffffffffffff39, 0x0, 0x0, 0x150) shutdown(r0, 0x400000000000001) r1 = socket$nl_route(0x10, 0x3, 0x0) dup(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x4e, 0x3e6, 0x0, 0x1}) socket(0x2, 0x0, 0x0) 17:28:08 executing program 1: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x1a052, r0, 0x80000000) 17:28:08 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x80) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:28:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000000), 0x90) 17:28:09 executing program 4: setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='security.evm\x00', 0x0, 0x0, 0x3) r0 = socket(0x10, 0x400000000080803, 0x0) write(r0, &(0x7f0000000040)="1b0000001a0025f00485bc04fef7001d020b49ffed000000800728", 0x1b) recvmmsg(r0, &(0x7f0000007600)=[{{&(0x7f00000008c0)=@nl=@unspec, 0x80, &(0x7f0000000780)=[{&(0x7f0000000480)=""/132, 0x84}, {&(0x7f0000000280)=""/5, 0x5}, {&(0x7f0000000700)=""/121, 0x79}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000000940)=""/230, 0xe6}], 0x5, &(0x7f0000000c40)=""/194, 0xc2}, 0x7fff}, {{0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000004680)=""/230, 0xe6}, 0x1000}, {{&(0x7f0000005a00)=@ethernet, 0x80, &(0x7f0000006f00)=[{0x0}, {&(0x7f0000005ac0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000006e00)=""/235, 0xeb}], 0x4}, 0x401}], 0x3, 0x40, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x71, 0x81) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x12, 0x5, 0x0, 0x20000, 0x0}) shutdown(0xffffffffffffffff, 0x1) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x8}, &(0x7f0000000440)=0x8) read$rfkill(r2, &(0x7f0000000080), 0x8) 17:28:09 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000200)={0x0, 0xd9f, 0x4, {0x2, @raw_data="7a96b6fbdf62bba845a52d283bb5a8dd7f85e61011ce5e9f9b04ddb9012500247fbf42196476f3d9503327a912bd364605e0446a5559377e7bf92ef30863951aaa53f7270160142e2eeaef347c1e02f86b9b6d4bb3c26f51d9fbf95a71bcd057022d48177863b1f3c453ffc3707cabc8eb6356a35480256ccf100f0699de633c9c7d1e7392d5322ba8cb887f11ce6b63f76445cc8d3cb45ecd3e2bbac22aea5bfc2abd157b05d12e9e772f0adcf0fa4b686c7272b6d4089d037562eeddd4c8d170f697a243b6f096"}}) 17:28:09 executing program 1: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x1a052, r0, 0x80000000) 17:28:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@bridge_getneigh={0x20, 0x1e, 0x201, 0xc}, 0x20}}, 0x0) 17:28:09 executing program 5: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000c8d000)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000000101010000000000cbaa2b2c00"/32], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) 17:28:09 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) poll(0x0, 0x0, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x0) r1 = gettid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000080)=""/44, 0xffffffffffffffea, 0x0) r2 = memfd_create(&(0x7f0000000140)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r3 = dup(r2) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r3, &(0x7f0000000000)='\x00', &(0x7f0000000140), 0x0, 0x1000) tkill(r1, 0x18) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) 17:28:09 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x0, "68d13ec239be2d7151159420800f3984a80389386f7f79801ff3b0fa0da9c631"}) [ 227.270798] audit: type=1400 audit(1570901289.345:46): avc: denied { create } for pid=7850 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 17:28:09 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x1a052, r0, 0x80000000) 17:28:09 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000020000ee09, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 227.366344] audit: type=1400 audit(1570901289.375:47): avc: denied { write } for pid=7850 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 17:28:09 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008080)=[{{&(0x7f0000000440)=@l2, 0x80, &(0x7f0000001980)=[{&(0x7f00000004c0)=""/168, 0xa8}, {&(0x7f0000000680)=""/211, 0xd3}, {&(0x7f0000000780)=""/160, 0xa0}, {&(0x7f0000000840)=""/109, 0x6d}, {0x0}, {&(0x7f00000018c0)=""/186, 0xba}], 0x6}}, {{&(0x7f0000001a00)=@isdn, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001a80)=""/112, 0x70}, {&(0x7f0000001b00)=""/175, 0xaf}, {&(0x7f0000001c00)=""/119, 0x77}], 0x3, &(0x7f0000001cc0)=""/4096, 0x1000}}, {{0x0, 0x0, &(0x7f0000003240)=[{0x0}, {0x0}, {&(0x7f0000002ec0)=""/69, 0x45}, {0x0}, {&(0x7f0000003040)=""/110, 0x6e}, {&(0x7f00000030c0)=""/47, 0x2f}, {&(0x7f0000003100)=""/72, 0x48}, {&(0x7f0000003180)=""/135, 0x87}], 0x8, &(0x7f0000003300)=""/10, 0xa}}, {{&(0x7f0000003340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000006640)=[{&(0x7f00000034c0)=""/172, 0xac}, {&(0x7f0000003580)=""/4096, 0x1000}, {&(0x7f0000004580)=""/4096, 0x1000}, {&(0x7f0000005580)}, {0x0}, {&(0x7f00000065c0)=""/65, 0x41}], 0x6, &(0x7f00000066c0)=""/131, 0x83}, 0x5}, {{0x0, 0x0, &(0x7f0000007d00)=[{&(0x7f0000006800)=""/153, 0x99}, {0x0}, {&(0x7f0000006900)=""/86, 0x56}, {0x0}, {&(0x7f0000006a40)=""/137, 0x89}, {&(0x7f0000006b00)=""/4096, 0x1000}, {&(0x7f0000007b00)=""/29, 0x1d}, {&(0x7f0000007b40)=""/219, 0xdb}, {&(0x7f0000007c40)=""/157, 0x9d}], 0x9}}, {{&(0x7f0000007e40)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000007fc0)=[{&(0x7f0000007ec0)=""/203, 0xcb}], 0x1, &(0x7f0000008000)=""/74, 0x4a}, 0x4}], 0x6, 0x55a790a5514c1b73, &(0x7f0000008280)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a5", 0x1, 0xfffffffffffffffb) keyctl$update(0x2, r2, &(0x7f00000000c0)="86", 0x1) 17:28:09 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x1a052, r0, 0x80000000) 17:28:10 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, &(0x7f0000000600)='\b', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x20) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') write$char_usb(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 17:28:10 executing program 5: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) 17:28:10 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x1a052, r0, 0x80000000) 17:28:10 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000b80)) 17:28:10 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pipe2(0x0, 0x84000) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000140)=0x4) creat(0x0, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) epoll_create1(0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket(0x10, 0x0, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r5, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r6, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r6, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 17:28:10 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x10, r0, 0x80000000) [ 228.229186] block nbd5: Receive control failed (result -22) [ 228.237236] block nbd5: shutting down sockets [ 228.276870] block nbd5: shutting down sockets 17:28:10 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 17:28:10 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000000)=""/12) 17:28:10 executing program 5: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x10, 0xfffffffffffffffb}, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 17:28:10 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x10, r0, 0x80000000) 17:28:10 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = dup2(r2, r3) r5 = dup2(r0, r4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00y;\x84\xf0\x00'}) write$P9_RLINK(r5, &(0x7f0000000280)={0x7}, 0x269) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f00000002c0)={0x102e7}) 17:28:10 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x87) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0xe) r2 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5253a966ef325efc, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x4) r3 = dup2(r1, r2) r4 = socket$nl_route(0x10, 0x3, 0x0) write(r4, &(0x7f0000000540)="fc0000001c00071bab0925000900070007ab08000c00000000007e93210001c000000000000000000000000000039915fa2c1ec28670e9889bb94b46fe0000000a0002000a9db1020000000089fd5a444e8526475ef8b29d3ef3d9a48a170e91cf190241ded815018000e5f995eddad775b8b87d94e2ad91bd1d3f2eeb57d47689cd3dd16b00e583df150c3b880f41b258a17c732229d655870271777aa9f70b3ac880ac8035e4af3d00534668f26348ded5b70e33620000000000000000000000000000000800c7d301fb849b4769000000000000000047f87e39a9fe32662c35266f41136d5f0bc4d8010000000000000006000029e39aa4000000000000000000", 0x102) accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x249, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r7 = getpid() fcntl$lock(r5, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r7}) ioctl$RTC_SET_TIME(r6, 0x4024700a, 0x0) listen(r5, 0x200) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) read$char_usb(r8, 0x0, 0x0) r9 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) ioctl$TUNSETGROUP(r8, 0x400454ce, r10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) syz_open_procfs(r7, &(0x7f0000000500)='net/softnet_stat\x00') io_setup(0x2, &(0x7f0000000080)) preadv(r6, &(0x7f00000017c0), 0x1fe, 0x500) write$tun(r3, &(0x7f0000000c80)=ANY=[@ANYRES64=r5, @ANYRES32=0x41424344, @ANYRES64=r1, @ANYBLOB="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"], 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) ioctl$KDSETLED(r5, 0x4b32, 0x7ffd) 17:28:10 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x10, r0, 0x80000000) 17:28:11 executing program 2: syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) dup3(r1, r0, 0x0) [ 228.878247] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.0'. [ 228.901979] device ip6gretap0 entered promiscuous mode 17:28:11 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) close(0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000000)={0x9909cb}) 17:28:11 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x1a052, 0xffffffffffffffff, 0x80000000) 17:28:11 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev={0xfe, 0x80, [], 0x20}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0xfffffffffffffffc}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x20, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) 17:28:11 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) 17:28:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000001c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) mremap(&(0x7f00002be000/0x3000)=nil, 0x3000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) r3 = dup2(r2, r2) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000080), 0xa) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) socket(0x10, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffce9, 0x45, 0x0, 0x0) madvise(&(0x7f00000f3000/0x1000)=nil, 0x1000, 0x0) ioprio_get$uid(0x3, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x0) readahead(0xffffffffffffffff, 0x7fffffff, 0x0) 17:28:11 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x1a052, 0xffffffffffffffff, 0x80000000) [ 229.266429] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.0'. 17:28:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000000)="2e00000018008109e00f80ecdb4cb92e0a60042c000cd302e8bd6efb120009000e0014a00200000006000500fec0", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 17:28:11 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x1a052, 0xffffffffffffffff, 0x80000000) 17:28:11 executing program 2: getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000100)='security.capability\x00', 0x0, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000480), 0xffffffffffffff39, 0x0, 0x0, 0x150) shutdown(r0, 0x400000000000001) socket$nl_route(0x10, 0x3, 0x0) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x4e, 0x3e6, 0x0, 0x1}) socket(0x2, 0x0, 0x0) 17:28:11 executing program 5: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 17:28:11 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) inotify_init1(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) socket$inet6(0xa, 0x3, 0x84) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) fallocate(r0, 0x0, 0x0, 0x84003ff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = socket$bt_rfcomm(0x1f, 0x2, 0x3) r5 = syz_genetlink_get_family_id$team(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) r6 = syz_open_procfs(0x0, 0x0) sendfile(r6, r6, &(0x7f00000002c0)=0x202, 0x0) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) r7 = socket(0x0, 0x0, 0x0) sendmmsg$alg(r7, 0x0, 0x0, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(r9, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) r10 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r10, 0x107, 0x1, &(0x7f0000000100)={r11, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r10, 0x107, 0x1, &(0x7f0000000080)={r11, 0x1, 0x6, @remote}, 0x10) r12 = socket(0x100000000011, 0x2, 0x0) bind(r12, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r12, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r10, 0x107, 0x2, &(0x7f0000000000)={r13, 0x1, 0x6, @remote}, 0x10) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000300)={@local, 0x7, r13}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000840)={0x0, @local, @multicast2}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000008c0)={@local}, &(0x7f0000000900)=0x14) r14 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r14, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) pipe(&(0x7f0000000280)) r15 = socket$inet6(0xa, 0x3, 0x3a) r16 = open(0x0, 0x8001141042, 0x0) sendfile(r15, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r16, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) r17 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r17, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x400, 0x0, 0x1, 0x3}, 0x20) r18 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r18, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) sendto$inet6(r18, 0x0, 0x0, 0x0, 0x0, 0x0) r19 = fcntl$dupfd(r18, 0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(r19, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x20, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) getpeername$packet(r19, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r17, 0x8916, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x2000}, 0x4000000) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000a000}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES16=r5], 0x2}, 0x1, 0x0, 0x0, 0x8000}, 0x801) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) getsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) dup(0xffffffffffffffff) 17:28:11 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x1a052, r0, 0x0) [ 229.715301] IPv6: Can't replace route, no match found [ 229.760962] audit: type=1400 audit(1570901291.835:48): avc: denied { write } for pid=8013 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 229.798353] protocol 88fb is buggy, dev hsr_slave_0 [ 229.803473] protocol 88fb is buggy, dev hsr_slave_1 17:28:11 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x404e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x20) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 17:28:11 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x1a052, r0, 0x0) [ 229.852946] audit: type=1400 audit(1570901291.925:49): avc: denied { read } for pid=8013 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 229.888372] protocol 88fb is buggy, dev hsr_slave_0 [ 229.893509] protocol 88fb is buggy, dev hsr_slave_1 17:28:12 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7e", 0x3f) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 17:28:12 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, 0x0, 0x0) [ 229.913304] device lo entered promiscuous mode 17:28:12 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000014c0)='\x00', 0x2000, 0x48) memfd_create(0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000001600)='NET_DM\x00') r1 = socket$inet6(0xa, 0x3, 0x7) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000000), &(0x7f00000012c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x8122084}, 0xc, &(0x7f0000001300)={&(0x7f0000001400)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0xffd8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x2, 0x8, 0x8, 0x0, 0x0, 0x4011, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x18000000, 0x800}, 0x11647b79bea33e6d, 0x0, 0x6, 0x5, 0xcc, 0xb0e3, 0xff}, r4, 0x8, 0xffffffffffffffff, 0x2) fallocate(r0, 0x0, 0x4004, 0x84003ff) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000240), 0x5c3, 0x0) 17:28:12 executing program 4: msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000000)={0x9909cb}) 17:28:12 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x1a052, r0, 0x0) [ 230.083698] audit: type=1800 audit(1570901292.135:50): pid=8050 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16583 res=0 [ 230.118373] protocol 88fb is buggy, dev hsr_slave_0 [ 230.123531] protocol 88fb is buggy, dev hsr_slave_1 17:28:12 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000180)) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x4f10b02ad3eb3d7b, 0x1, 0x1f}, &(0x7f0000000140)=0x10) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) connect$l2tp(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x2, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x3a) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) open(0x0, 0x141042, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) chdir(&(0x7f00000005c0)='./file0\x00') ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000380)) socket$netlink(0x10, 0x3, 0x1) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 230.168114] audit: type=1804 audit(1570901292.235:51): pid=8059 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir837781222/syzkaller.r7cpow/14/file0" dev="sda1" ino=16585 res=1 17:28:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140)}, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:28:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=@newqdisc={0x44, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14}]}}]}, 0x44}}, 0x0) [ 230.249446] device lo left promiscuous mode [ 230.350075] audit: type=1804 audit(1570901292.425:52): pid=8076 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir837781222/syzkaller.r7cpow/14/file0" dev="sda1" ino=16585 res=1 [ 230.437978] device lo entered promiscuous mode [ 230.499913] device lo left promiscuous mode 17:28:12 executing program 5: r0 = open(&(0x7f0000000700)='./bus\x00', 0x8143242, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x105082) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) fcntl$setstatus(r0, 0x4, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0x526987c9) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r1, r0, 0x0, 0x80005) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") 17:28:12 executing program 1: bind$alg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000000)={0x9909cb}) syz_open_dev$dri(0x0, 0x0, 0x0) 17:28:12 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet(0x2, 0x0, 0x0) accept4$inet(r0, 0x0, 0x0, 0x0) 17:28:12 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000100)='net/unix\x00') setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000280), 0x4) socket$key(0xf, 0x3, 0x2) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 17:28:12 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$assume_authority(0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) dup3(r1, r0, 0x0) [ 230.568110] audit: type=1804 audit(1570901292.635:53): pid=8068 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir033031520/syzkaller.o3u9wc/17/bus" dev="sda1" ino=16580 res=1 17:28:12 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) inotify_init1(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) socket$inet6(0xa, 0x3, 0x84) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) fallocate(r0, 0x0, 0x0, 0x84003ff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = socket$bt_rfcomm(0x1f, 0x2, 0x3) r5 = syz_genetlink_get_family_id$team(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) r6 = syz_open_procfs(0x0, 0x0) sendfile(r6, r6, &(0x7f00000002c0)=0x202, 0x0) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) r7 = socket(0x0, 0x0, 0x0) sendmmsg$alg(r7, 0x0, 0x0, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(r9, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) r10 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r10, 0x107, 0x1, &(0x7f0000000100)={r11, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r10, 0x107, 0x1, &(0x7f0000000080)={r11, 0x1, 0x6, @remote}, 0x10) r12 = socket(0x100000000011, 0x2, 0x0) bind(r12, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r12, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r10, 0x107, 0x2, &(0x7f0000000000)={r13, 0x1, 0x6, @remote}, 0x10) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000300)={@local, 0x7, r13}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000840)={0x0, @local, @multicast2}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000008c0)={@local}, &(0x7f0000000900)=0x14) r14 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r14, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) pipe(&(0x7f0000000280)) r15 = socket$inet6(0xa, 0x3, 0x3a) r16 = open(0x0, 0x8001141042, 0x0) sendfile(r15, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r16, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) r17 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r17, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x400, 0x0, 0x1, 0x3}, 0x20) r18 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r18, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) sendto$inet6(r18, 0x0, 0x0, 0x0, 0x0, 0x0) r19 = fcntl$dupfd(r18, 0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(r19, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x20, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) getpeername$packet(r19, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r17, 0x8916, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x2000}, 0x4000000) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000a000}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES16=r5], 0x2}, 0x1, 0x0, 0x0, 0x8000}, 0x801) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) getsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) dup(0xffffffffffffffff) 17:28:12 executing program 1: [ 230.680566] audit: type=1400 audit(1570901292.745:54): avc: denied { map } for pid=8090 comm="syz-executor.5" path="/dev/loop0" dev="devtmpfs" ino=28523 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 17:28:12 executing program 1: 17:28:12 executing program 0: 17:28:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030e00000000000008001b00000000006427cc5662a593983b9e51275069096df5ab6e415d9fb0d3f69f2b06429977338860f7cefaea1d25cef6db"], 0x28}}, 0x0) [ 230.838374] protocol 88fb is buggy, dev hsr_slave_0 [ 230.843556] protocol 88fb is buggy, dev hsr_slave_1 17:28:13 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000001100)={@mcast1}, 0x0) 17:28:13 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pipe2(0x0, 0x84000) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000140)=0x4) creat(0x0, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f0000000180)={0x10000, 0x2}) creat(&(0x7f0000000040)='./bus\x00', 0x0) epoll_create1(0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket(0x10, 0x0, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) [ 230.980268] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 230.997295] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 231.048933] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 231.064753] device lo entered promiscuous mode [ 231.269209] device lo left promiscuous mode 17:28:13 executing program 5: 17:28:13 executing program 0: 17:28:13 executing program 1: 17:28:13 executing program 2: 17:28:13 executing program 4: 17:28:13 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) inotify_init1(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) socket$inet6(0xa, 0x3, 0x84) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) fallocate(r0, 0x0, 0x0, 0x84003ff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = socket$bt_rfcomm(0x1f, 0x2, 0x3) r5 = syz_genetlink_get_family_id$team(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) r6 = syz_open_procfs(0x0, 0x0) sendfile(r6, r6, &(0x7f00000002c0)=0x202, 0x0) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) r7 = socket(0x0, 0x0, 0x0) sendmmsg$alg(r7, 0x0, 0x0, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(r9, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) r10 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r10, 0x107, 0x1, &(0x7f0000000100)={r11, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r10, 0x107, 0x1, &(0x7f0000000080)={r11, 0x1, 0x6, @remote}, 0x10) r12 = socket(0x100000000011, 0x2, 0x0) bind(r12, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r12, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r10, 0x107, 0x2, &(0x7f0000000000)={r13, 0x1, 0x6, @remote}, 0x10) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000300)={@local, 0x7, r13}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000840)={0x0, @local, @multicast2}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000008c0)={@local}, &(0x7f0000000900)=0x14) r14 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r14, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) pipe(&(0x7f0000000280)) r15 = socket$inet6(0xa, 0x3, 0x3a) r16 = open(0x0, 0x8001141042, 0x0) sendfile(r15, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r16, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) r17 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r17, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x400, 0x0, 0x1, 0x3}, 0x20) r18 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r18, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) sendto$inet6(r18, 0x0, 0x0, 0x0, 0x0, 0x0) r19 = fcntl$dupfd(r18, 0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(r19, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x20, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) getpeername$packet(r19, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r17, 0x8916, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x2000}, 0x4000000) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000a000}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES16=r5], 0x2}, 0x1, 0x0, 0x0, 0x8000}, 0x801) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) getsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) dup(0xffffffffffffffff) 17:28:13 executing program 1: 17:28:13 executing program 2: 17:28:13 executing program 0: 17:28:13 executing program 4: 17:28:13 executing program 5: 17:28:13 executing program 0: 17:28:13 executing program 2: 17:28:13 executing program 1: 17:28:13 executing program 4: [ 231.727671] device lo entered promiscuous mode 17:28:13 executing program 5: 17:28:13 executing program 0: [ 231.878569] protocol 88fb is buggy, dev hsr_slave_0 [ 231.928732] device lo left promiscuous mode 17:28:14 executing program 3: 17:28:14 executing program 2: 17:28:14 executing program 1: 17:28:14 executing program 4: 17:28:14 executing program 0: 17:28:14 executing program 5: 17:28:14 executing program 2: 17:28:14 executing program 4: 17:28:14 executing program 5: 17:28:14 executing program 0: 17:28:14 executing program 1: 17:28:14 executing program 3: 17:28:14 executing program 2: 17:28:14 executing program 1: 17:28:14 executing program 4: 17:28:14 executing program 0: 17:28:14 executing program 5: 17:28:14 executing program 2: 17:28:14 executing program 3: 17:28:14 executing program 4: 17:28:14 executing program 1: 17:28:14 executing program 0: 17:28:14 executing program 5: 17:28:14 executing program 3: 17:28:14 executing program 2: 17:28:14 executing program 1: 17:28:14 executing program 4: 17:28:14 executing program 0: 17:28:14 executing program 2: 17:28:14 executing program 5: 17:28:14 executing program 3: 17:28:14 executing program 1: 17:28:14 executing program 4: 17:28:14 executing program 2: 17:28:14 executing program 5: 17:28:14 executing program 0: 17:28:14 executing program 3: 17:28:14 executing program 1: 17:28:14 executing program 4: 17:28:14 executing program 5: 17:28:14 executing program 0: 17:28:14 executing program 2: 17:28:14 executing program 1: 17:28:14 executing program 4: 17:28:15 executing program 5: 17:28:15 executing program 3: 17:28:15 executing program 2: 17:28:15 executing program 0: 17:28:15 executing program 4: 17:28:15 executing program 1: 17:28:15 executing program 0: 17:28:15 executing program 5: 17:28:15 executing program 3: 17:28:15 executing program 2: 17:28:15 executing program 4: 17:28:15 executing program 1: 17:28:15 executing program 0: 17:28:15 executing program 5: 17:28:15 executing program 4: 17:28:15 executing program 1: 17:28:15 executing program 2: 17:28:15 executing program 3: 17:28:15 executing program 0: 17:28:15 executing program 5: 17:28:15 executing program 4: 17:28:15 executing program 1: 17:28:15 executing program 2: 17:28:15 executing program 3: 17:28:15 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 17:28:15 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff"]) 17:28:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 17:28:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0xe6, 0x2, 0x0, 0x8, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 17:28:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000300000000000000000080009500000000000000fd4950056be7a0194e678f243e84cd15a5f4971a2d61a1a23f90bde80feca76e235e979957da8bd659d1819fe6f6ceca6fae872fc09e661c4d2cfc1dc648f3dbdaf10edace1b69bd2bab38eeac5dcd497799d6e21846f233bff8d4598cc85d4805ffcbe4a0d349fb25bd0cdb357a35d98ca63864800371748d8905cff61da5e103366bea5b60f577336cc8b75e0abe8d8db20730ce318baa195c0311"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$rds(r2, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1}, 0x0) recvmmsg(r2, &(0x7f0000001b80)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 17:28:15 executing program 3: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d46", 0x9) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 17:28:15 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) creat(0x0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000100)=0x8) 17:28:15 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) getegid() chown(&(0x7f0000000140)='./file0\x00', r1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) chown(&(0x7f0000000140)='./file0\x00', r2, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000140)=[0x0, r4, 0x0, 0x0]) getgroups(0x4, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0]) getgroups(0x4, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0]) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r8, 0x29, 0x1000000000021, 0x0, 0x0) fstat(r8, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, 0x0, r9) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000140)=[0x0, r10, 0x0, 0x0]) setxattr$system_posix_acl(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, &(0x7f0000000540)={{}, {0x1, 0x5}, [{0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x9d0bd1b958fe0fc1, r1}, {0x2, 0x4, r2}, {0x2, 0x70d49be69e9a9b31, r3}], {0x4, 0x1}, [{0x8, 0x4, r4}, {0x8, 0x8}, {0x8, 0x7}, {0x8, 0x1, r5}, {0x8, 0x6, r6}, {0x8, 0x1, r7}, {0x8, 0x3, r10}], {0x10, 0x2}}, 0x7c, 0x2) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:28:15 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev={0xfe, 0x80, [], 0x20}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0xfffffffffffffffc}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x20, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 233.714991] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:28:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@bridge_getneigh={0x20, 0x1e, 0x201}, 0x20}}, 0x0) 17:28:15 executing program 3: syz_emit_ethernet(0x6e, &(0x7f0000000340)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x3a, 0x0, @empty, @mcast2, [], "0280000000000000"}}}}}}}, 0x0) 17:28:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="4c0000001200ff09fffefd9567a283b724a600800000000000000068354046002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca63d89613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 17:28:16 executing program 2: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@map_acorn='map=acorn'}]}) 17:28:16 executing program 5: syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x300cce, &(0x7f0000000080)={@local, @empty, [{}], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300003, 0x0, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x0, 0xe80, 0x0, 0xe80], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0x3c, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 17:28:16 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x8d}, 0x28240}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x320f) openat(r1, &(0x7f0000000140)='./file0\x00', 0x301, 0x45) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000540)) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4004, 0x0) seccomp(0x1, 0x0, 0x0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f00000004c0)={0x3, 0x3, 0x3, 0x10000, 0x8, 0x9}) openat(r2, &(0x7f0000000040)='./file0\x00', 0x8000, 0x1) mkdir(&(0x7f0000000580)='./file0\x00', 0x8) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x8000, 0x0) ioctl$PPPIOCATTCHAN(r3, 0x40047438, &(0x7f0000000640)=0x1) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000005c0)='TRUE', 0x4, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) chdir(&(0x7f0000000380)='./file0\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000040)=0x1, 0xfe18) getrusage(0x0, &(0x7f00000009c0)) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_opts(r4, 0x29, 0x3b, &(0x7f0000000a80)=ANY=[@ANYBLOB="621f00690501db4a2ad8f83f88338eefce000000000081f7f6ac3c4757da1e8e3db69a9356c64e25dc26d8f3fd528d72b9a292bc879667d0168de48485242bf87b6edf4eed0b0100e18d79bcd5e741c6442bb66cab1e3e566e79dc80e49efd4a56691b66b8bb81bd665991fd4f5e9297d7d6d4b61e1319f4d9c11322c6b33aa29a75be4d1cfdf7ef3f9b26ead83d68f24bea4686dfc88d864804e3e27dcf61827ab1cb6f23cccd868185d938e1bdfb8bf8c2d895d5801ddc79a56109704eb860f120599ea356d5c8edd693a3309fe292702653649ae12664995e29bcfcaeb70c2b10879d023da8e125e99537651ff56be013b003924e85ca38a48f703dc82174488cd4d49afc10e8eb5800000000000000b10f30b78ea6891befa14c55d889963c3c1f9d6ce1c9000000000000000000000000000000000000000000000007473c7def0d985316efb5f1572a83540888c40b5492e0a2282741612c6e447c7a01e237571d8a9209d7eadf1c0fd234fa6fe019746dfa79193958a20565c16a2a6395d29c915164a1da995b28c115cb7dc3123cfe0dc157197473abba1b8500000000000000baa231b622c23b94931e3975c2dc1fe88b6354122c09c2410d1f1962c6ba1b7434a146295ae13d9c1ea0116602717b3c1da011b85426148eabc71598779efc1500cc354c2bf60fe0dff1bea8b6370e2700"/515], 0x108) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000000), 0x4) r5 = eventfd2(0x0, 0x0) dup(r5) vmsplice(r5, &(0x7f00000001c0), 0x1000000000000122, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xd7a, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x10000, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) rmdir(&(0x7f0000000100)='./file0\x00') [ 234.058389] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 234.111728] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 234.151590] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 234.198147] audit: type=1400 audit(1570901296.265:55): avc: denied { map } for pid=8334 comm="syz-executor.5" path="/dev/nullb0" dev="devtmpfs" ino=16476 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=blk_file permissive=1 [ 234.233387] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 234.369281] syz-executor.5 (8335) used greatest stack depth: 22848 bytes left 17:28:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) fcntl$setstatus(r0, 0x4, 0x2800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffeffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000003040), 0x400000000000037, 0x0) 17:28:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@bridge_getneigh={0x20, 0x1e, 0x201, 0x0, 0x0, {0x7, 0x0, 0x0, r2}}, 0x20}}, 0x0) 17:28:16 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x17, 0x10052, r0, 0x80000000) 17:28:16 executing program 3: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 17:28:16 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x4) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffceb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x2, 0x1000000000000002, 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0xe8842, 0x2) write$P9_RSTATu(r4, &(0x7f0000000100)=ANY=[@ANYRESDEC, @ANYRESOCT], 0x2b) sendfile(r3, r4, 0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x6}}, 0xe) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), &(0x7f0000000340)=0xffa7) r6 = socket(0x1000000010, 0x400000400080803, 0x0) dup(r6) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000080)={0x8, 0x35, 0x2}, 0x8) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) 17:28:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a218211f663a7724bdef64346ff14b7b0ffffffff00000000abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffff0f000000000000ffffffff8756ea7d48658827b74cc99580c9bbef0702107ea62169f8b97a746f2a0773f75492420cb6aa58f099abd0a2d70eab2b15ffa875ab2f509d59a7514cf13c435f11f99a0d5f233a108e77d93114d909748c2b045de6db63c035acc6d8b333a8f941a8973d27b0619bdb54bd55ead304102adee0f295b9bd0806"], 0xba) r2 = socket(0x10, 0x0, 0x0) sendto(r2, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40), 0x0, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r4, 0x8}}, 0x10) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) r5 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x80) getsockopt$bt_l2cap_L2CAP_CONNINFO(r5, 0x6, 0x2, &(0x7f0000000180), &(0x7f0000000240)=0x6) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 17:28:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x27) fcntl$setstatus(r0, 0x4, 0x427ff) 17:28:16 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write(r0, &(0x7f00000001c0)="ee0107200c9f8fbf5ca312794d57d7c84858f6d02ac7044478a1ceaba80c756a581354e1", 0x24) openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x10000, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) pipe2(0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) 17:28:16 executing program 1: r0 = gettid() perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x10000, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r2, 0x208200) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000040)={0x401, 0x10001, 0x8000, 0x7, 0x8, 0x63}) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0xfe) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4000000000002a5, 0x4008000) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 17:28:16 executing program 2: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) pipe2(0x0, 0x84000) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000140)=0x4) creat(0x0, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f0000000180)={0x10000, 0x2}) creat(&(0x7f0000000040)='./bus\x00', 0x0) epoll_create1(0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket(0x10, 0x0, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r5, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r6, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r6, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 17:28:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000580), &(0x7f0000000680), 0x2}, 0x19e) [ 234.756824] ptrace attach of "/root/syz-executor.4"[8386] was attempted by "/root/syz-executor.4"[8387] 17:28:16 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000340)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x3a, 0x0, @empty, @mcast2}}}}}}}, 0x0) 17:28:17 executing program 3: r0 = socket(0x2, 0x3, 0x0) r1 = socket$inet(0x2, 0x10000002, 0x0) dup2(r1, r0) setsockopt$sock_int(r0, 0xffff, 0x100a, 0x0, 0x0) 17:28:17 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000140)=[0x6fb, 0x8]) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x300cce, &(0x7f0000000080)={@local, @empty, [{}], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300003, 0x0, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x0, 0xe80, 0x0, 0xe80], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0x3c, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='wlan0\x00', r2}, 0x10) write$UHID_INPUT2(r2, &(0x7f0000000100), 0x6) 17:28:17 executing program 2: socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4}}, {{@in=@multicast2}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x5}}, 0xe8) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x223e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/21, 0x15}], 0x10000000000000ca, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000080), 0x5b) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x218) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000000c0)=@v2={0x2, @adiantum, 0x2, [], "d6bf4bbf7a3ea51c5f1bd7c90145f053"}) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) unshare(0x0) 17:28:17 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={@local}) 17:28:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) prlimit64(r0, 0x0, &(0x7f0000001200), 0x0) 17:28:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) socket$isdn(0x22, 0x3, 0x24) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x54833, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0x6000000, 0x0, 0x0, 0x0) 17:28:17 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={@local, 0x0, r2}) [ 235.678017] audit: type=1400 audit(1570901297.745:56): avc: denied { map } for pid=8435 comm="syz-executor.0" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=30260 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 17:28:17 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) clone(0x20986100, 0x0, 0x0, 0x0, &(0x7f0000000100)="d353ff072d68b2e4dc14aa5fa8b3d94c22") 17:28:17 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x40) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket(0x840000000002, 0x3, 0x200000000000ff) sendmmsg$inet(r4, &(0x7f0000002dc0)=[{{&(0x7f0000000300), 0x10, 0x0}}], 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(0x0, 0x0) io_setup(0x8, &(0x7f00000004c0)=0x0) io_submit(r6, 0xc2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = getpid() ptrace(0x10, r7) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r8 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r8, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x100000000) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$netlink(r9, &(0x7f0000002c40)={&(0x7f0000000400)=@kern={0x10, 0x0, 0x0, 0x40000208}, 0xc, 0x0}, 0x48042) ioctl$DRM_IOCTL_AGP_ALLOC(r9, 0xc0206434, &(0x7f0000000100)={0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_AGP_BIND(r8, 0x40106436, &(0x7f0000000180)={r10, 0x4}) 17:28:17 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000000300)="01f14d8254660aef550c8096387ded0d0100ed24a506362bc80798bc67189a1e1464a3873802a13832f9170ee70102cd8b1326c772f023649364df6d7321232d0d09d7c6ab45b59014feac546badc86036ecbf33127b8628b574705dc461a79a1e0fd6db41240f9c7e83a97e79740de3b7f2d6b22c006dafe1a0897ebe4d5121d5253876111881eac697474e10a8accbaef05bf07ce61570858ab4039196e7e061332b347366f1f992f77973f59ab367b8be498ea25d357873dbd2718aef7ac7d5b5a847a66f536d1976ef04fdf5ad51465c43984d583ed49db1121c8e895af9", 0x2ed) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492191, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000100)={r4}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x4f10b02ad3eb3d7b, 0x1, 0x1f, r4}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000180)={r6, 0x8, 0xff24, 0x0, 0x9, 0x6}, &(0x7f0000000200)=0x14) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x80000, 0x0) connect$l2tp(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x2, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x3a) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, 0x0) r8 = open(0x0, 0x141042, 0x0) ioctl$KDSKBMODE(r8, 0x4b45, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r7, 0x4c80, 0x0) chdir(&(0x7f00000005c0)='./file0\x00') ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000380)) socket$netlink(0x10, 0x3, 0x1) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) socket(0x18, 0x0, 0x0) 17:28:17 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a99d58d2267958d4c5320b836f26e80fff0f48bb7a9dbe30fcc0ee3c0d19fc464240758595e7eb33de379d54b1bb38a0e4a0f889ec0c3fba40525614e260a798c62e2171b48742723f0000cde52e8a2eeadce33f9d6de553764b2dc37cd776ae9bc72c0b81fe59309fd1ad681f592a81fc06e67513252392cd38fb", 0x86) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 17:28:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a218211f663a7724bdef64346ff14b7b0ffffffff00000000abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffff0f000000000000ffffffff8756ea7d48658827b74cc99580c9bbef0702107ea62169f8b97a746f2a0773f75492420cb6aa58f099abd0a2d70eab2b15ffa875ab2f509d59a7514cf1"], 0x7e) r2 = socket(0x10, 0x0, 0x0) sendto(r2, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40), 0x0, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r4}}, 0x48) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0xf, 0x8080fffffffe) r5 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r5, 0x6, 0x2, &(0x7f0000000180), &(0x7f0000000240)=0x6) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000040)={0x9, 0xff, 0x80000001, 0x0, 0x8, 0x2}) 17:28:18 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000180)) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x0, 0x1, 0x1f}, &(0x7f0000000140)=0x10) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x80000, 0x0) connect$l2tp(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x2, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x3a) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) chdir(&(0x7f00000005c0)='./file0\x00') socket$netlink(0x10, 0x3, 0x1) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 235.905754] syz-executor.1 (8422) used greatest stack depth: 22048 bytes left 17:28:18 executing program 3: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) pipe2(0x0, 0x84000) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000140)=0x4) creat(0x0, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f0000000180)={0x0, 0x2}) creat(&(0x7f0000000040)='./bus\x00', 0x0) epoll_create1(0x0) socket$alg(0x26, 0x5, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) shutdown(0xffffffffffffffff, 0x0) 17:28:18 executing program 0: clone(0x80006b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x2d8, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, r0, 0x0, 0x0) 17:28:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002, 0x5, @ipv4={[], [], @empty}}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$bt_rfcomm(0x1f, 0x3, 0x3) fcntl$setstatus(r1, 0x4, 0x400) bind$inet(0xffffffffffffffff, 0x0, 0xfe9a) syz_genetlink_get_family_id$ipvs(0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x927473de48b25a65}, 0x8c5) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netstat\x00') preadv(r4, 0x0, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0, 0xf00) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000140)={0xa, 0x2}, 0x1c) socket(0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0xfffffffffffffff, 0x0) inotify_init1(0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f00000000c0), 0xfffffffffffffd4d, 0x1, 0x0, 0x44) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 17:28:18 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(r0, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) readv(r1, &(0x7f00000002c0), 0x1aa) 17:28:18 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b1a, &(0x7f0000000080)='wlan1\x00') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:28:18 executing program 1: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x20, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 17:28:18 executing program 5: r0 = socket(0x1, 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x318) r1 = gettid() setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000340)) connect$unix(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0xd7523e05c10df104) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0xa0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) arch_prctl$ARCH_GET_FS(0x1003, 0x0) tkill(r1, 0x1000000000016) 17:28:18 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000100)='security.capability\x00', 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpriority(0x2, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000480), 0xffffffffffffff39, 0x0, 0x0, 0x150) shutdown(r0, 0x400000000000001) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000006c0)=@nat={'nat\x00', 0x19, 0x5, 0x0, [0x20001cc0, 0x0, 0x0, 0x20001dce, 0x2000218a], 0x0, &(0x7f0000000200), 0x0}, 0x886) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, &(0x7f0000000000)={'ip6_vti0\x00', @ifru_data=0x0}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x4e, 0x3e6, 0x0, 0x1}) socket(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) 17:28:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000000c0)=ANY=[@ANYBLOB="1f000000000000000000004005008f7c0000e7fc4b83bbb6a23b4b6942b7871001000000000000002560b700ffd31b9fe8aaf0a1"]) 17:28:19 executing program 5: ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x12e) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0xfffffffffffffffc}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 17:28:19 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) socket$inet6(0xa, 0x0, 0x3) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x0) 17:28:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = eventfd2(0x0, 0x0) io_setup(0x3, &(0x7f00000001c0)=0x0) io_submit(r2, 0x2, &(0x7f0000000440)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x4, 0x0, 0x5, r1}]) 17:28:19 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d", 0x8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 17:28:19 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(r0, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) readv(r1, &(0x7f00000002c0), 0x1aa) 17:28:19 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x300cce, &(0x7f0000000080)={@local, @empty, [{}], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300003, 0x0, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x0, 0xe80, 0x0, 0xe80], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0x3c, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) fchdir(0xffffffffffffffff) 17:28:19 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(r0, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) readv(r1, &(0x7f00000002c0), 0x1aa) 17:28:19 executing program 3: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x10}, 0x0) pipe2(0x0, 0x84000) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000140)=0x4) creat(0x0, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f0000000180)={0x10000, 0x2}) creat(&(0x7f0000000040)='./bus\x00', 0x0) epoll_create1(0x0) socket(0x10, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) 17:28:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002, 0x5, @ipv4={[], [], @empty}}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$bt_rfcomm(0x1f, 0x3, 0x3) fcntl$setstatus(r1, 0x4, 0x400) bind$inet(0xffffffffffffffff, 0x0, 0xfe9a) syz_genetlink_get_family_id$ipvs(0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x927473de48b25a65}, 0x8c5) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netstat\x00') preadv(r4, 0x0, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0, 0xf00) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000140)={0xa, 0x2}, 0x1c) socket(0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0xfffffffffffffff, 0x0) inotify_init1(0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f00000000c0), 0xfffffffffffffd4d, 0x1, 0x0, 0x44) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 17:28:19 executing program 4: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x71, 0x0) 17:28:19 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(r0, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) readv(r1, &(0x7f00000002c0), 0x1aa) 17:28:20 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x10, 0xfffffffffffffffb}, 0x0) pipe2(0x0, 0x84000) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000140)=0x4) creat(0x0, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) epoll_create1(0x0) socket$alg(0x26, 0x5, 0x0) socket(0x10, 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) shutdown(0xffffffffffffffff, 0x0) 17:28:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x8, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000003c0), 0x3}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:28:20 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000580), &(0x7f0000000680), 0x2}, 0x19e) 17:28:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="4c0000001200ff09fffefd9567a283b724a600800000000000000068354046002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca63d89613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 17:28:20 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000580), &(0x7f0000000680)}, 0x20) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 17:28:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:28:20 executing program 0: syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x2000000000011, r0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 17:28:20 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xb563}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(r0, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) readv(r1, &(0x7f00000002c0), 0x1aa) [ 238.536253] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 17:28:20 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) accept(r0, 0x0, 0x0) [ 238.717943] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 17:28:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002, 0x5, @ipv4={[], [], @empty}}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$bt_rfcomm(0x1f, 0x3, 0x3) fcntl$setstatus(r1, 0x4, 0x400) bind$inet(0xffffffffffffffff, 0x0, 0xfe9a) syz_genetlink_get_family_id$ipvs(0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x927473de48b25a65}, 0x8c5) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netstat\x00') preadv(r4, 0x0, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0, 0xf00) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000140)={0xa, 0x2}, 0x1c) socket(0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0xfffffffffffffff, 0x0) inotify_init1(0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f00000000c0), 0xfffffffffffffd4d, 0x1, 0x0, 0x44) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 17:28:20 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xb563}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(r0, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) readv(r1, &(0x7f00000002c0), 0x1aa) 17:28:20 executing program 3: 17:28:20 executing program 1: [ 238.791618] netlink: 'syz-executor.5': attribute type 29 has an invalid length. [ 238.804118] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 17:28:20 executing program 3: 17:28:20 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x17, 0x10052, r0, 0x80000000) 17:28:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) bind$ax25(r1, &(0x7f00000001c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 17:28:21 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) madvise(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x4) 17:28:21 executing program 4: 17:28:21 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x17, 0x10052, r0, 0x80000000) 17:28:21 executing program 3: [ 239.019466] audit: type=1400 audit(1570901301.095:57): avc: denied { map } for pid=8658 comm="syz-executor.3" path="pipe:[30591]" dev="pipefs" ino=30591 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 17:28:21 executing program 0: 17:28:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002, 0x5, @ipv4={[], [], @empty}}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$bt_rfcomm(0x1f, 0x3, 0x3) fcntl$setstatus(r1, 0x4, 0x400) bind$inet(0xffffffffffffffff, 0x0, 0xfe9a) syz_genetlink_get_family_id$ipvs(0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x927473de48b25a65}, 0x8c5) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netstat\x00') preadv(r4, 0x0, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0, 0xf00) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000140)={0xa, 0x2}, 0x1c) socket(0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0xfffffffffffffff, 0x0) inotify_init1(0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f00000000c0), 0xfffffffffffffd4d, 0x1, 0x0, 0x44) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 17:28:21 executing program 4: 17:28:21 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x17, 0x10052, r0, 0x80000000) 17:28:21 executing program 3: 17:28:21 executing program 5: 17:28:21 executing program 0: 17:28:21 executing program 5: 17:28:21 executing program 3: 17:28:21 executing program 4: 17:28:21 executing program 0: 17:28:21 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x17, 0x10052, r0, 0x80000000) 17:28:21 executing program 5: 17:28:22 executing program 2: 17:28:22 executing program 4: 17:28:22 executing program 3: 17:28:22 executing program 1: mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x17, 0x10052, 0xffffffffffffffff, 0x80000000) 17:28:22 executing program 0: 17:28:22 executing program 5: 17:28:22 executing program 3: 17:28:22 executing program 0: 17:28:22 executing program 5: 17:28:22 executing program 4: 17:28:22 executing program 1: mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x17, 0x10052, 0xffffffffffffffff, 0x80000000) 17:28:22 executing program 2: 17:28:22 executing program 3: 17:28:22 executing program 5: 17:28:22 executing program 1: mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x17, 0x10052, 0xffffffffffffffff, 0x80000000) 17:28:22 executing program 0: 17:28:22 executing program 4: 17:28:22 executing program 2: 17:28:22 executing program 1: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x17, 0x10052, r0, 0x80000000) 17:28:23 executing program 3: 17:28:23 executing program 4: 17:28:23 executing program 5: 17:28:23 executing program 0: 17:28:23 executing program 4: 17:28:23 executing program 2: 17:28:23 executing program 1: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x17, 0x10052, r0, 0x80000000) 17:28:23 executing program 3: 17:28:23 executing program 5: 17:28:23 executing program 0: 17:28:23 executing program 1: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x17, 0x10052, r0, 0x80000000) 17:28:23 executing program 3: 17:28:23 executing program 2: 17:28:23 executing program 5: 17:28:23 executing program 4: 17:28:23 executing program 0: 17:28:23 executing program 5: 17:28:23 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) r1 = getegid() chown(&(0x7f0000000140)='./file0\x00', 0x0, r1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) r3 = getegid() chown(&(0x7f0000000140)='./file0\x00', r2, r3) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000100), 0x195) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000140)=[0x0, r5, 0x0, 0x0]) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)) getgroups(0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000140)=[r6, 0x0, 0x0]) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)) getgroups(0x0, 0x0) fstat(r0, 0x0) fstat(r0, &(0x7f0000000380)) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, &(0x7f0000000540)={{}, {0x1, 0x5}, [{0x2, 0x9d0bd1b958fe0fc1}, {0x2, 0x4, r2}, {0x2, 0x70d49be69e9a9b31, r4}], {0x4, 0x1}, [{0x8, 0x4, r5}, {0x8, 0x7}, {0x8, 0x6}, {0x8, 0x3}, {0x8, 0x3, r7}], {0x10, 0x2}}, 0x64, 0x2) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:28:23 executing program 3: 17:28:23 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x0, 0x10052, r0, 0x80000000) 17:28:23 executing program 4: 17:28:23 executing program 0: 17:28:23 executing program 4: 17:28:23 executing program 5: 17:28:23 executing program 3: 17:28:23 executing program 0: 17:28:23 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x0, 0x10052, r0, 0x80000000) 17:28:23 executing program 4: 17:28:23 executing program 5: 17:28:23 executing program 0: 17:28:23 executing program 3: 17:28:23 executing program 4: 17:28:23 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x0, 0x10052, r0, 0x80000000) 17:28:23 executing program 2: 17:28:23 executing program 5: 17:28:23 executing program 0: 17:28:23 executing program 4: 17:28:23 executing program 5: 17:28:23 executing program 3: 17:28:24 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x17, 0x10, r0, 0x80000000) 17:28:24 executing program 2: 17:28:24 executing program 0: 17:28:24 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x17, 0x10, r0, 0x80000000) 17:28:24 executing program 4: 17:28:24 executing program 5: 17:28:24 executing program 3: 17:28:24 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) socket$inet6(0xa, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x0) 17:28:24 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x3c) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x711000, 0x0}, 0x2c) 17:28:24 executing program 4: openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141a42, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x4e, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) fallocate(r0, 0x0, 0x0, 0x10000101) 17:28:24 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000300)="01f14d8254660aef550c8096387ded0d0100ed24a506362bc80798bc67189a1e1464a3873802a13832f9170ee70102cd8b1326c772f023649364df6d7321232d0d09d7c6ab45b59014feac546badc86036ecbf33127b8628b574705dc461a79a1e0fd6db41240f9c7e83a97e79740de3b7f2d6b22c006dafe1a0897ebe4d5121d5253876111881eac697474e10a8accbaef05bf07ce61570858ab4039196e7e061332b347366f1f992f77973f59ab367b8be498ea25d357873dbd2718aef7ac7d5b5a847a66f536d1976ef04fdf5ad51465c43984d583ed49db1121c8e895af9", 0x2ed) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000100)={r4}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x4f10b02ad3eb3d7b, 0x1, 0x1f, r4}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000180)={r6, 0x8, 0xff24, 0x0, 0x0, 0x6}, &(0x7f0000000200)=0x14) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x80000, 0x0) connect$l2tp(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x2, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x3a) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, 0x0) r8 = open(0x0, 0x141042, 0x0) ioctl$KDSKBMODE(r8, 0x4b45, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r7, 0x4c80, 0x0) chdir(&(0x7f00000005c0)='./file0\x00') ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000380)) socket$netlink(0x10, 0x3, 0x1) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 17:28:24 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x190}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x400002) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000780)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8001) r1 = socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @empty}, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x7c) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) timer_create(0x2, &(0x7f0000000140)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f00000000c0)) timer_gettime(0x0, &(0x7f0000000140)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r2 = add_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080), 0x0, 0xfffffffffffffffb) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) request_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f00000002c0)='ppp1selinux^&\x00', 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000480)={r2, 0x0, 0x8b}, 0x0, 0x0, &(0x7f0000000500)=""/139) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r3, &(0x7f0000000680)=[{&(0x7f0000000200)=""/113, 0x71}], 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) pivot_root(&(0x7f0000000380)='./file0\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000cc0)=[{&(0x7f0000000340)="3d7ecc203a38c60b154e7c7b86072aee7e5d04f838a1aee0d81e25d6f50f0cf1ebb4e656f363afb8bf941c2c0eb590ad8cfc42945af01856795164f7754d4b6841d8fc267ecb731f1c9d728cc0a492d0d77565d9cb", 0x55}, {&(0x7f00000007c0)}, {&(0x7f0000002d80)="b3157de52949367427fb4ec4fa4ba9c1d25088dfa5ef766a1e91a6935ee1b13eee09bb54dbe6e1012a5eff882ade268a74d80b42d551d5f4541039b21fbd7b90f3581ce0feb2cd87de9dc18cbb2db556adaa7dcdc0a13e7fd2b5a8f38281f502265622ff20a3b8a5346b0523360f225306cfc0b48dccc7b8ba0ab1540fec1dd5598c4dffc0cec0c20d711f1232e9ecebe307075c62497f9f3be203c70f5e3ff2fe544f4bbade86583e33a36b5a69d7c2f6a974d9459e8c962dd10f69c10338c3bc1cfd5c0f29a3be3975f36cc86bcfb17152f64efb6ef62125ff5e733f2e2676c5c7e9d3ebf7a6024bedab37e611d2d57f9242d72a02d76d04f9c56dd3cceecc768b22b84db38da97213e908795d7b9f8ac3fc467bb7cd08361af4ff7d8be8d171f5996ca40f0da8f727525bb1ebb5eefbc7b323336c84bd3cb719c268a7a728d95caa00d7f952f853d03448f76617454d9d5e7f454cd25ad6e5080d4e38202e91e3af514d827e4d6bf988b4ff87308ef096e45767b4e34daf42170f997e79f686bd853c5e19dc593d74745c3cf61a654b4270928eba53b70520995e7240e760a17e43ffc1b6c9f9420f10b9a8c8097c70cb748a8481e99ba6baae297384585520fba2ac7bf37e65b553a70579cdf42378a273f1c0bee2625256a1012259185baeb3e6513e13c470728af7d3c08b96684ec1ed679e5f17c3a0bd7a6bdb79e2a94be46b0d93e8053b2bc83e346c79aa978a149f84af1d5b2513114c225b17d718d66f324a14e55f27591d25a13382c6d3fffbc021a76561d266eafa89251a16e34305daa987b161b937ad7c40f7e96141e0c5dda0b1808b9bba44ab4a48320eca5acb8387c87cc0fa5524aa0358f7faf37f19c25541c4ed9cde128de695b0c61e97abeabf3d49b50eabaecb41edc009eece92ff5a8d330e316976269319b7860dbe67236f455c423154c6ad558c2896940a1e4c04a0ff359bafea03933b9eca30d293ca952d3c271e06acdee53995d85e25e0af2f7942ab397066a8b7f197a24eafc5a233c08180efd47268d4ea0e44fc63b60f499abeb3005376520731ff7d95bc9e0da84625b756f64329d4d5b23cd953c0beb0ac207f330d3b32ff38a53d66b38871aead52db959a067e148e2ac8486accbe2db90a078527b79065d059f98c9be8ceac194d68acc01121e19af7f0967585dc05ac5f1e65b2fd1a4f0de6b6d8cd037d2a543f2afdafa34c25a7c4d2998d5611fe3f9684f7144924278e41c96be9188566644e6de5c4316e3ed14b9ec2e64ace1e2bc106f2c5c47034e995e8e24b7892d654e02c61019ebf1efa30fcd3ab1ce769bb18b618175dd4fc8dac572877ba7099871e4da195379e021a6c2cbac6b6eb314a1189d6611ebb7863b28c5f1baa1c0d48559ce8ade4c2e4ad0cfced91205831ee133886106ed0db14d26fe57aa6b5d0ff64b8f5106330facf3b7cee603128912a2fc15e11a46d9c592d085cd4f56d3aa32a853587b540accd2dc9b6082679326d8fb52eeb3c07a06ea68677fc511dfd417e7b79101f8b51f066c1484e89506d0b301108693a7dfc5b7da13c7be19370edb29a4a2ef13287c9b77e41ed6c872c47af643d0ffbc5a73c7fdca808bfa126e39fbede1439eb57aa5515c867aa3a2dccc521d3cfbfba9359e82ee2c7c0f455d08d7b3e9f4104681e4ad6c9a728194457df7be6a5ade8075108fa569e2fa4afe57c120c3dc2602df387a0d6413a0fb15d74bb2cb4231e33b2e18bc466b176287aff1f35842c5fa9386ca05af11b05a9415786065fd477dc9c341aba55b58f9d8d30458d4dbec35d04ab667904c6ab56d035ff68e013f66c98996b4f822ac756ce514ec80bef8aa632328c2d3c8425e67d4f63f59b2f6d32436f7c797bab5a39b4ee7f8aa05410f2afb2a3e92d0b9ab8bbf47ecef06226bd516efb7ee65b319692c387074c920f52af9756f4fc39913f906de5a88561f06b2d071e31c95f1b357f2245ff438d1054d205c74675c6ed5a31eb24e596a49ebbb1a3e1b0b13656537b3471e2e4f1a1558b4a7ea467a4c5a0b4eff32e3cba91124fd423a3cc25526d8381dc2b8af1d290cc23a188adb02de3466a73265561eaef6ebcf389efc7a17300ca5a7f5d2261f07f51a3710f34d0a2ea81f1e5f9f561483e214f", 0x5ff}, {0x0}, {&(0x7f0000000900)="73d851653c9265c4fc9b56061f33dbf19ce3ba568cd495e496e335e78a93940679dbf49bfe5e9e37550f66855d522bd913271b449d3c6f67640ee9e9e7d03bbdc51b425fe931658b83b9a896ab5d4d00", 0x50}, {&(0x7f0000000a00)="b9258e83029dfb65e7f7576e315498170a24c9fc534d96a80804edddccb64e0c055c7dacfef67d48146e6c6e0c04fd5946c1fafc66067f2838f241b150d0424d9b2d0d1b54d7f4099750bd2e1d639acbf02a5197e96a4be1e7344027f91576cfe1bd25f716a1a827426add08499508033a4a901638a75215f2d0aa06fb2149e6783dac", 0x83}, {&(0x7f0000000ac0)="ec5a9537581a38818122c848b32a4150573b75df0f238429a86c64f6547175f075f830cdd20e00358cab8ac65b1469d8850365d89ba8b881a75f0e97b15a5efac1b8de811de0d85e783a095d36899adddddd0af2be50ccffcd303525b65c27d3a3c3d0a2e7d5bab7d942d863a3fe0b81710d69eaaa413f4bbfd635ffa51533a7ad8629b714f26b3ba860ac4de882b34e5e5309b926d483745958a7d57473e31de68192359d79e5b89f7e2b73298e34d65f4b313344f01ea6eebbd22d5df0b3ce9ca9ee1ec4c7", 0xc6}, {0x0}], 0x8) io_cancel(0x0, 0x0, &(0x7f0000000680)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 17:28:24 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x17, 0x10, r0, 0x80000000) 17:28:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, 0x0, 0x500) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) gettid() r3 = gettid() sendmmsg$unix(r1, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r3}}}], 0x68}], 0x1, 0x0) r4 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x25d) syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x3, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000380)="90ab31ca3fe738793975fff6741f645243089d36a16bff9adeea4158dd01c3aab76b18f361ac1d7f23a1f352e5ef590a1fe65150f2855f2b835fa1ff7119675b0468d70718e5d886e6f9ef9282b7a067d217f570f075941783be24", 0x5b}, {0x0, 0x0, 0x7}], 0x2, &(0x7f0000000440)={[{@map_normal='map=normal'}, {@check_relaxed='check=relaxed'}]}) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendmsg$TIPC_NL_NET_SET(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 17:28:24 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x17, 0x10052, 0xffffffffffffffff, 0x80000000) 17:28:24 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x17, 0x10052, 0xffffffffffffffff, 0x80000000) 17:28:24 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x190}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x400002) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000780)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8001) r1 = socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @empty}, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x7c) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) timer_create(0x2, &(0x7f0000000140)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f00000000c0)) timer_gettime(0x0, &(0x7f0000000140)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r2 = add_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080), 0x0, 0xfffffffffffffffb) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) request_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f00000002c0)='ppp1selinux^&\x00', 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000480)={r2, 0x0, 0x8b}, 0x0, 0x0, &(0x7f0000000500)=""/139) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r3, &(0x7f0000000680)=[{&(0x7f0000000200)=""/113, 0x71}], 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) pivot_root(&(0x7f0000000380)='./file0\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000cc0)=[{&(0x7f0000000340)="3d7ecc203a38c60b154e7c7b86072aee7e5d04f838a1aee0d81e25d6f50f0cf1ebb4e656f363afb8bf941c2c0eb590ad8cfc42945af01856795164f7754d4b6841d8fc267ecb731f1c9d728cc0a492d0d77565d9cb", 0x55}, {&(0x7f00000007c0)}, {&(0x7f0000002d80)="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", 0x5ff}, {0x0}, {&(0x7f0000000900)="73d851653c9265c4fc9b56061f33dbf19ce3ba568cd495e496e335e78a93940679dbf49bfe5e9e37550f66855d522bd913271b449d3c6f67640ee9e9e7d03bbdc51b425fe931658b83b9a896ab5d4d00", 0x50}, {&(0x7f0000000a00)="b9258e83029dfb65e7f7576e315498170a24c9fc534d96a80804edddccb64e0c055c7dacfef67d48146e6c6e0c04fd5946c1fafc66067f2838f241b150d0424d9b2d0d1b54d7f4099750bd2e1d639acbf02a5197e96a4be1e7344027f91576cfe1bd25f716a1a827426add08499508033a4a901638a75215f2d0aa06fb2149e6783dac", 0x83}, {&(0x7f0000000ac0)="ec5a9537581a38818122c848b32a4150573b75df0f238429a86c64f6547175f075f830cdd20e00358cab8ac65b1469d8850365d89ba8b881a75f0e97b15a5efac1b8de811de0d85e783a095d36899adddddd0af2be50ccffcd303525b65c27d3a3c3d0a2e7d5bab7d942d863a3fe0b81710d69eaaa413f4bbfd635ffa51533a7ad8629b714f26b3ba860ac4de882b34e5e5309b926d483745958a7d57473e31de68192359d79e5b89f7e2b73298e34d65f4b313344f01ea6eebbd22d5df0b3ce9ca9ee1ec4c7", 0xc6}, {0x0}], 0x8) io_cancel(0x0, 0x0, &(0x7f0000000680)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 242.433883] audit: type=1800 audit(1570901304.505:58): pid=8852 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16674 res=0 17:28:24 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x4000000000802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 17:28:24 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x17, 0x10052, 0xffffffffffffffff, 0x80000000) [ 242.696901] audit: type=1804 audit(1570901304.765:59): pid=8856 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir237568846/syzkaller.IiHF1r/59/bus" dev="sda1" ino=16629 res=1 [ 242.749521] input: syz1 as /devices/virtual/input/input5 [ 242.876614] input: syz1 as /devices/virtual/input/input6 17:28:25 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x3f, 0x0) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, 0x0) 17:28:25 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x101e, 0x17, 0x10052, r0, 0x0) 17:28:25 executing program 2: setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='security.evm\x00', 0x0, 0x0, 0x3) socket(0x10, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007600)=[{{0x0, 0x0, 0x0}, 0x1000}], 0x1, 0x40, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000540)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x71, 0x81) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x12, 0x5, 0x0, 0x20000, 0x0}) r2 = socket$nl_xfrm(0x11, 0x3, 0x6) dup2(r2, r2) socketpair$unix(0x1, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x8}, &(0x7f0000000440)=0x8) 17:28:25 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000300)="01f14d8254660aef550c8096387ded0d0100ed24a506362bc80798bc67189a1e1464a3873802a13832f9170ee70102cd8b1326c772f023649364df6d7321232d0d09d7c6ab45b59014feac546badc86036ecbf33127b8628b574705dc461a79a1e0fd6db41240f9c7e83a97e79740de3b7f2d6b22c006dafe1a0897ebe4d5121d5253876111881eac697474e10a8accbaef05bf07ce61570858ab4039196e7e061332b347366f1f992f77973f59ab367b8be498ea25d357873dbd2718aef7ac7d5b5a847a66f536d1976ef04fdf5ad51465c43984d583ed49db1121c8e895af9", 0x2ed) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000100)={r4}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x4f10b02ad3eb3d7b, 0x1, 0x1f, r4}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000180)={r6, 0x8, 0xff24, 0x0, 0x0, 0x6}, &(0x7f0000000200)=0x14) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x80000, 0x0) connect$l2tp(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x2, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x3a) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, 0x0) r8 = open(0x0, 0x141042, 0x0) ioctl$KDSKBMODE(r8, 0x4b45, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r7, 0x4c80, 0x0) chdir(&(0x7f00000005c0)='./file0\x00') ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000380)) socket$netlink(0x10, 0x3, 0x1) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 17:28:25 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000200)={0x0, 0xd9f, 0x4, {0x2, @raw_data="7a96b6fbdf62bba845a52d283bb5a8dd7f85e61011ce5e9f9b04ddb9012500247fbf42196476f3d9503327a912bd364605e0446a5559377e7bf92ef30863951aaa53f7270160142e2eeaef347c1e02f86b9b6d4bb3c26f51d9fbf95a71bcd057022d48177863b1f3c453ffc3707cabc8eb6356a35480256ccf100f0699de633c9c7d1e7392d5322ba8cb887f11ce6b63f76445cc8d3cb45ecd3e2bbac22aea5bfc2abd157b05d12e9e772f0adcf0fa4b686c7272b6d4089d037562eeddd4c8d170f697a243b6f096"}}) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000040)=0x2) 17:28:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) getpid() ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, 0x0) [ 243.114993] ================================================================== [ 243.122677] BUG: KASAN: use-after-free in v4l2_ctrl_grab+0x159/0x160 [ 243.129178] Read of size 8 at addr ffff8880841c7d60 by task syz-executor.3/8901 [ 243.136623] [ 243.138248] CPU: 1 PID: 8901 Comm: syz-executor.3 Not tainted 4.19.79 #0 [ 243.145077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.154443] Call Trace: [ 243.157068] dump_stack+0x172/0x1f0 [ 243.160687] ? v4l2_ctrl_grab+0x159/0x160 [ 243.164882] print_address_description.cold+0x7c/0x20d [ 243.170146] ? v4l2_ctrl_grab+0x159/0x160 [ 243.174283] kasan_report.cold+0x8c/0x2ba [ 243.178454] ? vidioc_querycap+0x110/0x110 [ 243.182678] __asan_report_load8_noabort+0x14/0x20 [ 243.187593] v4l2_ctrl_grab+0x159/0x160 [ 243.191560] ? vidioc_querycap+0x110/0x110 [ 243.195809] vicodec_stop_streaming+0x158/0x1a0 [ 243.200468] ? vicodec_return_bufs+0x220/0x220 [ 243.205091] __vb2_queue_cancel+0xb1/0x790 [ 243.209320] ? vidioc_querycap+0x110/0x110 [ 243.213588] ? dev_debug_store+0x110/0x110 [ 243.217810] vb2_core_queue_release+0x28/0x80 [ 243.222295] vb2_queue_release+0x16/0x20 [ 243.226346] v4l2_m2m_ctx_release+0x2d/0x40 [ 243.230655] vicodec_release+0xc0/0x120 [ 243.234635] v4l2_release+0xf9/0x1a0 [ 243.238421] __fput+0x2dd/0x8b0 [ 243.241701] ____fput+0x16/0x20 [ 243.245006] task_work_run+0x145/0x1c0 [ 243.248944] exit_to_usermode_loop+0x273/0x2c0 [ 243.253519] do_syscall_64+0x53d/0x620 [ 243.257428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.262604] RIP: 0033:0x413741 [ 243.265782] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 243.284670] RSP: 002b:00007fffc61877e0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 243.292381] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413741 [ 243.299651] RDX: 0000001b2d120000 RSI: 0000000000000000 RDI: 0000000000000003 [ 243.306918] RBP: 0000000000000001 R08: 00000000c6a32174 R09: 00000000c6a32178 [ 243.314171] R10: 00007fffc61878c0 R11: 0000000000000293 R12: 000000000075bf20 [ 243.321438] R13: 000000000003b58f R14: 0000000000760490 R15: 000000000075bf2c [ 243.328701] [ 243.330327] Allocated by task 8902: [ 243.333944] save_stack+0x45/0xd0 [ 243.337381] kasan_kmalloc+0xce/0xf0 [ 243.341079] __kmalloc_node+0x51/0x80 [ 243.344935] kvmalloc_node+0x68/0x100 [ 243.348726] v4l2_ctrl_new.part.0+0x214/0x1450 [ 243.353291] v4l2_ctrl_new_std+0x22d/0x360 [ 243.357535] vicodec_open+0x1a8/0xb30 [ 243.361334] v4l2_open+0x1b2/0x360 [ 243.364867] chrdev_open+0x245/0x6b0 [ 243.368571] do_dentry_open+0x4c3/0x1210 [ 243.372631] vfs_open+0xa0/0xd0 [ 243.375898] path_openat+0x10d7/0x45e0 [ 243.379858] do_filp_open+0x1a1/0x280 [ 243.383656] do_sys_open+0x3fe/0x550 [ 243.387353] __x64_sys_openat+0x9d/0x100 [ 243.391403] do_syscall_64+0xfd/0x620 [ 243.395205] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.400375] [ 243.401987] Freed by task 8901: [ 243.405254] save_stack+0x45/0xd0 [ 243.408695] __kasan_slab_free+0x102/0x150 [ 243.412915] kasan_slab_free+0xe/0x10 [ 243.416700] kfree+0xcf/0x220 [ 243.419801] kvfree+0x61/0x70 [ 243.422895] v4l2_ctrl_handler_free+0x4a8/0x7e0 [ 243.427552] vicodec_release+0x6b/0x120 [ 243.431513] v4l2_release+0xf9/0x1a0 [ 243.435211] __fput+0x2dd/0x8b0 [ 243.438478] ____fput+0x16/0x20 [ 243.441743] task_work_run+0x145/0x1c0 [ 243.445619] exit_to_usermode_loop+0x273/0x2c0 [ 243.450185] do_syscall_64+0x53d/0x620 [ 243.454057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.459225] [ 243.460840] The buggy address belongs to the object at ffff8880841c7d40 [ 243.460840] which belongs to the cache kmalloc-256 of size 256 [ 243.473483] The buggy address is located 32 bytes inside of [ 243.473483] 256-byte region [ffff8880841c7d40, ffff8880841c7e40) [ 243.485252] The buggy address belongs to the page: [ 243.490169] page:ffffea00021071c0 count:1 mapcount:0 mapping:ffff88812c3f07c0 index:0x0 [ 243.498313] flags: 0x1fffc0000000100(slab) [ 243.502553] raw: 01fffc0000000100 ffffea00024a7208 ffffea000257d7c8 ffff88812c3f07c0 [ 243.510420] raw: 0000000000000000 ffff8880841c70c0 000000010000000c 0000000000000000 [ 243.518283] page dumped because: kasan: bad access detected [ 243.523972] [ 243.525594] Memory state around the buggy address: [ 243.530508] ffff8880841c7c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 243.537871] ffff8880841c7c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 243.545215] >ffff8880841c7d00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 243.552567] ^ [ 243.559042] ffff8880841c7d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 243.566407] ffff8880841c7e00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 243.573746] ================================================================== [ 243.581085] Disabling lock debugging due to kernel taint [ 243.616193] Kernel panic - not syncing: panic_on_warn set ... [ 243.616193] [ 243.623614] CPU: 0 PID: 8901 Comm: syz-executor.3 Tainted: G B 4.19.79 #0 [ 243.631924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.641271] Call Trace: [ 243.643852] dump_stack+0x172/0x1f0 [ 243.647482] ? v4l2_ctrl_grab+0x159/0x160 [ 243.651724] panic+0x263/0x507 [ 243.654912] ? __warn_printk+0xf3/0xf3 [ 243.658795] ? v4l2_ctrl_grab+0x159/0x160 [ 243.662936] ? preempt_schedule+0x4b/0x60 [ 243.667073] ? ___preempt_schedule+0x16/0x18 [ 243.671544] ? trace_hardirqs_on+0x5e/0x220 [ 243.675864] ? v4l2_ctrl_grab+0x159/0x160 [ 243.680010] kasan_end_report+0x47/0x4f [ 243.683968] kasan_report.cold+0xa9/0x2ba [ 243.688121] ? vidioc_querycap+0x110/0x110 [ 243.692340] __asan_report_load8_noabort+0x14/0x20 [ 243.697265] v4l2_ctrl_grab+0x159/0x160 [ 243.701246] ? vidioc_querycap+0x110/0x110 [ 243.705480] vicodec_stop_streaming+0x158/0x1a0 [ 243.710136] ? vicodec_return_bufs+0x220/0x220 [ 243.714896] __vb2_queue_cancel+0xb1/0x790 [ 243.719151] ? vidioc_querycap+0x110/0x110 [ 243.723378] ? dev_debug_store+0x110/0x110 [ 243.727615] vb2_core_queue_release+0x28/0x80 [ 243.732099] vb2_queue_release+0x16/0x20 [ 243.736148] v4l2_m2m_ctx_release+0x2d/0x40 [ 243.740455] vicodec_release+0xc0/0x120 [ 243.744501] v4l2_release+0xf9/0x1a0 [ 243.748296] __fput+0x2dd/0x8b0 [ 243.751570] ____fput+0x16/0x20 [ 243.754841] task_work_run+0x145/0x1c0 [ 243.758723] exit_to_usermode_loop+0x273/0x2c0 [ 243.763299] do_syscall_64+0x53d/0x620 [ 243.767171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.772344] RIP: 0033:0x413741 [ 243.775530] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 243.794442] RSP: 002b:00007fffc61877e0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 243.802140] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413741 [ 243.809401] RDX: 0000001b2d120000 RSI: 0000000000000000 RDI: 0000000000000003 [ 243.816655] RBP: 0000000000000001 R08: 00000000c6a32174 R09: 00000000c6a32178 [ 243.823910] R10: 00007fffc61878c0 R11: 0000000000000293 R12: 000000000075bf20 [ 243.831175] R13: 000000000003b58f R14: 0000000000760490 R15: 000000000075bf2c [ 243.839816] Kernel Offset: disabled [ 243.843445] Rebooting in 86400 seconds..