Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 10.216266] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 33.448967] random: sshd: uninitialized urandom read (32 bytes read) [ 33.456972] random: crng init done Warning: Permanently added '10.128.0.62' (ECDSA) to the list of known hosts. 2018/12/21 05:22:45 fuzzer started 2018/12/21 05:22:48 dialing manager at 10.128.0.26:34627 2018/12/21 05:22:48 syscalls: 1 2018/12/21 05:22:48 code coverage: enabled 2018/12/21 05:22:48 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/21 05:22:48 setuid sandbox: enabled 2018/12/21 05:22:48 namespace sandbox: enabled 2018/12/21 05:22:48 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/21 05:22:48 fault injection: kernel does not have systematic fault injection support 2018/12/21 05:22:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/21 05:22:48 net packet injection: enabled 2018/12/21 05:22:48 net device setup: enabled 05:23:30 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x880, 0x0) ioctl$TIOCSBRK(r0, 0x5427) ioctl$TCFLSH(r0, 0x540b, 0x80800000000000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x200000, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=[&(0x7f00000000c0)='/dev/ptmx\x00', &(0x7f0000000100)='/dev/full\x00', &(0x7f0000000140)='\x00'], &(0x7f0000000280)=[&(0x7f00000001c0)='/dev/ptmx\x00', &(0x7f0000000200)='/dev/ptmx\x00', &(0x7f0000000240)='user\'systemeth0\x00'], 0xc00) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='dctcp-reno\x00', 0xb) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000340)=""/234) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000440)=0x2) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000480)={{0xa, 0x4e20, 0x0, @local, 0x5e4}, {0xa, 0x4e20, 0x7bed, @ipv4={[], [], @remote}, 0xffffffffffffffe1}, 0x7, [0x800, 0x8, 0x7ff, 0x1, 0x5, 0x80000001, 0xeac4, 0x9]}, 0x5c) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000500)='ip6gre0\x00') r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/status\x00', 0x0, 0x0) ioctl$TCFLSH(r3, 0x540b, 0x68) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$KDSKBLED(r1, 0x4b65, 0x3) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000580)) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000005c0)={'filter\x00'}, &(0x7f0000000640)=0x78) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0}, &(0x7f0000000700)=0xc) quotactl(0x3, &(0x7f0000000680)='./file0\x00', r4, &(0x7f0000000740)="18753c2b8ea62776a9a90c0daf1e14c543415353803a861da13347e24376d7b697108751220a7269781d491d15aae0e8a651ed624dee42da226854dfabb1db358d185ffc80644dbd16fb00fe2f34085a9433a09bd28c53db7fb4bb654bb32cc2a87eeab10f5a52da0f29e4900adba22b0f4bf488db82b622b9c382ac92372af35b64f0c22ece661a2617750b11d118") ioctl$ASHMEM_SET_PROT_MASK(r3, 0x40087705, &(0x7f0000000800)={0x2, 0x4}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000940)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x10204}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x1c, r5, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [""]}, 0x1c}}, 0x800) ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000980)={0x2, 0x200, 0x1}) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000009c0)={'nat\x00'}, &(0x7f0000000a40)=0x78) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a80)={{{@in6, @in6=@local}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000b80)=0xe8) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000c00)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r3, &(0x7f0000000d00)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x1009100}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000c40)={0x70, r6, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x5c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000}, 0x2000c000) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000e40)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x40000100}, 0xc, &(0x7f0000000e00)={&(0x7f0000000d80)={0x48, r6, 0x301, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4040}, 0x1) select(0x40, &(0x7f0000000e80)={0x4, 0x7fff, 0x100000000, 0xe852, 0x5, 0x1, 0x1, 0x9}, &(0x7f0000000ec0)={0x6, 0x10000, 0xffffffffffff0789, 0x394, 0x6, 0xffffffff00000000, 0x100000000, 0x9}, &(0x7f0000000f00)={0x30000000000, 0x1, 0x6, 0xb272, 0x6000000000, 0x4, 0x8, 0x1}, &(0x7f0000000f40)={0x77359400}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000f80)={{0xa, 0x4e20, 0x0, @loopback, 0x4}, {0xa, 0x4e23, 0x8, @remote, 0x7fff}, 0x4, [0x4, 0x3f, 0x15e6a000, 0x7, 0x8001, 0x3, 0x8, 0x1]}, 0x5c) 05:23:30 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10800, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x1) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000180)) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') write$selinux_user(r0, &(0x7f0000000200)={'system_u:object_r:auditctl_exec_t:s0', 0x20, 'root\x00'}, 0x2a) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f00000002c0)={0x19c, r2, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0xc0, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa6}]}]}, @TIPC_NLA_MEDIA={0xac, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9a}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x90}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xcf4}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x804}, 0x40044) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000500)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000540), 0x4) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000007c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000780)={&(0x7f00000005c0)={0x1ac, r2, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc6b}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3ad}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x93}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'syz_tun\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4a6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7e42750b}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8301}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x417b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x20044080}, 0x0) epoll_wait(r0, &(0x7f0000000800)=[{}, {}, {}, {}], 0x4, 0x5) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000840)="c44083730277a6dbe39d9132689240a9420ec9f00ec735468b1cbf1f494837a4673a91dfb855410fa48bdff4b5988f518335a009c31383ce687f2ef748de1147de7ac9b2823a1638b2bb856838534494f30ee02129e73ffa9130e8662c06715ae0b38b78221d8ff119a8ef5bb46507a743b7bc5e9897bd04a6f7f08ec2b53f30bca92dee1a0b4a73360a9bae6275e2230f3889eb50a513be6deae2170ed6580de912c325f0ba4a31c9cb4c57d0e33dcf57") getsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000900), &(0x7f0000000940)=0x4) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000980)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f00000009c0)={0x5, 0x9520, 0x80000000, 0x4, 0x4}) ioctl$TCXONC(r0, 0x540a, 0x5) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000a00)=0x0) sched_getattr(r3, &(0x7f0000000a40), 0x30, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000e00)={&(0x7f0000000a80), 0xc, &(0x7f0000000dc0)={&(0x7f0000000ac0)={0x2f4, r2, 0x39, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x401}]}, @TIPC_NLA_MEDIA={0xec, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xaff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x10, 0x1, [@TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'yam0\x00'}}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4b87}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0xec, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff6d}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffe00}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}]}, @TIPC_NLA_BEARER={0x88, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'syzkaller0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'vlan0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @rand_addr=0x6}}, {0x14, 0x2, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1b}}}}}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffff87}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}]}]}, 0x2f4}, 0x1, 0x0, 0x0, 0x48000}, 0x4004010) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000e40)={0x40000000}) openat$cgroup_int(r0, &(0x7f0000000e80)='cpuset.memory_spread_slab\x00', 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000ec0)={'gretap0\x00', {0x2, 0x4e21, @empty}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000f00)) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000f40)=""/184) mount(&(0x7f0000001000)=@md0='/dev/md0\x00', &(0x7f0000001040)='./file0\x00', &(0x7f0000001080)='ntfs\x00', 0x800, &(0x7f00000010c0)='ib') socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000001100)) write$P9_RLERRORu(r0, &(0x7f0000001140)={0x18, 0x7, 0x2, {{0xb, 'syzkaller0\x00'}, 0x2e2}}, 0x18) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000001180)={0x101, 0xe3a, 0xfffffffffffffffc, 0x6, 0x7ff, 0x5, 0x3f, 0x80, 0x8, 0x101}) 05:23:30 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) r1 = open(&(0x7f0000000080)='./file0\x00', 0x84000, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f00000000c0)) utime(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x7bcc, 0x4}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x8) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f00000001c0)=0x401) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000200)={0x29, 0x4, 0x0, {0x1, 0x4, 0x1, 0x0, [0x0]}}, 0x29) openat$uhid(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uhid\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000280)={0x7f, 0x2050}) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x40, 0x0) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/mls\x00', 0x0, 0x0) lstat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r4) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x200080, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={0x0, r1, 0xf, 0x2}, 0x14) connect$inet6(r2, &(0x7f0000000480)={0xa, 0x4e22, 0x101, @local, 0x3f}, 0x1c) setuid(r4) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000004c0)) umount2(&(0x7f0000000500)='./file0/file0\x00', 0x4) tee(r5, r3, 0x1000, 0x4) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000540)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) set_tid_address(&(0x7f00000005c0)) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000600)=0x8) pread64(r0, &(0x7f0000000640)=""/236, 0xec, 0x0) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/hash_stats\x00', 0x0, 0x0) rmdir(&(0x7f0000000780)='./file1\x00') ioctl$KDMKTONE(r1, 0x4b30, 0x8) ioctl$EVIOCGMTSLOTS(r6, 0x8040450a, &(0x7f00000007c0)=""/33) prctl$PR_SET_THP_DISABLE(0x29, 0x0) 05:23:30 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/97, &(0x7f0000000080)=0x61) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000100)={'system_u:object_r:getty_exec_t:s0', 0x20, 'system_u:object_r:hugetlbfs_t:s0', 0x20, 0x10000000, 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}, 0x86) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000001c0)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xd4, r2, 0x18, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x101}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x133000}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ifb0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x578}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}]}, 0xd4}, 0x1, 0x0, 0x0, 0x4000}, 0x4008040) r3 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/access\x00', 0x2, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r2, 0x100, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1f}]}, 0x1c}}, 0x4000000) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000540)={'mangle\x00', 0x1000, "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"}, &(0x7f0000001580)=0x1024) writev(r0, &(0x7f0000001940)=[{&(0x7f00000015c0)="bef24b9c067a1289eb918ef5638223d9acd8beab4594c955c022eb99c426c963fc582c41206d9baba2b91d5f43709f487015452e54d97166236f43329778de163f943515defa3ca9", 0x48}, {&(0x7f0000001640)="99d98c03d1c3cf1c3c31caa27ef44c608a0235e4", 0x14}, {&(0x7f0000001680)="8b4596bccd1eacfd14f21de4e81815e5cf3319477269f72f8165af37277d89505990ee05786b2ea5522c868fafc53049d0feedfeea6ac8f9ce8f57b8a614b251a7affb31bbb118db242b9eed9d80327d28c0a0d374854d24600bd29f892f49dce7dce83db420d75a2a346871f430c30d1bf24a6fc53c7cda685f3282c1ff2d79c925726c86693c793dc09d941c06ad681015d6182a837807a701da072f3a12cc2530405da14f969e5104f2097689dfd1478f173776fb085314e41b0f957f0e81f36da4c9589aa27b62f39cf4f4d67882b2202798102004cdf6", 0xd9}, {&(0x7f0000001780)="589049542c2ffc5f0ce894037fdea390dcd9c1fc390905a6bdfaabd2e21e3cda55b7bc1ffa4b99467b7529958405d56d7915bbf7566fd869e2023854e92fd66c1800ae6e8abdee505d788545a749e176a7ad81ce034c8c5f9ead69ace8bf44ecdc6cce1fdf39f89b7cac9b00bbb42800bd7127badfa157f4129f84c90c3070cb0a11b1ed0fea4812f63c52f2f3f3d80a801c805e3caf7d1820a83b0f0a34b7eeb8d231aa01eb12a60d03fae141f749d7bf2487a9b0d941870c559eafad1bc1d9fb40de622c6fa35bc0d5facbf78a5f7507b474b1dba0d7a9e5c812414a54e55dee3175a865828881dd72e2eb3cdf0f8bca6ba5d6aaca", 0xf6}, {&(0x7f0000001880)="0a3e680161f35cef470466f7b6f462d1256c6bb7e42bd5cdbd1bb2e6c04ce227c4cd5acafe703ed89acc0c983f831730a88b3ac746a15fb402907aca40df629c3b97142e492b9fd0766ee83976dd731484bc56b32d9f76b58815f49dde9760b680e8c8783ec1c08ce741b6e4e146c90813b87e46c24b47bd9f3bea5c10049b1a71f9fb8bbee90d2ca64ab3", 0x8b}], 0x5) sendmsg$nl_route(r1, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f0000001a00)=@ipv4_delrule={0x28, 0x21, 0x200, 0x70bd2b, 0x25dfdbfb, {0x2, 0xa0, 0x0, 0x2, 0x2, 0x0, 0x0, 0x7, 0x8}, [@FRA_DST={0x8, 0x1, @rand_addr=0x9}]}, 0x28}, 0x1, 0x0, 0x0, 0x24000884}, 0x8d4) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000001ac0)) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000001b40)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000001c00)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001b80)={0x1c, r4, 0x400, 0x70bd2c, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000001c80)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000001d40)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001cc0)={0x3c, r5, 0x80a, 0x70bd2a, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8090}, 0xc1) prctl$PR_GET_SECUREBITS(0x1b) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000001d80)=@generic={0x3, 0x8000, 0x8}) r6 = dup2(r1, r3) ioctl$EVIOCSABS3F(r6, 0x401845ff, &(0x7f0000001dc0)={0x10000, 0x3, 0xff, 0xfffffffffffffff9, 0x9, 0x400}) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000001e00)=0x2) ioctl$KDSKBSENT(r6, 0x4b49, &(0x7f0000001e40)="55d1b0a01d9cbdee3df34b1714700b1bcef16cdf395333ffee4daed4a90525b0cd0c0bdcfe3404cc2d712da1") mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x80010, r6, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) sendto$unix(r1, &(0x7f0000001e80)="249ecb07f40f849265e1bbd003b744ffad74441af5", 0x15, 0x20000080, 0x0, 0x0) getsockname$unix(r1, &(0x7f0000001ec0)=@abs, &(0x7f0000001f40)=0x6e) pwritev(r0, &(0x7f0000002340)=[{&(0x7f0000001f80)="6879aff0d6fdc3e01300840a97a9c2f2b422b1c301707c656716a64d66185aa838665b7cba4301b8ac4feeade13d", 0x2e}, {&(0x7f0000001fc0)="8ff58a761557f3bba85835c72dfffcd991d0d717004bf3c5e3a2c6b3670a4ab56e872c5fd56f300e1ccaac52dff9a5b9eebfbc516c4493675b6b41f998c73b400f6c650c403da4d8a4a9627667a7c614abc72ccb2fd5b3dc3856ab6608a4fc34668c3cf823275b27bf07579078ae5bb372ff9ff8c1005f4c819208be35955468c8c2053066ab68d64d81ac27f38333936c42f941533add686ae9527ea149d3200f4924a9", 0xa4}, {&(0x7f0000002080)="9bef3aeceec7b4ac459f", 0xa}, {&(0x7f00000020c0)="bf479ac1da8075603a1ea8a757cefc808873eeaeb9416fa8e000f91887f4944b852a145bc6b7d057520b", 0x2a}, {&(0x7f0000002100)="8e2abea51ca82b4014f19c8304d2d33e6394ea1f5eae23ca", 0x18}, {&(0x7f0000002140)="6dff2260a37bf82c30", 0x9}, {&(0x7f0000002180)="a8ef0e8f3874c2142812ddf97f4d533272a26000064d7545d2b2d93826eedf0c18961fb3d85f114992b0aac59d79b87b928471c8217d93f49c697fa6d97008474df608c3963ac6b6ff45a25a63c04ee8df23aac3a2cacaaeb34cea04aa6ffdffefbf1e3efc35fe8ec3e7ca4b72b15b5d5ad32590a94a5b648ce2261a8214a34d47b8df883cd568d571c3fda7bbcd5516ad05ff46c161e548bfc214aae171d69b57a7dc9d96b6bade3cde3b9089008a3e9bdd879bc271bad2f66dec2c06bd7c9e8e07f2a301b9ca6803984ba9d787c4a6e9478403ef01f70cb91c3cd2efc9643ad2f74fbacf445cccccf41249e833118840", 0xf1}, {&(0x7f0000002280)="a478135665a4454fbb2315f22378aa4923631860c174111d5e84a90a16e06e3dfd581647ad56612386148f8fd92bfe5c2834b6eff4c389d6fb0702e091222dc876ca1434fa56b21a4202e1ce21dfea8923c9b5fa4f1924c2a7911c5736fad846a6e8de55ab89bcb7b1567bf74014ebd8c39ea45c7f8b63ea509d35e1a1b573864947eb6c15ef46a0baa2c078270725058a4f034a234834925f167cfeb888b1775078157742d7d03ee55fa6fac00f7b66ed8776900fec8e437f944e0ff1", 0xbd}], 0x8, 0x48) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@broadcast, @in=@empty}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f00000024c0)=0xe8) sendfile(r1, r6, &(0x7f0000002500)=0x29, 0x800) 05:23:30 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x428000, 0x18) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000100)={'broute\x00', 0x0, 0x4, 0x54, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000080)=""/84}, &(0x7f0000000180)=0x78) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000001c0)={{0x2, 0x4e22, @loopback}, {0x6, @local}, 0x4, {0x2, 0x4e21, @local}, 'veth0\x00'}) sendto(r0, &(0x7f0000000240)="81e14660d4a3ca8ebfc2c14c897ab47260770fcf8b1129fb7d056af82a357fc5eba9d9aa009eecd17639e56628b4c5e0e9e03eeea26dec91c202968abf3b41fa5a1e6861fa2599139f65b72666e4d5b1ad584dccaf381626bdc528723dfcef788314af26e64e911af552be7bdbd75eafa8c810628fd0fadf30db078034", 0x7d, 0x10, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000002c0)={'bridge_slave_1\x00', {0x2, 0x4e23, @remote}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, r0, 0x0, 0xf, &(0x7f0000000300)='bridge_slave_1\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)=0x0) r3 = getgid() setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440)={r1, r2, r3}, 0xc) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1004}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, r4, 0x1, 0x70bd2d, 0x25dfdbfd, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", ""]}, 0x28}}, 0x20040084) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000800)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000640)={0x174, r5, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_LINK={0x20, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}, @TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xa4, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bridge0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @empty}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast1}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x101}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x69da}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffffff05}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffff1a79}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x4000}, 0x814) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000840)={0x20, {{0x2, 0x2, @multicast1}}}, 0x88) linkat(r0, &(0x7f0000000900)='./file0\x00', r0, &(0x7f0000000940)='./file0\x00', 0x400) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000980)=r0) getsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) r6 = creat(&(0x7f0000000a40)='./file0\x00', 0x28) io_setup(0x400, &(0x7f0000000a80)) bind$inet(r6, &(0x7f0000000ac0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) recvmsg(r0, &(0x7f0000001400)={&(0x7f0000000b00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000012c0)=[{&(0x7f0000000b80)=""/91, 0x5b}, {&(0x7f0000000c00)=""/235, 0xeb}, {&(0x7f0000000d00)=""/222, 0xde}, {&(0x7f0000000e00)=""/230, 0xe6}, {&(0x7f0000000f00)=""/134, 0x86}, {&(0x7f0000000fc0)=""/85, 0x55}, {&(0x7f0000001040)=""/83, 0x53}, {&(0x7f00000010c0)=""/250, 0xfa}, {&(0x7f00000011c0)=""/212, 0xd4}], 0x9, &(0x7f0000001380)=""/127, 0x7f}, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000001440)={'raw\x00'}, &(0x7f00000014c0)=0x54) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) mknodat(r6, &(0x7f0000001500)='./file0\x00', 0x2, 0x1) sendmsg$TIPC_NL_MON_PEER_GET(r7, &(0x7f0000001740)={&(0x7f0000001540)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001700)={&(0x7f0000001580)={0x16c, r5, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1000000000000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2628}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7fffffff}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xd66}]}, @TIPC_NLA_BEARER={0xd4, 0x1, [@TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x3ff, @ipv4={[], [], @empty}, 0x8}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x14, 0x2, @in={0x2, 0x4e24, @local}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'teql0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xcc}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xff}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000017c0)=@filter={'filter\x00', 0xe, 0x4, 0x3e8, 0x228, 0x0, 0x0, 0xf0, 0xf0, 0x350, 0x350, 0x350, 0x350, 0x350, 0x4, &(0x7f0000001780), {[{{@ip={@loopback, @dev={0xac, 0x14, 0x14, 0x14}, 0xff000000, 0xffffff00, 'veth1\x00', 'erspan0\x00', {}, {}, 0xff, 0x2, 0x2}, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@unspec=@mark={0x30, 'mark\x00', 0x1, {0x2, 0x8001}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x3}}}, {{@ip={@rand_addr=0xd5, @loopback, 0xffffffff, 0xffffffff, 'gretap0\x00', 'ifb0\x00', {}, {0xff}, 0x6c, 0x3, 0x2}, 0x0, 0x110, 0x138, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x0, 0x8f5}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x9, 0x0, 0x2, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ip={@multicast1, @loopback, 0xffffffff, 0xffffffff, 'vlan0\x00', 'bond0\x00', {0xff}, {0xff}, 0x0, 0x2, 0x46}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@inet=@socket3={0x28, 'socket\x00', 0x3, 0x2}, @common=@set={0x40, 'set\x00', 0x0, {{0x9edf, [0x1, 0x5d58883, 0x3, 0xe3e, 0x101, 0x5], 0x7e, 0x5}}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000001d00)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001c80)={0x1c, r4, 0x420, 0x70bd2b, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x24000000) ioctl$BLKFRASET(r6, 0x1264, &(0x7f0000001d40)=0x5) r8 = syz_genetlink_get_family_id$team(&(0x7f0000001dc0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f0000005bc0)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000005c00)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000005d00)=0xe8) getpeername$packet(r6, &(0x7f0000005e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005ec0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000005fc0)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f00000060c0)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000008b40)={0x0, @multicast2, @dev}, &(0x7f0000008b80)=0xc) getsockname$packet(r7, &(0x7f0000008bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008c00)=0x14) getpeername$packet(r6, &(0x7f0000008c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008c80)=0x14) getpeername$packet(r7, &(0x7f0000008cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008d00)=0x14) getsockopt$inet_mreqn(r7, 0x0, 0x24, &(0x7f000000af80)={@multicast2, @broadcast, 0x0}, &(0x7f000000afc0)=0xc) getsockopt$inet6_mreq(r6, 0x29, 0x15, &(0x7f000000b000)={@loopback, 0x0}, &(0x7f000000b040)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000b080)={'dummy0\x00', 0x0}) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f000000b0c0)={0x0, @loopback, @broadcast}, &(0x7f000000b100)=0xc) getsockname$packet(r0, &(0x7f000000b140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000b180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f000000b1c0)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f000000b2c0)=0xe8) getsockopt$inet6_mreq(r6, 0x29, 0x0, &(0x7f000000b300)={@loopback, 0x0}, &(0x7f000000b340)=0x14) sendmsg$TEAM_CMD_NOOP(r7, &(0x7f000000b9c0)={&(0x7f0000001d80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f000000b980)={&(0x7f000000b380)={0x5e8, r8, 0x404, 0x70bd26, 0x25dfdbff, {}, [{{0x8, 0x1, r9}, {0x270, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3cda}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}, {{0x8, 0x1, r14}, {0x17c, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r16}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}}]}}, {{0x8, 0x1, r19}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r20}, {0x18c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r21}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0xfff, 0x9, 0x5, 0xd02}, {0x3, 0x9, 0xfffffffffffffffc, 0x5}, {0x1, 0x2, 0x4, 0x60cf1f69}, {0xdd, 0xfffffffffffffffd, 0x377, 0x2f60}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r22}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r23}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}]}, 0x5e8}, 0x1, 0x0, 0x0, 0x1}, 0x0) 05:23:30 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) tgkill(r0, r1, 0x32) r2 = syz_open_procfs(r1, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000000c0)) ioctl$FICLONE(r2, 0x40049409, r2) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x209, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000240)=0xff) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x401) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x800, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/enforce\x00', 0x2a2000, 0x0) write$P9_RFSYNC(r6, &(0x7f0000000300)={0x7, 0x33, 0x1}, 0x7) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r6, &(0x7f0000000580)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000540)={&(0x7f00000003c0)={0x144, r7, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x290}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_BEARER={0xb4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x10000, @local, 0x40}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x0, @mcast1, 0x1}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40000}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xaa04}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000005c0)={'IDLETIMER\x00'}, &(0x7f0000000600)=0x1e) getsockopt$inet_opts(r6, 0x0, 0x4, &(0x7f0000000640)=""/4096, &(0x7f0000001640)=0x1000) getsockopt$inet6_tcp_int(r2, 0x6, 0x6, &(0x7f0000001680), &(0x7f00000016c0)=0x4) write(r4, &(0x7f0000001700)="357be08165f6319afe830f2fc438a3e9c6e1bb3dd4b3339486ca4ae9fff9f7ae03c29ebdd92d78076e3c62bc9b728857425bd8abb4660a7e28aaea06a19a4346c7cfe8bc043cbc730013451882777078eaecd2ace00321ef3291084746e713964b29a4fdc3f6b0d983e5ca85662f62073ee03c65ecd663bf1df7b229e38975e67b8d9b07926483ddf4633ece821ca2787f0dedb8f7ee2362965ff56b6da59d70bc787a291d7c2704140abb06dfb51c39c2b27f02d5c17dd23ea751349663d8fd5623519e2c1057f8", 0xc8) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001840)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000001940)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x240}, 0xc, &(0x7f0000001900)={&(0x7f0000001880)={0x7c, r8, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7c2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x20}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x81}]}, 0x7c}, 0x1, 0x0, 0x0, 0x800}, 0x15) write$selinux_create(r6, &(0x7f0000001980)=@objname={'system_u:object_r:lastlog_t:s0', 0x20, '/usr/sbin/cups-browsed', 0x20, 0x101, 0x20, './file0\x00'}, 0x53) pipe2(&(0x7f0000001a00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000001a80)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000001b80)=0xe8) stat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001fc0)={0x0, 0x0, 0x0}, &(0x7f0000002000)=0xc) fstat(r9, &(0x7f0000002040)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r2, &(0x7f0000002200)={&(0x7f0000001a40)=@proc={0x10, 0x0, 0x25dfdbfb, 0x8000000}, 0xc, &(0x7f0000001ec0)=[{&(0x7f0000001bc0)={0x2fc, 0x16, 0xf05, 0x70bd2d, 0x25dfdbfc, "", [@nested={0x190, 0x5d, [@generic="a4f413bcee15ffbc1dc4492cec9607af95a9fcda4a45f6d0b1dba4a0a2ff6b597b9dd8f72058ae83316a1044dce2d38f5db9d77ac24563dcbc9649350af67176c63374325c459309b10e9486ca64ff9507b0ae68075548dfb397f0374e212efcb41c8ed4ca0467bba8b56aed4877f3caf2d042e3a24ffeb0df3bdea90ad42212fb6f713086dfeb24101975a4016e9cb79488fd75e93a351fe50ca689e35b2f2c63", @generic="d2e28b9b579f2fee561109f87faf3848939ed2a9c00e8d9bc7439a85fa1d5c3768d74831ea548062616c496e409c00b6dc63dc559fffc58630e32fe6eda5f7481cc3aacf543c09c30afdfc5dedb477738052bfaf482763d4558e9655569910f3c914886d74d034bad1592f6b9f68ebc49671faca4283f4ac332b77431482806099673ca9fa95641a871d8c06610d025cd415bcec51b387b2bd5cf0c14754a8fbdc59a459472a3ce7a5c76fec9fe4af9b36704f4f0f91c3b0bf8d167e98dc712c3a45fd99134afac934a544809be02ce5cd2fabbcbeb1a90be2d43692904a69", @generic, @typed={0xc, 0x69, @str='IPVS\x00'}]}, @typed={0x74, 0x65, @binary="b11f4ccd0ae6030773470edc9af09d8203a94f56bf49e228e3a658a50a3bf11b8fac5194492f4360fe5f5506de66409bef3dfd227a02ad45aefcd0a69df50a7b6fed76262638d7eb545efa2ffb53802a9e7267423600226fed1d88957ed93ce8c9e65022fb459f04ad17c219e309"}, @nested={0x54, 0x5f, [@typed={0x8, 0x5e, @fd=r2}, @generic="df6488545e1d3f5d9580416d68d451201b5f7fb4d7187a599a46fc4e3d42181954083e4461d7b5902a5c4006a9cf1a2f8af141862ea6ee6549ed6c6913", @typed={0x8, 0x0, @uid=r10}]}, @generic="944c67c42cefaf5b4228ba4fe67b6721f953950900060919877b1df57c834b631196b2707b9d56bb4d888db951ca7e52746670fcaeaac061b3f15b08d724445f3b008544a0af53b7bda21e45f912203576721e7535dcbccaad0f801f705b13debbc0d461", @generic="4fe05f27b381cd976e9a3f494fbfff1430d6786bd720f75a1b7af4d74c40b695c3a41792dccc2327a545fc5b92d639ba"]}, 0x2fc}], 0x1, &(0x7f0000002180)=[@rights={0x20, 0x1, 0x1, [r2, r5, r4]}, @cred={0x20, 0x1, 0x2, r1, r11, r12}, @cred={0x20, 0x1, 0x2, r1, r13, r14}], 0x60, 0x8000}, 0x10) [ 84.520338] audit: type=1400 audit(1545369810.352:5): avc: denied { sys_admin } for pid=2091 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 84.577000] audit: type=1400 audit(1545369810.412:6): avc: denied { net_admin } for pid=2097 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 89.446119] audit: type=1400 audit(1545369815.282:7): avc: denied { sys_chroot } for pid=2097 comm="syz-executor5" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 89.476345] audit: type=1400 audit(1545369815.312:8): avc: denied { associate } for pid=2098 comm="syz-executor0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 89.526942] audit: type=1400 audit(1545369815.362:9): avc: denied { create } for pid=3666 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:23:35 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000001) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0xf2742ce72eb24f6, 0x0) write$P9_RMKNOD(r0, &(0x7f0000000040)={0x14, 0x13, 0x1, {0x47f, 0x6, 0x7}}, 0x14) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x3f, @multicast1, 0x4e21, 0x4, 'none\x00', 0x20, 0x3, 0x49}, 0x2c) lseek(r0, 0xffffffffffffffff, 0x3) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e20, @empty}, {0x2, 0x4e24, @empty}, 0x4, 0x0, 0x0, 0x0, 0xbca, &(0x7f00000000c0)='bridge0\x00', 0xc25, 0x8, 0x3}) rt_sigreturn() creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 89.527456] audit: type=1400 audit(1545369815.362:10): avc: denied { write } for pid=3666 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 89.552260] audit: type=1400 audit(1545369815.382:11): avc: denied { read } for pid=3666 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 89.695305] audit: type=1400 audit(1545369815.522:12): avc: denied { setuid } for pid=3702 comm="syz-executor1" capability=7 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 05:23:35 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RMKNOD(r0, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x80, 0x3, 0xfffffffffffffff7}}, 0x14) getpeername$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={@empty, 0x70, r1}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x3, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 05:23:35 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0x704, 0x1, 0x200, 0x8, 0x1}, 0xc) [ 89.754997] audit: type=1400 audit(1545369815.582:13): avc: denied { dac_override } for pid=3702 comm="syz-executor1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 05:23:35 executing program 5: r0 = socket(0xa, 0x2, 0x75f3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback={0x0, 0x8}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x100000000, 0x9, 0x44e, 0x7ff, 0x3c}, 0x14) 05:23:35 executing program 1: r0 = socket$inet6(0xa, 0x2000000802, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/10) 05:23:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) r3 = getegid() ioctl$TUNSETGROUP(r2, 0x400454ce, r3) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400202) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast1, @dev={0xac, 0x14, 0x14, 0x1e}, @multicast1}, 0xc) 05:23:35 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x800, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x8000, @local, 0x4}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000600)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0x2, 0x3) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000180)=0x912, 0x4) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@ipv4, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000007c0)=0xffffffbf) connect(r2, &(0x7f0000000440)=@ll={0x11, 0xfd, r3, 0x1, 0x4, 0x6, @remote}, 0xfffffffffffffdab) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000740)={{0x2, 0x4e22, @multicast2}, {0x307, @dev={[], 0x1b}}, 0x24, {0x2, 0x4e22, @remote}, 'ifb0\x00'}) sendto$inet6(r0, 0x0, 0x2f1, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x200000000000000, @mcast2, 0x3}, 0x189) recvmsg(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/36, 0x24}, 0x2000) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000680)=""/192) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={0x0, @dev, @multicast2}, &(0x7f0000000340)=0xc) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000001c, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x400000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000140)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000240)=0xe8) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000001440)=ANY=[@ANYBLOB="66696c74be41bce768b4e267c9a247200f124c00657200000000000000000000000000000000000000000000000000000b00000047e0a0ff88ee35b068c102dea5ed129823f07292b89e98a81b47cccf6c99d7016fdd79792cd17556858ce7ff2ee76b6df6eae1430428b1dd5c876fa97796d75abe45dbee9a4407f56b9a1106cd438c4a4e1e015078db54fe347ea327208bc358f7808b895c2db25651d1f8c0ae1877b5e7ab9ec5f77a435f230738ac48144636e5e33e583b765d16253ca74c4b01122cdbc078c2e644d247b2cd85523bb840ce51f441a9b4fdd9cf147c66"], &(0x7f00000003c0)=0x2f) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000800)={'TPROXY\x00'}, &(0x7f0000000840)=0x1e) bind$packet(r0, &(0x7f0000000280)={0x11, 0xff, r5, 0x1, 0x7, 0x6, @dev={[], 0x18}}, 0x14) r6 = syz_genetlink_get_family_id$team(&(0x7f00000008c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000900)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000a00)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001280)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001240)={&(0x7f0000000a40)={0x7d0, r6, 0x108, 0x70bd27, 0x25dfdbfb, {}, [{{0x8, 0x1, r5}, {0x7c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r3}, {0x174, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff01}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xff}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r5}, {0x1bc, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfb}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x92ec}}, {0x8, 0x6, r4}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xe36, 0x8000, 0x5c, 0x2e1c3f45}, {0x800, 0x4, 0x2, 0xb51a}, {0x7, 0xf034, 0x10, 0xff}]}}}]}}, {{0x8, 0x1, r3}, {0x44, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8c}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x84, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r3}, {0x148, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r5}, {0xf4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r5}, {0xcc, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r3}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x7d0}, 0x1, 0x0, 0x0, 0x80}, 0x80) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f00000000c0), &(0x7f00000005c0)=0xc) r8 = socket(0x10, 0x802, 0x0) write(r8, &(0x7f0000000000)="220000001800071400be0200090007000200001200000009000eff0005000f80ff00", 0x22) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000001380)=""/135) 05:23:35 executing program 5: r0 = socket(0xe, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000040)={'raw\x00', 0x100001c6}, 0x228) 05:23:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x800000000000802, 0x0) sendmmsg(r1, &(0x7f0000007e80)=[{{0x0, 0x0, 0x0}}], 0x400000000000102, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x8200, 0x0) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000140)={0x7, 0x2}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) write$P9_RFLUSH(r3, &(0x7f0000000080)={0x7, 0x6d, 0x2}, 0x7) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f0000000040)=0xfffffffffffffffd) write(r1, &(0x7f0000000200)="240000001a0025f00485bc04fef7001c0a0b49ffed000000800008000800030001000000", 0x24) 05:23:35 executing program 5: syslog(0x8, 0xfffffffffffffffe, 0xffffffa6) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000100)) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000000)=""/215) 05:23:35 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x2, 0x0) getpid() ioctl$EVIOCGUNIQ(r2, 0x40284504, &(0x7f0000000240)=""/240) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000001c0)={0x0, &(0x7f0000000080)}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0), &(0x7f0000000000)=0x14) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ftruncate(r0, 0x7) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x800, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r4) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r6 = open(&(0x7f0000000140)='./bus\x00', 0x8, 0x0) lseek(r3, 0x0, 0x2) getgroups(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000580)='./bus\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1, 0x0) fstat(0xffffffffffffffff, 0x0) stat(0x0, &(0x7f0000000640)) sysinfo(&(0x7f0000001000)=""/4096) sendfile(r5, r6, 0x0, 0x8000fffffffe) 05:23:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x200000c, 0x32, 0xffffffffffffffff, 0xfffffffffffffffd) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000001080)=0x1e) 05:23:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000000c0)={@broadcast, @multicast2, 0x0}, &(0x7f0000000100)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000300)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000500)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2800800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c010000180000042dbd7000fddbdf2500000000000000000000ffffe0000002e00000020000000000000000000000004e2100004e2300090a0080202e000000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="00000000000000000000ffffe0000002000004d33c000000fe8000000000000000000000000000aa090000000000000007000000000000000000000001000000ff7f000000000000050e0000000000000800000000000000df0d0000000000000600000000000000090000000000000000800000000000000100008000000000080000000000000008000000001000005f60000029bd700000000000020003031000000000000000000000000000000008001d000600000008001d00ff7e00002c00130000000000001000000000000000000000ac1414bb0000050000000000000000000000000000000000080018000600eeff"], 0x13c}, 0x1, 0x0, 0x0, 0x4000841}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000d62de1669d9a471dcc424a444dd22d41ec0e2b9ba64b40678b6663aa6e33538d915068ef25237267a782004ace9311d596bf17c5e4f25e6dcafa0fd6b694ec83bab47ce2247313abd0ea955489b281d37eae85ce77962480f686452a94848c6cef03fa30f7c9c0ab7d8fc8b4124d00000215a25ff10bff04be6018cec6fdc741be89f6c73f36f5e70e9426d2443cd4c46201cb89b9358dba1f74470517296f27a8c259f1201ac6892a4156f29d15d04da001fc55c14afa60ffc4d7e900861e508b6a41baf3800c90e5b5040f022ef1489543473b83692044"], 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000e80)=ANY=[@ANYBLOB="cc0000001b0001030000000000000000fe800000000000000000000000000000bb000000000000000000000000b65fad04000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bc0c0000000000000300000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0xcc}, 0x8}, 0x0) r4 = gettid() ptrace$peekuser(0x3, r4, 0x5) 05:23:35 executing program 1: r0 = gettid() select(0x40, &(0x7f0000000080), &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x77359400}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000100)=0x3) tkill(r0, 0x1000000000016) socket$inet_icmp_raw(0x2, 0x3, 0x1) 05:23:35 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x1) io_setup(0x1, &(0x7f0000000100)=0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) io_getevents(r2, 0x5, 0x1, &(0x7f0000000280)=[{}], &(0x7f0000000300)={r3, r4+10000000}) r5 = dup2(r1, r0) clone(0x10000, &(0x7f0000000040)="2ca9ae7b59", &(0x7f0000000340), &(0x7f00000000c0), &(0x7f0000000180)="a3fd7ba846b46a043cf6e0f7ff6697f55de865fc228f74c3a37feac5f4e1019359430f3c4d0a84d31340a9b8d6b651dc386d7dc95c0deece8583b705cac0f3faca902825ef52875ced043fe2e919269a2cea9b73e434dc794aeb4816155fe9504da1e79da5f45740e17258580eba6b249522d2d350eaddea0fced95f17a10f4ebb1bde932e3bc2854c536e5d3eadc5361d00c45193bb31a937b8cbd4d256011846b3db032395fe38b623e5b1f23c712b4fedb791e52f26a7141582e92685716d87818fc4714ada8eb7941af9bccc2f516a500caf") r6 = fcntl$getown(r5, 0x9) sendmsg$nl_generic(r5, &(0x7f0000001640)={&(0x7f0000000080), 0xc, &(0x7f0000001600)={&(0x7f0000000380)={0x1260, 0x31, 0x0, 0x70bd2d, 0x25dfdbfe, {0x18}, [@generic="53025319b61c9d50c49ab25e19a9afbb368a167d533d26363faf35cc8132a9fe8b4f9379902cb9ad2bc2f917a4c19ea96e69a282a53f19fb2fecf1ce2ab0008e184b63ce71d2c381c57555ae2b7a1bd76e16b678a047db95f3d8040ce682", @nested={0x11e0, 0x65, [@generic="e25afe8698f88f9990d0e8fa196ed2c6774ea296101f6042e69b", @generic="0042399fe026c43de87817d1d866737d3c9f3963e8888629874bdbd76925f9b9f561e2dc7730c10c9964d10fbac10cfcfc922af3b0ca4cb68105705cf813b669988018a5e9c03636a655f7fe45f28d058d6d185b923599ada6", @generic="bfcfae284c25eb35aeb31b3286c4073ac3a8e1b81786224595e590a85ba0ca978882032b3e270ca9c3ae9c2ee7390dce5c5f57037e72f4c1165ba5cd14b4f82d6a0d7cbad51c94281432ef11a76da10a39596d712e4c066f", @generic="ae4571bdae125b595b90f5339c69bb2a389fcf149c02689931c6bd4b559d7b9d7d0277c472569861b96d76c2dd7377f01b5e825a419a1fc05bc3c371bccaf8a37bef39710ce929f7b5859368e94a22f381ed097010c0facc90684efe557e735400ff6dc56b3f35a5214273bc3a273a1c425b318394a23df74fbb0da795b87a54560ad21bf4f56cb4496e27e217ab41b07bdc291986dee1393bda06089a35ad318110350d8c183eaf5a34ded76967420f2ef23bb1fab5b4cbeb733aed3d3e2d508289c58f7f887fe88c7b565385c8a81f750aa54cdeba7760d655e692653184359fb24763d54fa589e590b5175fe46e951059dbd72cecdfeaadb73faed66513c64c035388debe2bf01eb7776dd08a4b071ef7a30d84b4a6334d9973d236829276ba96f2d167b5b98437818a58feb4b7244d393801dbf0aad688f0ad25f7aaf4aa9a1aead2eebb2a4c7908ef866ad36eba41255ea2138e8e6810b0b47f59b774d3f3100655d3df31cd8f112dc35403a9ee6fd76e847ce3e07d80b6354bc1470ebc2552b1828c3e9e176a72d5f002943f134de6a363ebdcef85221c359f31ba4252cfdc1e0fb53acd3b3a7e14a5e8c0faeb19fa2806e5f28cbcebf96e42bff2ee6c9779ce121a1fae6dc14c5517646dff39eae65ad54941957ce51ea54a034f145ea07b7a0244f170e0f9576e8b7c2667badcf4a946a8c8dcaa1652a811a9957e1c3cf4bb3397fc9a0736d2a2745d8a81464d100b8d4c87a0e408a5d9bd03b51bf362bfc23a9506b7d17175a51d96e41fc15ef3a4c12ec60cbc03aa764b6e595984380232656ce96c64aba484d53a2a99055107bcf40c47299b7ac60e5e58a0381d00b3e20db56fe8e9f805e451e915e2ac72c224a2583c7862934c5d8361cfa127f0e79ce0da144599ebf77813be3937291aa8adf31cacfff9db2de392bbfa37ba038657af4c14d3a50bb5841ee953adc33fd94c2ecfaf075da3887c69235c14faeb87bf93451b97adff5fb6a869f90f31c7c8fc62b55817fe29cef4ebcfdfc25643bd014fcab5f5deea0c00bdf54500903ac99401e0262bacbaff5f09c12a58e9cb1101365fe77736dff52a1279eca4ac0f77a6b6e84bc7857a71c0e0b38adb04d0129f8b16cb6f2d5f5ff85f86abd590fd080ca0f50c678e2758070b4e1a1abe73a5567a10d350f24cb9c1d630ddef69de13d95f524bd31a1beb535a3b4ef0e509a58f9ab337384752f234dfe9a3a85615a3c166c15ca236836cd81ad47b8c9d4365948c5711c1b0e41da55b3718f4ee6129e977d084ebce89981d70beb3e3d244047b9baf46f87801cab34e652ab579df61296b3eda7ce355bf35ded65e27a0d3462f1f0e007c966fd14cd06dcd4a84d2590b3b772598186434aa77ef78b53483794a89a154708170ffbff67f0ef30f3de720ed2bba3b18fa20ac31773797cf6c59d9493cad62652acfa547c9bb1572e3f417e728eba463304d37ea0468583b25dd8ac1d597b988d2d088254db2c3c5ea2be7e9ccab48544c04a9fcaf9a0a750c780a519266ed60e596e38331b6d4f7b31cecff42ed7e6745f5ca6b6baef92c5e9a47715bed5309ecbe60b0e5bd953df61433db22541b41ec2caf379504960a16d8de566c792e14ab28896efef33cea90e726c35364cdc45a5a6913b5909d2cf0948f56603de996730e6e589b57b835d900f987e3d8e2733f10280bef9e47b52cc16edfdb27c475e939111ef3b90b9963f7e8875c866310e3cc54ad9f0ef53b6c6e39e650bdbf8310dd4869b027a2d0dd306d6735a04d4bae54917af1b7c8f69694976d02ff5f46ce7e3e958525fbd7a9b988a8f9430b05eda738c9a3deb601f9a3875d02c099a3c2e6f5a1e413992004223f4019ec95e257c6bc580510090782ec7ab29fc28932614cc29f42af2b443fa079eb77bd12a760449fa4ae899fa008b5534be7b9245d5c6f074457105a08a404502fbc2273cd7bad9e133ac0c16650969f49a791817ba1e58b35e36a9594132279d463d407556cb234d78819b2b090e7623697a3561a7d1c309af0a4fa7b40caf3e1a134570582c668a9a78c3dc2db699bacbf1c20356574f011ae97f45d59ee28303b7d5d47e2c153e59a80564efef88340981d37472e88288bc694fd576455e50a6b3b8c491c2e4e061c94f9e6d458cc1cae2d194f1561a2f7a4a630a757c000d5477fe3b406035c15f3acc6ce1dd8d996a976da7ad73977a697ee63885a04dfff839ad9fdd86c5ee5199a481d994fabe194896d06e116bd3c66f81f46eea3daa66cdbda84530d7e3ad6da7f989e19eab698da223d77068c6960c3fc8294209c7b378c1c54aa945a0cadb04c80e62ec525c775ab459e03d2ecc6fe86ac91387f6cf4efe6cd804ae23ad0eddfa10c1d730b3a5034ecec5036658d5d1065cc7ce7a423150b9b0f47889c48ead15916873b4ecff43e44c3e2764e663cc933d60e44bd01db5d0d6215ab851545a20a36374495a9699208706b2f52d8d76ae73624bcd6a565e191a2979cdd1c63c0eeebf3ab464854d2ff578a86e95ed5cad2e6cee0aff591a159603d6d9295ec5c5d69c69fdcfd0bf5ccee172250cefe4629c6065f351d0d87bd472be717b58c29cff694ea2fbd431eeada20d50e0dbc6a254e07b6e182e1d51c5b7291aef32feeb5db8510dda5cb21a80391a3045fd2b2285126c1e4f9a3df10e4b0cf2f4716c5f5261c7e9e3cd02fdf3aa0353e2046d050a3256fdf125c58020c5a5bd7fccf0508990cea1f2e7e22481a42e925eafc321f428609ebc94df895308bf5e4ef2dfd191a1fc8cf5e4873680b178cdfaca3f3755d66b7f87142c2b9f162f6b10e28a31ac97657ec4e8256fff3ed4b8eefabdab52daf0ba869b0bfffbba443b86b8b87fbcf985b537afb7f5eaed3328d8116df01b8ded54d7aa05a54c5c0332d759b97a53c827aa0cb15c606cd504f1c298a4ab54b91f7da5a5a53d78e42fcbcd0254d45224a47f7525455b5466fb7adabb2e48e25dc9f556b498c3a182827f1a306a23f7e1a24640f9b31ea7dfd69365523d74675dc5b585c888028ac5fa797b125a0d0012bbc6b5bd31eb64a5c56661daa9e1ffa051c023916cd074b98864fd868646a9f4f0703697f633919c996c2cf1b15f3ac73b256fa09027555997dc0ff6994d0382c3ca1c5ec8a6f9bbcf555a8ebb0913ab79bff5b7a9c1efc65243990f924d9a4238c7e6d1c8860bdc44ebcaf95d4345249e24cdb354fd749d6281b7ccf4ce6d3a0bb46f99e9dab4ff10ad0157cf15477b63d7f6985978fa6366f7a78526ff589f42da442b8e41e373c0e9a6a3fcf6db3803f7c7b2923281c79d56561cb9580ec9026a044ec62c343be94d5933b0c846ade21ec5d33e6f74de24cd3106ca0cf82d122e7aa3d48e4c49e1285c66ed9890d5fca19f5b0f59128eb90ff22b181400c14b8586452556f3fceb07596f84f67d66060da78e29165e231740bf3477a94b3e535d9455800a82821a7930b438eb272563089e53e9bbeacaa788af1bed0f079bd5058221cb20507f99edc92b192e6f7fa113645a5fc6f1f6bec3c6b6de1d6aeb855d8cf8b59d7bf32a444806149c7ff13039edbc51f94bb199b4a8bb49d6d403c6811cafe7d6a1933fb1218aeee8e6ddc8b8493f133cd3744d6f9fe13950c7440869bc7dceda3a732161c1e6bc8cd5b41ec9ee60572d6802dee1dc20d5a98e40b6d8efed22816166708c4103b81c22ff8388f5103eb1d67867600611b36dc1dc5329be8dd9294ca7f70cee9f06e59ae571e9d8705920ea4f8cc88205e14150b88ff962fbcb7c3e17707b9896c67ccd104ef12b2b729e3b13c8b819be43d72b11e58b22ece97d7d499df1fbdd7d59f71523ba123d19218d04f134b99ae830dcd96ba3f25162819bc16e0ceaec80446ccd415ade0a3445e65ae904f0233819311b4666c0a645b47cb76d20ae70a8ddbdccaba8fef9d92a57045817dade4cbe91606166c1e3fff385e52db6b65a1a84ae1f393631acd74d30396f4fb7cad7f26bbaa7e50701e61cf8a2c997fe5aea5cfc3103fe21664faea09cc6ca61542446cf1e8c05abb6f662f9bcfe99db29642ace2c65749c34ea972ec3e8284935d225462ea3f322eeeae3a0f71578c7c526fae935a459b217f6d38cb3af9e82159e5f84ddbfc61566c24c94bb39237c7efcbc8964a047bc052e4d33cb7dc68851eed535cf8a433fe157a6ca245121fbda868a751d20ab6e614c5e4ba216cf08c5ea75770943ae6de6cb657b7e3d4daba7338906c98b0b0f01ba750054c1503802f09115b852d7aff3612842d16242748519b58f4728edf4e9bca3e793f81c551619f41c012a4ffe7ef45bbc718d98dc03b973e3f4790fcabbafdace2d6ddcd2936922108314bb580ccd27bcca27387ac0e937621cce0c4f56d8e813b776905edc684538818e80f6d703cb91cad11ec075f0a4480f5869c20da03214837197552500483e94bd8214741b8c3a6e7519b3382ec9031ee6fd32361bce67fe66b55a0115ee3ee19f50d770e23156be1571854e92741393979e366c842a5f639d154452288b0d303d9034ee969fb3a447beda406e01c4c9588f637ea33e2f31846733af484856d836ef29478a890632aef56e0fbb755af8f31c1eb707a5a4f836bf538ce8843196c2ee06da7de89c80c069f70e7fbdb154a97e031291ac3c1b898bf0b85c34c764d24bcade5739fd8585f3f9d27001094fbb3c7d17a07160ada64733c434865d4fa87b612d4d4bac3c3a58b962e7d5ff61edf2c58c42b382a5df175ba2ea1a52a8739eb2851b55af70d81500f7aa1611e43a8d7ad0015acff9e2abed1d349214b9662a5db2012617423a27f16fa9be5767caef2eebb14bc5a9ae3ce48b2a9a73ab03fe0f1853147131965500345e121f32efc0c7272f82ce1d7886c5a99561829f9943452ccf8dd74dfd784eb87ce6b762a4c9c51f85c553abdc90f4ac75b43078cc7b6e4e62442534aa5c2c5a9a217e0b31e8f7201b174cb5d1310b0c6f30430abf0882d1039c60ee2bb33e504961f8e1ee7ef33517a1a40a5758bbd5d3b58d3ba7e95f5ab95bc09d4d75568732d141f81030bd172ca2dc04449ec9d447f70a4cee2913388d1bffadeb51ee674d4b5fd85ab77d1ba24d906d9c725ba9f3fd8e42398df636a49584e4e853ac755879618b9668786f2902e9a78d2d3b1aebb6273c2438fc7f3bbddc5d82bebfa69118968db920d60d8ccf53851f1ccb6a81ca317c2312ebfc137e15ece218fdcdc29ca741b74354d80066cbe7c1e521788996a3adc3e697cae2c15daf2c490cc65ddd60eb096b40f55ee40158d5429d5ef0ab7b64f4c94dd0abc023d8b58fc9136578d31775feb18a1cca429bf9f45d4248d9131d6c0969e95161c55227567fad7082c3eaa8e565170b530ffe03700556eb46a22672236d89c4db45fbc9219929e7a88ee5cb0b680298d89d54f471149ecf99a988d7397837a032d58af9b29e755992e00d68fcd02aee3214365d4eded6fb8ee212c65181eaf44ede50c78370cb67a55237b03c9087d2e0b11e70e90bf8ba2fde33c75136df9916887f9b870fbb2bf505e268a1509cf09c5b7294b672e43cee683ef91a5e1349290b9dddc87fb330713c1f6ef8af3ebfa613f5044dcbe7e815452ad069d8603dafe7940cc2ecdb9e9b8ade2b3eb6a925b2cb304b195641586286d705671d421b76264b70d6b2471d5813365423b4ff2c7169d205aa0ae3ade913d705751714ae8dfbd8e0fa38bb54680c02de2320997c1f8f4de8fcf0050f032", @generic="e123494e290fd664238724d92b956f04742e34f2877128cbdde0eee18114b613959ca46be1d37a110dbbec04da4db61de69935eece8a6cc04cf0db59cad9f05ebdde3c75f103fe99b9f2838e470c081b996a99c984925a983694480f4e0fa211f9759e3937dfe93c7604eca0c17ee7484686372752add0e656b47a23631e40b7bd9dda8e03a46d4732dc03f8cc6c2f676360060e9969800297263a0bec3659d552f43d4449b0c48a0b314514990db8358c90173174774c147edd891b5d7af0717bde256f2004def0abff769eee04007db64aa116efb45584c3134014ec4465", @typed={0x8, 0x30, @pid=r6}, @generic="2c2520805cff975ee035ac9bebb96e5b34de26fee2bc87ee36118963b764003a1292db8f7ae103"]}, @typed={0x4, 0x49}, @typed={0x8, 0x3, @fd=r5}]}, 0x1260}, 0x1, 0x0, 0x0, 0x4000000}, 0x44) 05:23:35 executing program 5: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x801) write$tun(r2, &(0x7f0000000040)=ANY=[@ANYRES64], 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)={0x3}) poll(&(0x7f0000000280)=[{r1}], 0x1, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x185840, 0x0) ioctl$FS_IOC_GETVERSION(r3, 0x80087601, &(0x7f0000000000)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) open$dir(&(0x7f0000000540)='./file0\x00', 0x27e, 0x0) 05:23:35 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) socket$inet(0x2, 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2a) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xffff, 0x4, 0x36}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:23:35 executing program 4: r0 = eventfd(0x401) write$eventfd(r0, &(0x7f00000000c0)=0x522, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) ioprio_get$pid(0x1, r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x0, 0x0) sendmsg$nl_netfilter(r2, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x20, 0x1, 0x1, 0x1, 0x0, 0x0, {}, [@nested={0xc, 0x12, [@typed={0x8, 0x0, @pid}]}]}, 0x20}}, 0x0) [ 90.073432] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 90.099200] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 05:23:36 executing program 1: r0 = memfd_create(&(0x7f0000000200)='ryz0\x00', 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4205, r1, 0x0, 0x0) tkill(r1, 0x37) socket$netlink(0x10, 0x3, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) getsockname$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f0000000040)=0x10) ptrace$cont(0x1f, r1, 0x0, 0x0) 05:23:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)={0x3, 0xfe, "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"}) r1 = dup(r0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'lo\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="19000000000000ee27a600000000000000000000000000000000000000000000000000000000000000000000"]}) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) 05:23:36 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x4000010004002) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x10000, 0x3, 0x0, 0x1, 0xb, 0x0, "8a10b69fbe98351773eaa51e5b91713b37f9fb4887fc900200aff5a1ff4e18186042e8804e4a64da044662439272c3f86fe719e1790f58a3d09b00", "90ba0603da596385b7f4616f7e828c84850d81e2aaf844779bf5b98bfb4d74745977c4937aee912b3828b09533e43376232f8a62ee023a5660becb591f61b4d3", "8606471ec9170b0d7846279f1a5c123ffa1d1c643d72d73b29c9b46fc06c7e5f"}) 05:23:36 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1f) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) [ 90.143677] audit: type=1400 audit(1545369815.972:14): avc: denied { create } for pid=3837 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 05:23:36 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x2, 0x0) getpid() ioctl$EVIOCGUNIQ(r2, 0x40284504, &(0x7f0000000240)=""/240) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000001c0)={0x0, &(0x7f0000000080)}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0), &(0x7f0000000000)=0x14) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ftruncate(r0, 0x7) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x800, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r4) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r6 = open(&(0x7f0000000140)='./bus\x00', 0x8, 0x0) lseek(r3, 0x0, 0x2) getgroups(0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000580)='./bus\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1, 0x0) fstat(0xffffffffffffffff, 0x0) stat(0x0, &(0x7f0000000640)) sysinfo(&(0x7f0000001000)=""/4096) sendfile(r5, r6, 0x0, 0x8000fffffffe) 05:23:36 executing program 5: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) recvfrom$inet(r0, &(0x7f0000000040)=""/194, 0xc2, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8084, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000600)=0x2, 0x4) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r2, 0x600, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x9, 0xffffffff, 0x263, 0x8}}}, ["", "", "", "", ""]}, 0x30}}, 0x4) sendto$inet(r0, &(0x7f0000000000)="dd", 0x1, 0x0, 0x0, 0x0) 05:23:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = syz_open_procfs(r2, &(0x7f0000000500)='io\x00[\xfcW\x16\x9b\xab\xeeT\xed\x16\xe3\x9ez\x8f\xe4\xb9\x00\x16\xf2f\xe3\xf60xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) 05:23:36 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000280)='/dev/keychord\x00', 0x80, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000140)='net/fib_trie\x00') r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x26) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x5dd, 0x8a, r2}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000000)='\x00', 0x4) ioctl$TCSETSF(r4, 0x5404, &(0x7f0000000040)={0x80000000, 0x1000, 0xe70, 0x8001, 0xffffffffffffffff, 0x8, 0xffffffffffffffe0, 0x8, 0x3, 0x10000, 0x80000000, 0x1ff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x1c, &(0x7f00000001c0)=""/188) ptrace$cont(0x1f, r2, 0x0, 0x0) 05:23:36 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) close(r0) io_setup(0x0, &(0x7f0000000100)) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000003c0)=0x6, 0x4) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/79, 0x292) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000440)={0x50, 0x0, 0x7, {0x7, 0x1b, 0x6, 0x0, 0x0, 0x8, 0xd01, 0x67}}, 0x50) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000580)={0xff, {{0x2, 0x4e20}}}, 0x88) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/54, 0xff55) set_tid_address(&(0x7f0000000400)) r3 = getpgrp(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x40, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000940)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000180)=0xe8) getgroups(0x2, &(0x7f0000000640)=[0x0, 0xffffffffffffffff]) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680)={r3, r5, r6}, 0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="c2000000000016001d60d7ad0e169028b8caf7e134fd4d16dfeb46b12a541cc09f6b3e65fae17153c57231ddbab44c8592dbf32c5437102f00000000000000000000000000000000"], 0x1}}, 0x0) r7 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDSETKEYCODE(r4, 0x4b4d, &(0x7f0000000340)={0x3, 0xd4}) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f00000004c0)=""/67) ftruncate(r7, 0x2007fff) ioctl$TUNSETOFFLOAD(r7, 0x400454d0, 0x13) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000700)=ANY=[@ANYBLOB="0000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000040000000000000007000000000000000700000000000000000000000000000000000000000000000000000000000000000000007c0b0000050000000000000008000000000000000600000000000000810000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000"]) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f00000001c0), 0xfffffef3) read(r8, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r0, r7, &(0x7f0000d83ff8), 0x8000fffffffe) ioprio_get$pid(0x3, 0x0) [ 90.248293] audit: type=1400 audit(1545369816.082:15): avc: denied { write } for pid=3837 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 05:23:36 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x11, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f00000001c0), 0x4) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000180)={0x8, &(0x7f0000000100)=[{0x3ff, 0x40}, {0x0, 0x2}, {0xef, 0x8000}, {0x7, 0x10001}, {0x1, 0x1}, {0x80000000, 0x2}, {0x9, 0x5}, {0x6, 0xa8c1}]}) r2 = open(&(0x7f00000034c0)='./bus\x00', 0x100000141042, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000240)={0x0, @broadcast, 0x4e22, 0x4, 'ovf\x00', 0x26, 0x8660000000000, 0x6e}, 0x2c) memfd_create(&(0x7f0000000040)='\x04', 0x200000000000) ftruncate(r2, 0x10099b7) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f0000000000)) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000000c0)=0x3, 0xffffff95) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5}]}, 0x10) sendfile(r0, r2, 0x0, 0x8000fffffffe) connect$unix(r1, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 05:23:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="0e1000000053a60d7b0600000000000000e5b0a43bd32ad0568d32112fb034010000005a9f71233b2e6dbb3c9ce1e68d0537589e859d3b8cb0322d056e1af87a28d1ac096eb0daa71699738bdeffe18d0103b67da2d1b75ca60aa1b69049c309210a546e640ecd9684a6b08b136e80b2a1bbeb16978a33a265"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) bind$unix(r2, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x7, 0x0, 0x9}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000200)={0x0, 0x0, 0x22}, 0x14) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000140), 0x0) [ 90.329832] audit: type=1400 audit(1545369816.162:16): avc: denied { write } for pid=3880 comm="syz-executor4" name="net" dev="proc" ino=10205 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 05:23:36 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000100)=0xc) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@local, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r0, &(0x7f0000000500)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbff, 0x10000}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000480)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}], 0x58, 0x1}, 0x40000) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) [ 90.382916] audit: type=1400 audit(1545369816.212:17): avc: denied { add_name } for pid=3880 comm="syz-executor4" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 90.408061] audit: type=1400 audit(1545369816.242:18): avc: denied { create } for pid=3880 comm="syz-executor4" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 05:23:36 executing program 5: clone(0x210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x600, 0x0) r2 = fcntl$getown(r0, 0x9) write$FUSE_LK(r1, &(0x7f0000000140)={0x28, 0xffffffffffffffda, 0x7, {{0xa34, 0x6, 0x0, r2}}}, 0x28) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r3, 0x10e, 0x6, &(0x7f0000000040)={0x50f7, 0x1ff, 0x4, 0x5}, 0x10) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e759616000000fff9000400c0acd6327f07d6f57d85c56f5bac254253000000005927f2904c0d747ab7530bc64919217d2bd39e9890b674002d00000000e9088a1ff9dc010003000000000000000000004a2c9f00daa78b2afec6d0c8706a94ae91c741e7"], 0x72) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f00000000c0)=0x4) ioctl$RTC_AIE_ON(r3, 0x7001) 05:23:36 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x4006, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x80000000005, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'\x00', 0xffd}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="030000000000000008001b0000000000"], 0x1}}, 0x0) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000340)) write$tun(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="008400103f0000000001ffff001e0000ffb5afffffffffffffff000000000000ffffffffffff0000"], 0x1) lsetxattr$trusted_overlay_nlink(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.nlink\x00', &(0x7f0000000400)={'L-', 0x3}, 0x28, 0x2) recvmmsg(r0, &(0x7f0000005740)=[{{&(0x7f00000001c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000480)=""/246, 0xf6}], 0x1, &(0x7f00000007c0)=""/52, 0x34}}], 0x1, 0x0, &(0x7f0000005880)={0x0, 0x1c9c380}) dup(r2) close(r0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000300)='TRUE', 0x4, 0x2) socket$nl_route(0x10, 0x3, 0x0) [ 90.498997] SELinux: policydb string SE Linu– does not match my string SE Linux [ 90.507153] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=3912 comm=syz-executor4 [ 90.507217] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=3912 comm=syz-executor4 [ 90.507273] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=3912 comm=syz-executor4 [ 90.507330] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=3912 comm=syz-executor4 [ 90.507387] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=3912 comm=syz-executor4 [ 90.510071] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=3912 comm=syz-executor4 05:23:36 executing program 3: r0 = memfd_create(&(0x7f0000f9dffe)='\xc4\x03', 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bcsh0\x00', 0x0}) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000000c0)=r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x1040000000002, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x53a) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00\xec\bV/\xe8\xb0+CN\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="402400f476f70000000100001a00008878513503", @ANYRES32=r4, @ANYBLOB="0000000000000000140003006970365f7674693000000000000000000c000100aaaaaaaaaa000000"], 0x40}}, 0x0) [ 90.510132] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=3912 comm=syz-executor4 [ 90.510188] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=3912 comm=syz-executor4 [ 90.510245] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=3912 comm=syz-executor4 05:23:36 executing program 3: creat(&(0x7f0000000200)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x23800, 0x0) quotactl(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="100000000100949ffdaa0d3b963f0000"], 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x241, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="0000063dc900000001000400d2"], 0xd) write$eventfd(r0, &(0x7f0000000040)=0x100000001, 0x2e9) 05:23:36 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x1ff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="969e1f7895c4cd07f230916cd99e7a9be38a792b8889084295bcd513b5b640e442d6e85e35f342968a5106ad379d4ed67febd18c698942700d674defa6f9438b0ffe3ecf6cda6788701a928dc9b74ffc7b41b4a6ddd450f35a8c85e5059f93dfec1a20b0380b0154775e4d4912351059f64986d2df3bcd112509bd8d742fbfc56016d22cbc0d7f671cb219470f9be69953dd1908225fe281f967c38869f6fa3195bc6069e85d3105eea0fc22b2b4e894d789c6e37652d97d57e2fd94d7dac711d6a9c321f6f00c0c111f2e"], &(0x7f0000000100)='.', 0x0, 0x5010, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x10ef}], 0x1, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x1, 0x0) fadvise64(r0, 0x0, 0xf1ac, 0x5) 05:23:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x800000000014, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) timer_create(0x1, &(0x7f0000000180)={0x0, 0x39, 0x6}, &(0x7f00000001c0)=0x0) timer_getoverrun(r1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f00000000c0)="f6ea6e68b42e4eec2dc26df625955308560a8f0c3055c99e12071b4debc6bf30fa9b3a2c4772c74c3c8e2e9b6616ea7aedc8d2a1f03f81230cf5ce7b9738de4e2c33a8b72193bffcfaa63ebd9615abeb4d767b08d3040f1c765b0224dd5e8b650ca951c7a9a266a593141fd293b915a14a8d6268447fec83cc426e5afade42343419bcc124acca842e74e0f225c2120c968394ce0a2b6f1df7408c3390", &(0x7f0000000000)="dd7e68e9981b23e98da364"}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000040), 0xfffffffffffffffc}, 0x20) [ 90.510305] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=3912 comm=syz-executor4 [ 90.680428] SELinux: policydb string SE Linu– does not match my string SE Linux [ 90.690213] keychord: keycode 12078 out of range 05:23:36 executing program 5: sync() r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x9, @loopback, 0x10}, 0x1c) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/user\x00') r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$VT_RELDISP(r1, 0xb701) 05:23:39 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) read(r0, &(0x7f00000001c0)=""/11, 0x10000031e) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) r1 = epoll_create1(0x0) fstatfs(r1, &(0x7f0000000080)=""/49) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000180)) r3 = dup3(r1, r0, 0x80000) r4 = syz_open_pts(r0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000200)) close(r0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) dup2(r2, r4) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000040)={0x80002000}) 05:23:39 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/jp6_mr_vif\x00V)\xb3L(\x19\x16\xa0T\xe9\v\xa7Fg\x1cA\xab9:\x92\x8e\xda\xff-dQ\"\xe4\a\xdaN\xdd\xc2[-\x98\xd5b!\xb6\xa0\xe9\x12h\xc6)\xae\xf9h\xce\x9fL\"\x0ez\xc9\xbds\x806\xd6\xf6]\x8d{\xe5\xe1\x85\xc9\xf7R2\xf0\xf1\n$\x8a\x02Y\x89\xf4+\xab\xed\xa4I\xe8P\x8ew]\b\xc4-&\xaf:\x87\xaa(\xd6Q\x9cYe\xc8,\xaa\xc2\x81\xec\xb0\xbf') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 05:23:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000080)={0x0, @speck128}) preadv(r0, &(0x7f00000010c0)=[{&(0x7f00000022c0)=""/4096, 0xffffff81}], 0xe3, 0x0) 05:23:39 executing program 1: r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x1) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000040)={0x3, 0x6, 0x0, [{0x2, 0x800, 0x10000, 0x4b28, 0x4, 0x4be2}, {0x4, 0x2, 0x80000000, 0x80, 0x6, 0xfffffffffffffffc, 0x7fffffff}, {0xbda, 0x2, 0x9, 0xfffffffffffffff9, 0x9, 0x7}, {0x8000, 0x8, 0xfffffffffffffffa, 0x1, 0x24000, 0x9fa, 0x2}, {0xa7c, 0x5, 0x80000000, 0x80000001, 0x7ff, 0xd81, 0x3}, {0x8, 0x3, 0x1, 0x4, 0x1, 0x3, 0x7ff}]}) wait4(r0, 0x0, 0x0, 0x0) 05:23:39 executing program 0: r0 = epoll_create1(0x0) close(r0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x20000000000) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000040)={@mcast1, 0x3f, r2}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)={'ip6tnl0\x00', 0x200}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) poll(&(0x7f0000000200)=[{r0}], 0x1, 0x4) 05:23:39 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0xa6, 0x10000000400) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, 0x0, &(0x7f0000000740)) lseek(r0, 0x0, 0x155d80fa1ababfe6) pwritev(r1, &(0x7f0000000000)=[{&(0x7f0000000480)="8bf777469e326b1909334455dc7cadeed174cb18f810ae95991a6433aa61d118be91a0138ac0820d546bb59be40112df9b89ee8a605cfc0aa6cdae8adeb2799f7abb7da3b96420e4dff1edcb0195b6f7209a51f62f23c6c2a26dd5bdeb111802b983d675381218311021b4474864c1887064c692445cc70ae0e8fce78821d39620d591e3308d0b5e1c968322cdacbff91ba642b216548099e6ae30a31a55b76818773918017e63340aa634c5c4d24aa3498c15ff8b8e1b3a3cb74d316b3c6d03536253cbee5c17d725cf47df104699ebb4f66f86a2179d", 0xd7}], 0x1, 0x0) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r3 = getpgid(0xffffffffffffffff) ptrace$getregset(0x4204, r3, 0x2, &(0x7f00000003c0)={&(0x7f0000000580)=""/73, 0x49}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400), 0xc) ioctl(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) lsetxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000380)='system_u:object_r:systemd_logind_sessions_t:s0\x00', 0x2f, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000440)={&(0x7f0000000080), 0xc, 0x0}, 0x10) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000001740)=0xc) ptrace$setopts(0x4206, 0x0, 0x0, 0x100000) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, &(0x7f0000000180)=0x1e, 0x4) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) socket(0x11, 0x6, 0x7) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) sendfile(r0, r0, 0x0, 0x2000005) setns(r5, 0x40000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r2) 05:23:39 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000080), 0x10000027d) read(r0, &(0x7f0000000200)=""/250, 0xe4291016) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x4) r3 = memfd_create(&(0x7f00000000c0)='\xbc\xf6', 0x0) write(r3, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 05:23:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x2a}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 05:23:39 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x4000, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000040)=@hopopts={0x8, 0x8, [], [@enc_lim, @calipso={0x7, 0x10, {0x1f, 0x2, 0x400, 0x80000001, [0x5]}}, @calipso={0x7, 0x28, {0x5, 0x8, 0x3, 0xffffffffffff8000, [0x9, 0x6, 0x4, 0x6]}}, @jumbo={0xc2, 0x4, 0x68a}]}, 0x50) socket$nl_route(0x10, 0x3, 0x0) 05:23:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) timer_create(0x3, &(0x7f0000000380)={0x0, 0x1c, 0x4, @thr={&(0x7f0000000240)="b3780a1a076a4fe364c2b2bf35109c1ce2ebccde552e9e5d0bf00d16b64f5dfe2ac4040b8399", &(0x7f0000000280)="600b22baafb95492f26692bc11e87a71f6d2d4bd3f958f73e513d61e74ae14cdbb4ff51abcbeca8d98f578ca6cf7f8ec1e195800c623595f352696f7f0a30dd9e438ea0bf583027f6461e6487a243238f4eb715f08649aef701c129b3e5b80c8c9baaa15ddd1fd6cb64d85d2a3e82248503d928511cab8859fd49b2cf673b2db424cdb6f3e92605edb4bd4af60c4742e0a54279c4cf1f74f355c0f54e4715d8443b13b184d25986c4286fc4a37360a551cbc0bef36260dd6ce6ffd76674c441dbd267113d209477b3394"}}, &(0x7f00000003c0)=0x0) timer_gettime(r2, &(0x7f0000000400)) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x0, 0x7530}, 0x8) sendto$unix(r0, &(0x7f0000000000)="b17477f01ee2a3ac952e860931321f67a7ae9fa31c3639a7d11cb67085ce9a3eb2d4ccca4778e222db810744c67013", 0x2f, 0x20000881, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x80) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000140)={0x0, 0x0, {0x13, 0x6, 0x5, 0x2, 0xb, 0xe8, 0x3, 0x136, 0x1}}) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000180)={0x1, 0x1, {0xc, 0x18, 0x5, 0x13, 0x5, 0x1000, 0x2, 0xcc, 0xffffffffffffffff}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 05:23:39 executing program 0: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000007ab0f2f540f11369848ebbedfe46dda28d2f5a10b66104061acab11a2a9f3f46b912d3d7837a530e07a3154d29d3b0c34c7de3085bf723732a47"], 0x8) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000200)=@in6={0xa, 0x4e24, 0x800, @dev}, 0x80, 0x0}, 0x0) 05:23:39 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0xff7f) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ftruncate(r4, 0x7ffffffff7d) pipe(&(0x7f0000000180)) write(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r5 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r5, &(0x7f0000000080)={0x18}, 0x18) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000000c0)=0x4000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) 05:23:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0x0, 0xe8}]}, 0x388) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, 0x10, 0x300, 0x70bd27, 0x25dfdbfd, {0x7}, [@nested={0x1c, 0x93, [@generic="75c19d35aa38c92f7a6877cec52a9a1a6e0ea3db0e"]}, @typed={0x8, 0xf, @ipv4=@loopback}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) write(r0, &(0x7f00000009c0)="cdcf96a592e7997487d14aff5dc6080598e53757af6c83b64223cca0240bcc071fbb863d0f587737a6da1618ce419c67b6573498cf4cd00fb39c6ba574d13876f2d8473544f833664f9c409dd7b12c8bd4b9819a953bcdfff39989125962f1c805d588dd1f6fa356975f567603dbeedba2eaa0950f8b0a92220c18d494b4f0158d1ed32b24dc396e81f9f9fb1d027a9c374d95846c13ba4267e2d1fa32aba2100723d7392fb002b51050f1841fcc9179d333941880e64e6cbc9173b86ed5209109ff7fafccf53b7dbcff", 0xca) prctl$PR_SVE_SET_VL(0x32, 0x2cf04) r2 = dup(r0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x28) 05:23:40 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000c00)='/selinux/status\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000840)={0x4, &(0x7f0000000800)=[{0x5, 0x3, 0x81, 0x9}, {0x4, 0x3ff, 0x4, 0xffffffffffffffff}, {0x10001, 0x8000, 0x2, 0x8}, {0x1, 0x0, 0xffffffffffff9743}]}) r1 = inotify_init1(0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000780)="4c7dcd759e459401bfd499cf37b8b9c415f52c4cd791f288ccac886c63a2f63250f721ba4a22af042c27509a075d47fb6b27aa73ebebee979b184b8e1fedb4ac382d9bee4ea0beb9b26be5a6f4caf93f9fa12a0ece38ea479f14930ad1c88a8e3a507ac59561986b", 0xfffffdc7) read(r2, &(0x7f0000000000)=""/250, 0x128b9372) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000580)={0x150, 0xfffffffffffffffd, 0x8, 0xfffffffffffffffc, 0x10000, 0x1}) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) r6 = add_key(&(0x7f0000000400)='pkcs7_test\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f0000000480)='-', 0x1, 0xfffffffffffffffa) keyctl$search(0xa, r5, &(0x7f0000000340)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x0}, r6) ptrace$setopts(0x4206, r4, 0x0, 0x0) ioctl$KIOCSOUND(r2, 0x4b2f, 0xfffffffffffffff9) capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000300)={0x0, 0x44, 0x0, 0x20000000000fb, 0x3fe, 0x3f}) clone(0x20000000, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000580)) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) prctl$PR_SET_FPEMU(0xa, 0x2) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0x1b}, 0x6}, 0x1c) lsetxattr$trusted_overlay_upper(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000ac0)={0x0, 0xfb, 0x45, 0x1, 0x7, "2778a456023daa6a1a5cd8a0c7c0f6c8", "28eea32e3a44fe01a1285b5d0429bd25f0b2ba3c1eedbf49868b0f93ad025388a0fbca6866fde6dc7acd565a0bab01e9"}, 0x45, 0x2) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000b40)='trusted.overlay.nlink\x00', &(0x7f0000000740)={'L-', 0xfffffffffffffff9}, 0xffffffffffffffbe, 0x1) ptrace(0x4207, r4) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/28, 0x1c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) r8 = add_key(&(0x7f0000000500)='cifs.idmap\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000600)="32576eb29c4c5c8fe8a3a7f39ae1e14c71ddb976e9f49fb8f8737b2ad5728af126bd27eef940320a3edc0bdf5a30017b7892583a0f8f02bf698f0cd3a9c83ac5f94012610bb3f6de8cc4c64e68eadeb6a87ac63a97dd366650dcaf1a1cb16fe763c8fada1a967e7a9fe51134c5a3bc1edb7bf67afe0e6050ec608859e257558fd044f4a1296f6523fc83f04682f4651cf74503b4cdd984301323a5b8561f72fd24a03a86f293a22970e9b8d0355aa7b97ca99f8b07c50ebebf7415de545c916fd7b6c12320d8a48c", 0xc8, r5) keyctl$search(0xa, r6, &(0x7f0000000200)='cifs.spnego\x00', &(0x7f00000004c0)={'syz', 0x0}, r8) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000001c0)={'veth1_to_bond\x00', 0xfffffffffffffffd}) ptrace$setregset(0x4209, r4, 0x20000004, &(0x7f0000000100)={&(0x7f0000000040)}) 05:23:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x4000010083, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) read(r0, &(0x7f0000000040)=""/11, 0xb) r1 = open(&(0x7f0000000000)='./file0\x00', 0x480, 0x120) r2 = syz_open_pts(r0, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000180)={0x1813}) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 05:23:40 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x2000) fcntl$setstatus(r0, 0x4, 0x0) r1 = socket$inet6(0xa, 0x1000000000006, 0x6) sendto$inet6(r1, &(0x7f00000001c0)="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", 0xfb, 0x20000080, &(0x7f00000002c0)={0xa, 0x4e21, 0x9, @local, 0x40000008001}, 0xfffffffffffffebb) getsockopt$inet6_int(r1, 0x29, 0x42, &(0x7f0000000040), &(0x7f0000000080)=0x4) 05:23:40 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x3d) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000180)='./file0\x00', 0x5000560) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x2) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 05:23:40 executing program 3: alarm(0xbfc9) 05:23:40 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000700)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f00000001c0)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x10, 0x4, 0x5, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x120000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r2, 0x20, 0x70bd25, 0x25dfdbfe, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x8, @media='eth\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) mmap$binder(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x90012, r0, 0x0) mmap$binder(&(0x7f0000005000/0x2000)=nil, 0x2000, 0x0, 0x80012, r0, 0x0) [ 94.231020] capability: warning: `syz-executor0' uses deprecated v2 capabilities in a way that may be insecure 05:23:42 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000000c0)=@fragment={0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x66}, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = getpgid(0x0) ptrace$getregs(0xe, r2, 0x62, &(0x7f0000000240)=""/218) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@delsa={0x3c, 0x11, 0x101, 0x0, 0x0, {@in=@multicast1}, [@srcaddr={0x14}]}, 0x3c}, 0x8}, 0x0) 05:23:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x20003, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x402}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x64, r2, 0x800, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x10001}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xe}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x8004) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x33}, 0xa, @in, 0x0, 0x2}}, 0xe8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000580)=@in={0x2, 0x4e21, @multicast2}, 0x80, 0x0}}], 0x2, 0x0) 05:23:42 executing program 4: ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x7fffffff, 0x8000, 0x9, 0x1, 0x3, 0x5, 0xffffffffffffffe1, 0x7, 0x400, 0x8, 0x6, 0x7}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x5, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x80000, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xfffffffffffffffc, 0x20, 0x1, r1}) poll(&(0x7f0000000000)=[{}], 0x1, 0x0) 05:23:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/context\x00', 0x2, 0x0) readv(r0, &(0x7f0000000700)=[{&(0x7f0000000240)=""/157, 0x9d}, {&(0x7f0000000300)=""/165, 0xa5}, {&(0x7f0000000040)=""/18, 0x12}, {&(0x7f00000003c0)=""/138, 0x8a}, {&(0x7f0000000480)=""/130, 0x82}, {&(0x7f0000000540)=""/236, 0xec}, {&(0x7f0000000640)=""/135, 0x87}], 0x7) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]}, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000007c0)) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) getpeername$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@newqdisc={0x48, 0x24, 0x0, 0x70bd28, 0x25dfdbfe, {0x0, r2, {0x5, 0xc}, {0xffff}, {0xfff3, 0xd}}, [@qdisc_kind_options=@q_prio={{0xc, 0x1, 'prio\x00'}, {0x18, 0x2, {0x1, "505334e1fe0a1afb3ac936f7f300feb7"}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000004}, 0x1) 05:23:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000340), 0x0, 0x8001, 0x0, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) fsetxattr$security_ima(r1, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140), 0x1, 0x2) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000340)) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCEXCL(r1, 0x540c) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000780)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0909e523321ad0ce06f5ff11010100010000"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/mls\x00', 0x0, 0x0) sync_file_range(r3, 0x0, 0x6c, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x40000000000, 0x30, r4, 0x0) getgid() getgid() setgroups(0x4000000000000155, &(0x7f0000000600)) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000180)='veth0_to_bond\x00') pipe(&(0x7f0000000380)) getpeername$netlink(r1, &(0x7f0000000580), &(0x7f0000000600)=0xfffffffffffffd75) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000003}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[], 0xfffffffffffffe1d}, 0x1, 0x0, 0x0, 0x1}, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r5, &(0x7f0000000440)=ANY=[], 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) flistxattr(r0, &(0x7f0000000040)=""/253, 0xfd) close(r0) 05:23:42 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000080)='sysfs\x00', 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f00000002c0)='./file0\x00', 0x20000110) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1d, 0xb, 0x64}}) write$P9_RFSYNC(r2, &(0x7f00000000c0)={0x7, 0x33, 0x1}, 0x7) r3 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x2) fchown(r3, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f00000001c0)) 05:23:42 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x3) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000180)=0xffffffffffffffff, 0x60f) 05:23:42 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) delete_module(&(0x7f0000000080)='@\x00', 0xd30a5e6837c25906) socket$inet6(0xa, 0x2, 0x2) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0xfffffffffffffece, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) [ 96.380201] audit_printk_skb: 9 callbacks suppressed [ 96.380214] audit: type=1400 audit(1545369822.212:22): avc: denied { ioctl } for pid=4056 comm="syz-executor5" path="socket:[10682]" dev="sockfs" ino=10682 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 96.404092] ================================================================== [ 96.404106] BUG: KASAN: stack-out-of-bounds in xfrm_state_find+0x269d/0x2920 [ 96.404112] Read of size 4 at addr ffff8801c7d97650 by task syz-executor3/4067 [ 96.404113] [ 96.404120] CPU: 0 PID: 4067 Comm: syz-executor3 Not tainted 4.9.141+ #1 [ 96.404133] ffff8801c7d96cc0 ffffffff81b42e79 ffffea00071f65c0 ffff8801c7d97650 [ 96.404145] 0000000000000000 ffff8801c7d97650 ffff8801d4dca1f0 ffff8801c7d96cf8 [ 96.404155] ffffffff815009b8 ffff8801c7d97650 0000000000000004 0000000000000000 [ 96.404157] Call Trace: [ 96.404168] [] dump_stack+0xc1/0x128 [ 96.404179] [] print_address_description+0x6c/0x234 [ 96.404187] [] kasan_report.cold.6+0x242/0x2fe [ 96.404197] [] ? xfrm_state_find+0x269d/0x2920 [ 96.404204] [] __asan_report_load4_noabort+0x14/0x20 [ 96.404211] [] xfrm_state_find+0x269d/0x2920 [ 96.404218] [] ? xfrm_state_find+0x28e/0x2920 [ 96.404225] [] ? kasan_slab_free+0x119/0x190 [ 96.404232] [] ? xfrm_unregister_mode+0x190/0x190 [ 96.404240] [] ? trace_hardirqs_on+0x10/0x10 [ 96.404248] [] ? trace_hardirqs_on_caller+0x266/0x590 [ 96.404256] [] ? _raw_spin_unlock_irqrestore+0x45/0x70 [ 96.404265] [] ? debug_check_no_obj_freed+0x2ce/0x890 [ 96.404273] [] ? skb_free_head+0x8b/0xb0 [ 96.404282] [] ? kfree+0xdb/0x310 [ 96.404291] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 96.404298] [] xfrm_tmpl_resolve_one+0x1d2/0x7a0 [ 96.404307] [] ? xfrm_expand_policies.constprop.14+0x290/0x290 [ 96.404314] [] ? depot_save_stack+0x20f/0x470 [ 96.404320] [] ? __lock_acquire+0x654/0x4a10 [ 96.404327] [] ? kasan_kmalloc.part.1+0xc9/0xf0 [ 96.404335] [] xfrm_resolve_and_create_bundle+0x21f/0x1e70 [ 96.404342] [] ? __lock_acquire+0x654/0x4a10 [ 96.404349] [] ? xfrm_tmpl_resolve_one+0x7a0/0x7a0 [ 96.404355] [] ? trace_hardirqs_on+0x10/0x10 [ 96.404362] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 96.404370] [] ? check_preemption_disabled+0x3b/0x200 [ 96.404377] [] ? check_preemption_disabled+0x3b/0x200 [ 96.404384] [] ? xfrm_sk_policy_lookup+0x2a0/0x430 [ 96.404392] [] ? xfrm_sk_policy_lookup+0x2c7/0x430 [ 96.404399] [] ? xfrm_selector_match+0xe40/0xe40 [ 96.404405] [] xfrm_lookup+0x239/0xc00 [ 96.404413] [] ? xfrm_sk_policy_lookup+0x430/0x430 [ 96.404420] [] ? check_preemption_disabled+0x3b/0x200 [ 96.404429] [] ? __ip_route_output_key_hash+0xc7b/0x2090 [ 96.404436] [] ? __ip_route_output_key_hash+0xca2/0x2090 [ 96.404443] [] ? __ip_route_output_key_hash+0x16a/0x2090 [ 96.404450] [] ? ip6_finish_output2+0x177/0x1d10 [ 96.404458] [] ? rt_set_nexthop.constprop.13+0xcc0/0xcc0 [ 96.404465] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 96.404484] [] xfrm_lookup_route+0x39/0x140 [ 96.404493] [] ip_route_output_flow+0x90/0xa0 [ 96.404502] [] udp_sendmsg+0x13d9/0x1c60 [ 96.404511] [] ? udp_sendmsg+0xe9f/0x1c60 [ 96.404519] [] ? __lock_acquire+0x654/0x4a10 [ 96.404527] [] ? ip6_finish_output+0x35d/0x980 [ 96.404536] [] ? ip_reply_glue_bits+0xb0/0xb0 [ 96.404543] [] ? udp_v4_get_port+0x100/0x100 [ 96.404551] [] ? rt6_check_expired+0xa2/0x120 [ 96.404558] [] ? __lock_acquire+0x654/0x4a10 [ 96.404565] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 96.404572] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 96.404580] [] udpv6_sendmsg+0x127d/0x2430 [ 96.404587] [] ? __lock_acquire+0x654/0x4a10 [ 96.404594] [] ? udp_v6_flush_pending_frames+0xe0/0xe0 [ 96.404600] [] ? trace_hardirqs_on+0x10/0x10 [ 96.404608] [] ? sock_has_perm+0x1c1/0x3e0 [ 96.404616] [] ? sock_has_perm+0x293/0x3e0 [ 96.404623] [] ? sock_has_perm+0x9f/0x3e0 [ 96.404631] [] ? selinux_msg_queue_alloc_security+0x2e0/0x2e0 [ 96.404638] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 96.404646] [] ? check_preemption_disabled+0x3b/0x200 [ 96.404656] [] ? check_preemption_disabled+0x3b/0x200 [ 96.404663] [] ? inet_sendmsg+0x143/0x4d0 [ 96.404669] [] inet_sendmsg+0x203/0x4d0 [ 96.404675] [] ? inet_sendmsg+0x73/0x4d0 [ 96.404683] [] ? inet_recvmsg+0x4c0/0x4c0 [ 96.404694] [] sock_sendmsg+0xbb/0x110 [ 96.404700] [] ___sys_sendmsg+0x47a/0x840 [ 96.404706] [] ? trace_hardirqs_on+0x10/0x10 [ 96.404713] [] ? copy_msghdr_from_user+0x530/0x530 [ 96.404720] [] ? trace_hardirqs_on+0x10/0x10 [ 96.404727] [] ? check_preemption_disabled+0x3b/0x200 [ 96.404759] [] ? check_preemption_disabled+0x3b/0x200 [ 96.404784] [] ? __fget+0x214/0x3d0 [ 96.404793] [] __sys_sendmmsg+0x161/0x3d0 [ 96.404800] [] ? SyS_sendmsg+0x50/0x50 [ 96.404806] [] ? release_sock+0x14e/0x1c0 [ 96.404816] [] ? ip6_datagram_connect+0x3a/0x50 [ 96.404823] [] ? fput+0xd2/0x140 [ 96.404832] [] ? __might_fault+0x114/0x1d0 [ 96.404839] [] ? __might_fault+0x18e/0x1d0 [ 96.404848] [] ? __might_fault+0xe4/0x1d0 [ 96.404874] [] ? SyS_clock_gettime+0x11e/0x1f0 [ 96.404882] [] ? SyS_clock_settime+0x220/0x220 [ 96.404889] [] ? task_work_run+0x14a/0x180 [ 96.404896] [] SyS_sendmmsg+0x35/0x60 [ 96.404905] [] ? __sys_sendmmsg+0x3d0/0x3d0 [ 96.404913] [] do_syscall_64+0x19f/0x550 [ 96.404921] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 96.404924] [ 96.404926] The buggy address belongs to the page: [ 96.404935] page:ffffea00071f65c0 count:0 mapcount:0 mapping: (null) index:0x0 [ 96.404939] flags: 0x4000000000000000() [ 96.404942] page dumped because: kasan: bad access detected [ 96.404943] [ 96.404945] Memory state around the buggy address: [ 96.404954] ffff8801c7d97500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 96.404960] ffff8801c7d97580: f1 f1 f1 00 f2 f2 f2 f2 f2 f2 f2 00 00 00 00 f2 [ 96.404967] >ffff8801c7d97600: f2 f2 f2 00 00 00 00 00 00 00 f2 f2 f2 f2 f2 00 [ 96.404970] ^ [ 96.404975] ffff8801c7d97680: 00 00 00 00 00 00 00 00 f2 f2 f2 00 00 00 00 00 [ 96.404981] ffff8801c7d97700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 96.404983] ================================================================== [ 96.404984] Disabling lock debugging due to kernel taint [ 96.404988] Kernel panic - not syncing: panic_on_warn set ... [ 96.404988] [ 96.404996] CPU: 0 PID: 4067 Comm: syz-executor3 Tainted: G B 4.9.141+ #1 [ 96.405009] ffff8801c7d96c20 ffffffff81b42e79 ffffffff82e37630 00000000ffffffff [ 96.405036] 0000000000000000 0000000000000000 ffff8801d4dca1f0 ffff8801c7d96ce0 [ 96.405062] ffffffff813f7125 0000000041b58ab3 ffffffff82e2b62b ffffffff813f6f66 [ 96.405063] Call Trace: [ 96.405073] [] dump_stack+0xc1/0x128 [ 96.405083] [] panic+0x1bf/0x39f [ 96.405091] [] ? add_taint.cold.5+0x16/0x16 [ 96.405100] [] ? kasan_end_report+0x32/0x4f [ 96.405107] [] kasan_end_report+0x47/0x4f [ 96.405115] [] kasan_report.cold.6+0x76/0x2fe [ 96.405138] [] ? xfrm_state_find+0x269d/0x2920 [ 96.405161] [] __asan_report_load4_noabort+0x14/0x20 [ 96.405184] [] xfrm_state_find+0x269d/0x2920 [ 96.405192] [] ? xfrm_state_find+0x28e/0x2920 [ 96.405199] [] ? kasan_slab_free+0x119/0x190 [ 96.405208] [] ? xfrm_unregister_mode+0x190/0x190 [ 96.405215] [] ? trace_hardirqs_on+0x10/0x10 [ 96.405222] [] ? trace_hardirqs_on_caller+0x266/0x590 [ 96.405229] [] ? _raw_spin_unlock_irqrestore+0x45/0x70 [ 96.405239] [] ? debug_check_no_obj_freed+0x2ce/0x890 [ 96.405248] [] ? skb_free_head+0x8b/0xb0 [ 96.405257] [] ? kfree+0xdb/0x310 [ 96.405264] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 96.405273] [] xfrm_tmpl_resolve_one+0x1d2/0x7a0 [ 96.405284] [] ? xfrm_expand_policies.constprop.14+0x290/0x290 [ 96.405292] [] ? depot_save_stack+0x20f/0x470 [ 96.405299] [] ? __lock_acquire+0x654/0x4a10 [ 96.405306] [] ? kasan_kmalloc.part.1+0xc9/0xf0 [ 96.405314] [] xfrm_resolve_and_create_bundle+0x21f/0x1e70 [ 96.405322] [] ? __lock_acquire+0x654/0x4a10 [ 96.405329] [] ? xfrm_tmpl_resolve_one+0x7a0/0x7a0 [ 96.405336] [] ? trace_hardirqs_on+0x10/0x10 [ 96.405343] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 96.405353] [] ? check_preemption_disabled+0x3b/0x200 [ 96.405361] [] ? check_preemption_disabled+0x3b/0x200 [ 96.405370] [] ? xfrm_sk_policy_lookup+0x2a0/0x430 [ 96.405380] [] ? xfrm_sk_policy_lookup+0x2c7/0x430 [ 96.405387] [] ? xfrm_selector_match+0xe40/0xe40 [ 96.405394] [] xfrm_lookup+0x239/0xc00 [ 96.405402] [] ? xfrm_sk_policy_lookup+0x430/0x430 [ 96.405409] [] ? check_preemption_disabled+0x3b/0x200 [ 96.405417] [] ? __ip_route_output_key_hash+0xc7b/0x2090 [ 96.405425] [] ? __ip_route_output_key_hash+0xca2/0x2090 [ 96.405433] [] ? __ip_route_output_key_hash+0x16a/0x2090 [ 96.405465] [] ? ip6_finish_output2+0x177/0x1d10 [ 96.405485] [] ? rt_set_nexthop.constprop.13+0xcc0/0xcc0 [ 96.405495] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 96.405505] [] xfrm_lookup_route+0x39/0x140 [ 96.405514] [] ip_route_output_flow+0x90/0xa0 [ 96.405522] [] udp_sendmsg+0x13d9/0x1c60 [ 96.405530] [] ? udp_sendmsg+0xe9f/0x1c60 [ 96.405539] [] ? __lock_acquire+0x654/0x4a10 [ 96.405546] [] ? ip6_finish_output+0x35d/0x980 [ 96.405554] [] ? ip_reply_glue_bits+0xb0/0xb0 [ 96.405562] [] ? udp_v4_get_port+0x100/0x100 [ 96.405570] [] ? rt6_check_expired+0xa2/0x120 [ 96.405576] [] ? __lock_acquire+0x654/0x4a10 [ 96.405583] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 96.405590] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 96.405597] [] udpv6_sendmsg+0x127d/0x2430 [ 96.405604] [] ? __lock_acquire+0x654/0x4a10 [ 96.405612] [] ? udp_v6_flush_pending_frames+0xe0/0xe0 [ 96.405620] [] ? trace_hardirqs_on+0x10/0x10 [ 96.405630] [] ? sock_has_perm+0x1c1/0x3e0 [ 96.405640] [] ? sock_has_perm+0x293/0x3e0 [ 96.405649] [] ? sock_has_perm+0x9f/0x3e0 [ 96.405657] [] ? selinux_msg_queue_alloc_security+0x2e0/0x2e0 [ 96.405664] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 96.405672] [] ? check_preemption_disabled+0x3b/0x200 [ 96.405679] [] ? check_preemption_disabled+0x3b/0x200 [ 96.405685] [] ? inet_sendmsg+0x143/0x4d0 [ 96.405708] [] inet_sendmsg+0x203/0x4d0 [ 96.405714] [] ? inet_sendmsg+0x73/0x4d0 [ 96.405720] [] ? inet_recvmsg+0x4c0/0x4c0 [ 96.405727] [] sock_sendmsg+0xbb/0x110 [ 96.405740] [] ___sys_sendmsg+0x47a/0x840 [ 96.405749] [] ? trace_hardirqs_on+0x10/0x10 [ 96.405772] [] ? copy_msghdr_from_user+0x530/0x530 [ 96.405779] [] ? trace_hardirqs_on+0x10/0x10 [ 96.405787] [] ? check_preemption_disabled+0x3b/0x200 [ 96.405794] [] ? check_preemption_disabled+0x3b/0x200 [ 96.405801] [] ? __fget+0x214/0x3d0 [ 96.405808] [] __sys_sendmmsg+0x161/0x3d0 [ 96.405814] [] ? SyS_sendmsg+0x50/0x50 [ 96.405820] [] ? release_sock+0x14e/0x1c0 [ 96.405828] [] ? ip6_datagram_connect+0x3a/0x50 [ 96.405834] [] ? fput+0xd2/0x140 [ 96.405840] [] ? __might_fault+0x114/0x1d0 [ 96.405847] [] ? __might_fault+0x18e/0x1d0 [ 96.405852] [] ? __might_fault+0xe4/0x1d0 [ 96.405859] [] ? SyS_clock_gettime+0x11e/0x1f0 [ 96.405866] [] ? SyS_clock_settime+0x220/0x220 [ 96.405872] [] ? task_work_run+0x14a/0x180 [ 96.405878] [] SyS_sendmmsg+0x35/0x60 [ 96.405885] [] ? __sys_sendmmsg+0x3d0/0x3d0 [ 96.405891] [] do_syscall_64+0x19f/0x550 [ 96.405898] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 96.424762] Kernel Offset: disabled [ 97.749124] Rebooting in 86400 seconds..