[?25l[?1c7[ ok 8[?25h[?0c. [ 41.167729] audit: type=1800 audit(1556167832.641:33): pid=7072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 41.189444] audit: type=1800 audit(1556167832.641:34): pid=7072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 45.589165] random: sshd: uninitialized urandom read (32 bytes read) [ 46.006903] audit: type=1400 audit(1556167837.481:35): avc: denied { map } for pid=7244 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 46.052800] random: sshd: uninitialized urandom read (32 bytes read) [ 46.753061] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.140' (ECDSA) to the list of known hosts. [ 52.721662] random: sshd: uninitialized urandom read (32 bytes read) 2019/04/25 04:50:44 fuzzer started [ 52.919967] audit: type=1400 audit(1556167844.391:36): avc: denied { map } for pid=7253 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 54.760990] random: cc1: uninitialized urandom read (8 bytes read) 2019/04/25 04:50:47 dialing manager at 10.128.0.105:35831 2019/04/25 04:50:47 syscalls: 2434 2019/04/25 04:50:47 code coverage: enabled 2019/04/25 04:50:47 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/04/25 04:50:47 extra coverage: extra coverage is not supported by the kernel 2019/04/25 04:50:47 setuid sandbox: enabled 2019/04/25 04:50:47 namespace sandbox: enabled 2019/04/25 04:50:47 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/25 04:50:47 fault injection: enabled 2019/04/25 04:50:47 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/25 04:50:47 net packet injection: enabled 2019/04/25 04:50:47 net device setup: enabled [ 56.897040] random: crng init done 04:53:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") prctl$PR_CAPBSET_READ(0x17, 0x0) 04:53:00 executing program 5: mknod(&(0x7f0000000240)='./bus\x00', 0x8020, 0x1b00) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400000003fd, 0x0) pwritev(r0, &(0x7f0000000540)=[{&(0x7f0000000040)="33652bcbc615e3c909a0c3", 0xb}], 0x1, 0x0) write(r0, &(0x7f0000000440)="9c87c3772c0035b87e33", 0xa) execve(0x0, 0x0, 0x0) 04:53:00 executing program 1: clock_getres(0x4000004, 0x0) 04:53:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x80005, 0x0) sysinfo(0x0) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, 0x0, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f00000000c0)={'team0\x00', 0x892}) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000080)={'team0\x00`\xff\xff\xfd\x00 `\x00\xc0\x0e', 0xb7}) 04:53:00 executing program 3: mknod(&(0x7f0000000240)='./bus\x00', 0x8020, 0x1b00) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400000003fd, 0x0) pwritev(r0, &(0x7f0000000540)=[{&(0x7f0000000040)="33650bcbc615e3c909a0c3", 0xb}], 0x1, 0x0) write(r0, &(0x7f0000000440)="9c87c3772c0035b87e33", 0xa) execve(0x0, 0x0, 0x0) 04:53:00 executing program 4: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000280)}, 0x0) [ 188.534873] audit: type=1400 audit(1556167980.011:37): avc: denied { map } for pid=7253 comm="syz-fuzzer" path="/root/syzkaller-shm911840448" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 188.581916] audit: type=1400 audit(1556167980.061:38): avc: denied { map } for pid=7271 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=24 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 189.510237] IPVS: ftp: loaded support on port[0] = 21 [ 189.833434] IPVS: ftp: loaded support on port[0] = 21 [ 189.834197] chnl_net:caif_netlink_parms(): no params data found [ 189.905001] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.911782] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.918979] device bridge_slave_0 entered promiscuous mode [ 189.929260] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.935732] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.943182] device bridge_slave_1 entered promiscuous mode [ 189.968272] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 189.978513] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 189.991396] IPVS: ftp: loaded support on port[0] = 21 [ 190.015555] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 190.023097] team0: Port device team_slave_0 added [ 190.031536] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 190.038714] team0: Port device team_slave_1 added [ 190.057210] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 190.064844] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 190.152606] device hsr_slave_0 entered promiscuous mode [ 190.220373] device hsr_slave_1 entered promiscuous mode [ 190.288681] chnl_net:caif_netlink_parms(): no params data found [ 190.297524] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 190.304828] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 190.372542] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.379074] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.386050] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.392484] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.402827] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.409203] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.416330] device bridge_slave_0 entered promiscuous mode [ 190.423139] IPVS: ftp: loaded support on port[0] = 21 [ 190.437645] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.445432] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.452454] device bridge_slave_1 entered promiscuous mode [ 190.533124] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 190.544597] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 190.563713] chnl_net:caif_netlink_parms(): no params data found [ 190.609963] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 190.617541] team0: Port device team_slave_0 added [ 190.624343] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 190.631893] team0: Port device team_slave_1 added [ 190.647563] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 190.655337] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 190.663528] IPVS: ftp: loaded support on port[0] = 21 [ 190.723670] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.730660] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.737718] device bridge_slave_0 entered promiscuous mode [ 190.745126] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.751994] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.759721] device bridge_slave_1 entered promiscuous mode [ 190.822311] device hsr_slave_0 entered promiscuous mode [ 190.860416] device hsr_slave_1 entered promiscuous mode [ 190.900780] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 190.909750] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 190.948618] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 190.959376] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.977077] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.005005] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 191.034166] chnl_net:caif_netlink_parms(): no params data found [ 191.052210] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 191.059582] team0: Port device team_slave_0 added [ 191.071995] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.086750] IPVS: ftp: loaded support on port[0] = 21 [ 191.093564] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 191.101114] team0: Port device team_slave_1 added [ 191.108872] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 191.117814] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 191.129835] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 191.137380] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 191.154985] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.163949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.183221] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 191.189329] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.197683] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 191.263802] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.270585] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.277608] device bridge_slave_0 entered promiscuous mode [ 191.293160] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.299634] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.307316] device bridge_slave_1 entered promiscuous mode [ 191.393812] device hsr_slave_0 entered promiscuous mode [ 191.430443] device hsr_slave_1 entered promiscuous mode [ 191.478192] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 191.489561] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 191.503862] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 191.523339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.531528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.539200] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.545619] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.555108] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 191.573628] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 191.582551] chnl_net:caif_netlink_parms(): no params data found [ 191.592707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.600629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.608280] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.614664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.633552] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 191.641958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 191.652527] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 191.687480] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 191.735458] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 191.761311] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 191.768578] team0: Port device team_slave_0 added [ 191.775106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 191.803514] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 191.816743] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.823373] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.830524] device bridge_slave_0 entered promiscuous mode [ 191.837236] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 191.845087] team0: Port device team_slave_1 added [ 191.852013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.859870] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.868433] chnl_net:caif_netlink_parms(): no params data found [ 191.891721] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.898136] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.907138] device bridge_slave_1 entered promiscuous mode [ 191.923978] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 191.931838] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.940628] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 191.952119] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 191.971970] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 191.980471] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 191.988997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.996970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.004784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.012459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.044619] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.051571] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.058610] device bridge_slave_0 entered promiscuous mode [ 192.066685] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.073426] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.082805] device bridge_slave_1 entered promiscuous mode [ 192.098116] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 192.107155] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 192.123743] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.172638] device hsr_slave_0 entered promiscuous mode [ 192.210476] device hsr_slave_1 entered promiscuous mode [ 192.257709] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 192.265132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.272872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.285214] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 192.291413] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 192.319717] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 192.328206] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 192.342473] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 192.351694] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 192.358188] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 192.365787] team0: Port device team_slave_0 added [ 192.372478] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 192.379828] team0: Port device team_slave_1 added [ 192.386426] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 192.403385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.410388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.422917] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 192.429009] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.435887] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 192.443874] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 192.453917] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.472883] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 192.508539] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 192.517095] team0: Port device team_slave_0 added [ 192.523441] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 192.531955] team0: Port device team_slave_1 added [ 192.537353] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 192.545356] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 192.553999] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 192.613635] device hsr_slave_0 entered promiscuous mode [ 192.650475] device hsr_slave_1 entered promiscuous mode [ 192.711961] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 192.718448] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 192.735330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.743302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.750966] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.757306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.772337] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 192.783025] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 192.789893] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 192.798786] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.806559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.814545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.822701] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.829027] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.836268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.843220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.862610] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 192.869654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 192.879150] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 192.964088] device hsr_slave_0 entered promiscuous mode [ 193.000484] device hsr_slave_1 entered promiscuous mode [ 193.060946] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 193.068318] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 193.084983] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 193.093116] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 193.099382] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.115594] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 193.134100] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 193.143162] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.149538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.158304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.166230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.174441] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.180803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.187845] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.201873] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 193.213534] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 193.225387] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 193.234385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.243666] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.251849] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.259776] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.267643] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.274045] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.288564] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.298030] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 193.312963] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 193.329793] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.337086] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.344813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.352685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.368602] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 193.377571] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 193.393492] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 193.406334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.414320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.422341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.433154] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 193.445473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.452915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.462205] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 193.482573] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 193.488666] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.501961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.509542] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.526541] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 193.543272] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 193.555344] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 193.571142] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 193.578305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.586672] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.594961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.603328] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.611665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.619458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.627162] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.633526] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.641625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.649386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.657129] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.663483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.671471] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 04:53:05 executing program 0: r0 = socket$inet(0x2, 0x6, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x408000) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) [ 193.678540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.688114] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.699899] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 193.723266] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.735001] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 193.744574] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 193.755771] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.763561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 04:53:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x8000, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40000, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000100)={0x80000000, 0x7, "41ed37b336e3fa583f5a6dfbd34888d6f62e3623dc5d33b13435736b0fe669f9", 0x9, 0x0, 0xd5, 0x40, 0x8, 0x2, 0x1, 0x9, [0x3, 0x6, 0x5, 0x7]}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_INTERRUPT(r3, 0x4004ae86, &(0x7f0000000300)=0x1ff) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f0000000080)={[{0x3e, 0x1, 0x1ff, 0x5, 0x8000, 0x3, 0x7, 0xfffffffffffffffd, 0x4, 0x9, 0x3, 0x1, 0x7fffffff}, {0x9, 0x5, 0x8, 0x4, 0x6, 0x3a, 0x8000, 0x800, 0x7ff, 0x1, 0x6, 0x5, 0xfffffffffffffffd}, {0x2, 0x100000000, 0x8000, 0x18, 0x9a8b, 0x6, 0x3f, 0x2, 0xa88b, 0x80, 0x100, 0x1, 0x6}], 0x8}) [ 193.770918] audit: type=1400 audit(1556167985.251:39): avc: denied { name_connect } for pid=7310 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 193.798060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.808681] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.821859] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 193.822455] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 193.846886] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 193.858630] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 193.874249] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 193.885124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.894037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.906530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.917517] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready 04:53:05 executing program 0: setresgid(0x0, 0xee00, 0x0) setgroups(0x0, 0x0) setresuid(0x0, 0xfffe, 0xffffffffffffffff) shmget$private(0x0, 0x2000, 0x800, &(0x7f0000ffe000/0x2000)=nil) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x8001, 0x0) ioctl$sock_bt_hci(r0, 0x400448e4, &(0x7f0000000040)="d210b978eb71203f284d788410f36c6d532d5163c9aabfda859b67e824826196521ea0960fda6dfffd0653d57f48685514c7533c531e58978aa7d31ffa2b7d624ef7ab162ca0af65200e27a23a38203ca612067b88d173861f3e8ebb1f72c3d28c55585850d968cfd31ea82c6979f5ae56da3d7f321189de1097ba4db698d6080b826672699bb0d0e04e893bb66464ae742b5579ed5add8370c22e2d7ebeb408") [ 193.931700] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 193.938292] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.953483] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 193.970771] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 193.975298] hugetlbfs: syz-executor.0 (7319): Using mlock ulimits for SHM_HUGETLB is deprecated 04:53:05 executing program 0: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000001380)={0x0, 0xfffffffffffffffd}, &(0x7f00000013c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000014c0)={r1, 0xc0, &(0x7f0000001400)=[@in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e24, 0x9, @remote, 0x3}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e23, 0x8, @remote, 0x401}, @in6={0xa, 0x4e21, 0x8001, @mcast2, 0x8fb}, @in6={0xa, 0x4e21, 0xd46c, @remote, 0x7}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e23, @local}, @in={0x2, 0x4e21, @broadcast}]}, &(0x7f0000001500)=0x10) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000040)={0x101, 0x8, 0x0, 0x6, 0x1, 0x3}) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000001340)={0x4, 0x2, 0x100000000000, 0x5, 0x10002, 0x9}) r2 = dup3(r0, r0, 0x80004) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000300)=""/4096) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000200)={'bpq0\x00\x00\x00\x00\x00\x00\xc9Y\x00', &(0x7f00000001c0)=ANY=[@ANYRES64=r3]}) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000140)) ioctl$KVM_GET_SUPPORTED_CPUID(r3, 0xc008ae09, &(0x7f00000000c0)=""/72) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000001300)=@req={0x2, 0xb8f, 0x100000001, 0x8}, 0x10) rt_sigtimedwait(&(0x7f0000000180)={0x3}, &(0x7f0000000240), &(0x7f00000002c0)={0x77359400}, 0x8) [ 193.987984] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.995135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.013540] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.028929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 04:53:05 executing program 0: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x8}, 0x10) fremovexattr(r0, &(0x7f00000002c0)=@random={'user.', '/dev/vbi#\x00'}) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x1, 0x10}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000200)={r2, 0xffffffff}, 0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000003fe8)) r5 = openat$cgroup_ro(r4, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r5, 0xc0044306, &(0x7f0000000100)=0x1000) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r6, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r5, 0xc034564b, &(0x7f0000000300)={0x6, 0x32317d5f, 0x9, 0x7, 0x3, @discrete={0x1140000, 0x3}}) setsockopt$inet6_opts(r6, 0x29, 0x6, &(0x7f0000000080)=@dstopts, 0x8) setsockopt$inet6_opts(r6, 0x29, 0x36, &(0x7f0000000040)=@srh, 0x8) close(r6) close(r4) [ 194.036702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.051053] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 194.074766] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready 04:53:05 executing program 0: mknod(&(0x7f0000000080)='./file0\x00', 0x1120, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x27e, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000040)={@empty, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) read$FUSE(0xffffffffffffffff, &(0x7f0000000240), 0x2cee597f) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000180)={0x400, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x80000001, 0x9, 0x9, 0x0, 0x6}, 0x10) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) [ 194.084046] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.098042] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 194.110536] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.117573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 04:53:05 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='schedstat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') getsockopt$nfc_llcp(r0, 0x118, 0x2, &(0x7f00000002c0)=""/4096, 0x1000) sendfile(r1, r0, 0x0, 0x4) [ 194.142461] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.154608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.168654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.179376] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 194.192972] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 194.211477] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 194.217680] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.228544] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 194.240926] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 194.248166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.256114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.263757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.272638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.280137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.287889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.295718] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.302128] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.309051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.316990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.325035] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.331431] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.339253] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 194.347914] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 194.354865] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.364055] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 194.376023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.385583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.393592] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.401806] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.408181] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.416974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.435529] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 194.446978] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.454737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.468773] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 194.478564] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 194.491258] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.499339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.519540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.528146] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.534585] bridge0: port 2(bridge_slave_1) entered forwarding state 04:53:06 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x0, 0x0, 0x4, {0xa, 0x4e23, 0x2, @mcast2, 0x9}}}, 0x80) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x1000, 0x8, 0x6, 0x1, 0x2}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r4, 0x4) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$KDENABIO(r3, 0x4b36) close(r0) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000200)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000280)={r5, r6, 0x80000000}) [ 194.545256] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 194.556442] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 194.577554] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 194.605441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.616305] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.627015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.642384] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 194.652396] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 194.667050] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.675135] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.686857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.695575] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 04:53:06 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = dup2(r0, r0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x204, 0x0, 0xe3cc, 0x7ff}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0xfffffffffffffffb, 0x7fff}, &(0x7f0000000140)=0x8) getsockopt$inet_int(r0, 0x10d, 0xe1, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 194.703484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.714480] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 194.729084] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 194.738853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.764422] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.773949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.793269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.808825] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 194.818529] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 194.827885] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.835496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.843749] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.851543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.858959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.869312] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 194.879693] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 194.886515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.894724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.903995] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.914434] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 194.925882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.933794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.943773] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 194.949831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.968509] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 194.979918] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 194.989441] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 195.006332] 8021q: adding VLAN 0 to HW filter on device batadv0 04:53:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x80005, 0x0) sysinfo(0x0) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, 0x0, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f00000000c0)={'team0\x00', 0x892}) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000080)={'team0\x00`\xff\xff\xfd\x00 `\x00\xc0\x0e', 0xb7}) 04:53:07 executing program 0: r0 = socket$inet(0x2, 0x801, 0x84) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)='-', 0x1}], 0x1}, 0x0) 04:53:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f719bd070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x14, 0x249e1f, 0x7ffffffffd}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000180), 0x0}, 0x18) fsync(r0) 04:53:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bc070") r1 = dup(r0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000040)) r2 = socket$netlink(0xa, 0x6, 0x1d) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10d, 0xd, &(0x7f0000001ffc)=0x2, 0x1) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) listen(r2, 0x0) 04:53:07 executing program 4: r0 = socket(0x10, 0x10000000000003, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000000)={'tunl0\x00', @ifru_data=&(0x7f0000000100)="40ba5d5420d6d9d4fe423a83943b335c6f36c26e613c0a5dedf0b2135b8f2387"}) getpeername$ax25(r0, &(0x7f00000001c0)={{0x3, @netrom}, [@remote, @null, @default, @default, @rose, @default, @netrom, @null]}, &(0x7f0000000240)=0x48) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0x9c, "18d7dfddd59ed0846778f1752beebfe36dc1a42d2e7ce588ded9125594e60b8ff2c48de0d20b350df94d539b2f9996cc276d1cb9854703a964f1cb02d93d39d8f65bf58b22e30c4482b63e015ce782c052384c8bb95e47e9720eb5900c51372c9ebf20f9d790662700249d30e75c5ce368c4632844a080ec12ca89276563f62eff011146749cbe35ddd8eea75b9ee76077b7688b54497a6c631c8e69"}, &(0x7f0000000140)=0xa4) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r1, 0x4}, 0x8) 04:53:07 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x80500, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, 0x0) socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(&(0x7f00000004c0)=ANY=[], &(0x7f0000000640)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000300)='Cr{\xce\xb9\xa4\x8b\xf1\xf1aT\xed.requm\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00') openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) renameat2(r0, 0x0, r0, &(0x7f0000000240)='./file0\x00', 0x7) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') chown(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000000c0)='net/udplite6\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, &(0x7f00000004c0)) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x900, 0x0, 0xfffffffffffffffe, &(0x7f0000000c40), 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:53:07 executing program 5: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x2000, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000140)=0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f00000000c0)) 04:53:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") mmap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1000013, 0x31, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1000000000000, 0x4000) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000000c0)={@loopback}, &(0x7f0000000100)=0x14) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_link_settings={0xf}}) 04:53:07 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="646d6f6465a1a3c4159b1965e0c1a3b2bdc46a408159343d3078303030b0303030303030303030304553d61a48ec08534f33c98a2c1df643ef9b478f90e628b49fc4bbcc3a5e6dff23a93fc7e050bddfdfb41bf0467b80b5af006c98a234a7b8a9a5d0c6cbe234e5e1fd65348376e6862c09dd6335ad35558a071d507d0f7354260dea1500494711726320ae5c35ff35328e8b9ee5b0a5029e3eb4327d6c7648fcb1a5ab8d78a53bbde195ea2ef402353a1a2144283dc0221c5325a9ea5745ae70827a5aed84d8b8a0243b11c2b434512506845f30021b26391dba7d5e8cd67607e72c29fc69422f6213eeeaea5bad37db914b5856b07f2b24"]) [ 196.449276] hrtimer: interrupt took 55395 ns 04:53:08 executing program 2: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_DO_IT(r1, 0xab03) r2 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x7fff, 0x43) write$P9_RLINK(r2, &(0x7f0000000100)={0x7, 0x47, 0x2}, 0x7) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x202, 0x0) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000080)={0x18, 0x1, 0x0, {0x200}}, 0x18) 04:53:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bc070") r1 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x3, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x28}]}, &(0x7f0000000000)='GPL\x00'}, 0x48) dup(r1) 04:53:08 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) socket$vsock_dgram(0x28, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) bind$unix(r2, &(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x6e) write$apparmor_current(r0, &(0x7f0000000040)=@profile={'permprofile ', '\x00'}, 0xd) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/119, 0x77) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000600)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x56000802}, 0xc, &(0x7f00000005c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c030000", @ANYRES16=r3, @ANYBLOB="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"], 0x33c}}, 0x4040000) 04:53:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0xc216}, 0x3c) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x101000, 0x0) close(r1) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0xc, 0x1000, 0xffffffffffffffe0}) 04:53:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg(r1, &(0x7f0000000500)={&(0x7f0000000000)=@nfc, 0x20000080, &(0x7f00000000c0), 0x23b, &(0x7f0000000100)}, 0x0) sendmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmmsg(r1, &(0x7f0000002c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000041) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x300}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x110, r2, 0x20, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1c}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8d}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xf6}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0xac, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1431}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffe1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa52}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2db}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x865}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}]}]}]}, 0x110}}, 0x2404c054) [ 196.635748] block nbd2: Receive control failed (result -22) [ 196.671014] block nbd2: shutting down sockets 04:53:08 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000080)=0x1, 0x8b, 0x1, 0x0, &(0x7f00000000c0), 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400300, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xe) getitimer(0x0, &(0x7f0000000000)) tkill(r0, 0x1000000018) 04:53:08 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpeername(r0, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000100)=0x80) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x7c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c) [ 196.744047] block nbd2: Receive control failed (result -22) [ 196.759838] block nbd2: shutting down sockets 04:53:08 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20880a00}, 0xc, &(0x7f0000000480)={&(0x7f0000000100)={0x364, r1, 0x210, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xd4, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff23a2}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'bcsh0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x8, @remote, 0x20}}, {0x14, 0x2, @in={0x2, 0x4e20, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x1, @rand_addr="390e62e8f252f62f28df7c880c886968", 0x5}}, {0x14, 0x2, @in={0x2, 0x4e24, @rand_addr=0x2}}}}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffffc}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x308}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}]}, @TIPC_NLA_LINK={0xa0, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4af}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0xac, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x5, @local, 0x8001}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7ff}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @remote, 0xffffffffffffffe1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xdbc}]}, @TIPC_NLA_BEARER={0x8c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'team_slave_1\x00'}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5e9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3d40}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'bond_slave_0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff00000001}]}]}]}, 0x364}, 0x1, 0x0, 0x0, 0x8010}, 0x10) personality(0x500000f) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x0) 04:53:08 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x2000000000000004, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$bt_hci(r1, 0x84, 0x8, &(0x7f0000000000)=""/127, &(0x7f0000000100)=0x7f) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0xfffffbffffffffff, 0x2000000000032, 0xffffffffffffffff, 0x0) close(r0) 04:53:08 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000300)={0x9, 0x0, [{0x8000000d, 0x0, 0x4, 0x1, 0x7f, 0x80, 0x80000001}, {0x8000000a, 0x9, 0x5, 0x4, 0x9, 0x101, 0x1ba}, {0x80000007, 0x1, 0x4, 0x2d19, 0x0, 0x8, 0x7f}, {0xc0000000, 0xfffffffffffffffc, 0x4, 0x9, 0x2, 0xfffffffffffffff8, 0x7}, {0xc000000f, 0xfffffffffffffffb, 0x0, 0x9, 0xef, 0x1, 0x8}, {0xc0000001, 0x6, 0x3, 0x6, 0xc78, 0xfffffffffffff801, 0x5}, {0xc0000003, 0x4, 0x4, 0x0, 0x8c, 0x75}, {0x0, 0x10001, 0x7, 0x0, 0x7, 0x7ff, 0x6}, {0xc000001b, 0x3f, 0x5, 0xfffffffffffffff8, 0x4, 0xc6, 0xfffffffffffffffd}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f00000005c0)=0xe8) r2 = getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000740)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000009c0)={0x0}, &(0x7f0000000a00)=0xc) r5 = fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000e40)=0xe8) lstat(&(0x7f0000000e80)='./file0/file0\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r0, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000600)={0x10c, 0x29, 0x200, 0x70bd2d, 0x25dfdbff, "", [@typed={0x8, 0x8b, @uid=r1}, @nested={0xb0, 0x46, [@generic="6bd3cb1d3091891fa54785ff97c6bd6348c23f03fd0fbc0306628b68136df9a3ea78d20fc760a696c90f03326c5c0305237d8b4af22349d1191b92427c094ffaea772334bc163e7809e1629bc522f31921da3530bcefad3021b705df6555dfeee97ad3b61f04cc28f136fd5fd7943854b6d104e026f69cd0d6671fe6369ca823d47ef093ddb0ed8eed070de22ec60bb203eb60495fe75ea540fccc8a7b68405e7b98c77278eb614ae8"]}, @generic="38c3121280ad28af1420d8b6a347fe2483c2951c33918fe6923bdc033061ce98e660afd67e2cc1eff8eb1d60c1fa2d4be68006d3335863a793a577357031ed0e5a57"]}, 0x10c}, {&(0x7f0000000880)={0x12c, 0x3a, 0x100, 0x70bd28, 0x25dfdbfc, "", [@typed={0x8, 0x15, @pid=r2}, @nested={0xb4, 0x63, [@typed={0x14, 0x67, @ipv6=@ipv4={[], [], @local}}, @generic="02a272cc125751f06401bd187dcc5c04404e1fe7745a284623d790bc6fc0f9a263390926ef6901937c675a5ce468ec36a440aa6adc32f2687a9a7ee067", @typed={0x8, 0x92, @uid=r3}, @typed={0x8, 0x5e, @u32=0x80000001}, @generic="954ec42dbfa6b64dec8f3c2c59d23e4082ce678a962167df915e315eeae438d1611501683e5ff5b5d301c6f153b268291e19be88acee4c7308d8469efb1ba902a72a0dea0769eb80701ab0c5c187"]}, @generic="f68fd0bdd3878428dce84ee2225305f488a1f7748cb6fa5c63358a8d61119a85a706959e8e3a66234bd8743ffb80bdd224f72458ab131f065c4eb2f4675a8ed37a07cc4f073cc8da0e3f1379cc100fa43ce766ca8602906fa9d9b60ab5d9"]}, 0x12c}, {&(0x7f0000000a40)={0x110, 0x10, 0x300, 0x70bd29, 0x25dfdbfb, "", [@nested={0xc, 0x85, [@typed={0x8, 0x2000400, @pid=r4}]}, @nested={0xa8, 0x62, [@generic="39dfa2e42082b7112efebf67f4850b4fb0b268b729fa5d7b95637e0d47410bbf", @typed={0xc, 0xb, @u64=0x2}, @generic="712518e7054865569285aa68e5d78a4f104cf397ae1b899f3901f6df54802ae1b4b5ab156d3367504925b0167c4f3cf0fc49da8e564236bee9ce1018cc901ae565177535c9a689ad8fb100ab34af1124a7b7b938957c30c9166954aca70d265b30945051b8145196307fc7567bfddae7606207d36b73e3ad"]}, @generic="3f2d21d423edddbe41b278d58b9c7ec4a121aa345d7dd7e8407f3bce72f371e0353f192189c88449d032d6367c03bfd8ea81cbadd3e552d48518b03c26f84cd392c898e9d120d7862042b2"]}, 0x110}, {&(0x7f0000000b80)={0x150, 0x1f, 0x50a, 0x70bd2a, 0x25dfdbfb, "", [@generic="e3ef0de22c1ac2130d624ab13aa329782474fd28a2b8ad4db0fc3c28bd344fa26d066ae9e58bb7d49ae9aa4871e97cd30c16673149b9ab76edc6dbd0fc4c246669e23f7977037ad9d413eab53dd862dc704f8e7d73cbb1642578aa164f48006f02b0c9ec477b18dd74299c3e819077f1ffe7173a43c07542e483c8a4d1efb0f2a8c2b729035aa13a5922ffd106", @generic="1702bac54656f1d7903ffb67d690e799224f74da18757fb6b63f2fd0e800b44e2e83bbcfe324dd7ede0d7534963e4a55743b99df5bed7b6d28dde955835f0d8bdee9253ca7605aa0d420ed0500078ce60c94a9f9755dbfedebc8b4fadcce1d3137d77b32289eee97afd3bf5f86b091c50fdf074756ec628f7b2f95337499b758b4691fccd9f2445c73eedaf3", @nested={0x4, 0x19, [@generic]}, @nested={0x20, 0x75, [@typed={0x14, 0x3e, @ipv6=@loopback}, @typed={0x8, 0x6b, @u32=0x5}]}]}, 0x150}], 0x4, &(0x7f0000000f40)=[@rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0x78, 0x4000000}, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2080, 0x0) r10 = getpid() syz_open_procfs(r10, &(0x7f0000000480)='attr/fscreate\x00') ioctl$SIOCAX25DELFWD(r9, 0x89eb, &(0x7f0000000080)={@default, @null}) ioctl(r8, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='iemory.events\x00', 0x26e1, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r12) fsync(r11) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='\x19cpuset.memory_pre\x91\x00\x00\x00e\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r9, 0x401054d5, &(0x7f0000000280)={0x4, &(0x7f0000000180)=[{0x80000001, 0x8, 0x0, 0x800}, {0x200, 0x7, 0x4, 0x54f4}, {0x0, 0xf2cb, 0x20, 0x6}, {0x48000000000, 0x5, 0x80000000, 0x3}]}) ioctl$FIBMAP(r13, 0x1, &(0x7f0000000000)=0x7fffffff) 04:53:08 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000280)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@umask={'umask', 0x3d, 0x8cffffff}}]}) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x600003, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, 0xffffffffffffff03) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000000)={0x4000000000000001, 0x80004000000005}) [ 196.881175] audit: type=1400 audit(1556167988.351:40): avc: denied { create } for pid=7462 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:53:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syzkaller1\x00', &(0x7f0000000840)=ANY=[@ANYBLOB="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"]}) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 04:53:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x50120}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="000027bd7000fedbdf250200000004000500080001004e200000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x4000080) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000040)=""/61) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendto$packet(r2, &(0x7f0000000280)="d2f6dabd1f93858e83d1367fae391b62593fc98ddf3f7ca3bd5aab7776a221c4aa5933947fae337dec48076c100c6299cff6041d79d56da4091035c46ba6f599f6acbcc67858bb3ead445479b99193220d6890c3868a8517e1eae6b8d514c91edebd06dd419ad08cfddef0083f586cdcb30f8d6d176f843ee08e30b47c36b83ca82947ec8c497912b41bde9f2b687c6d3d86803383e3f9f8157f2f118c62e4b6cfa75018b7957a6fa141032b1e7550edf13fc5c0312d57bc4cfb8f2ba4e2ad55dfdce0ca048b5a16993f1b665c6cd1439c5221fe9a38978fa4219dcb371262b21c434db05a5f", 0xe6, 0x40000, &(0x7f0000000140)={0x11, 0xff, r4, 0x1, 0x5, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:53:08 executing program 5: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x100, 0x0) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f00000002c0)={0x3ff, "f1362611e2cf43bf17177c7dfca2eb7d5adcebb9a003442c58c61a9331ab153f", 0x3, 0x90c, 0x849, 0x11, 0x11, 0x7, 0x80, 0x5}) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) close(r0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x0, 0x4) r3 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x80) ioctl$VIDIOC_S_CROP(r3, 0x4014563c, &(0x7f00000001c0)={0xf, {0x101, 0x3f, 0xffffffff, 0x7}}) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 196.955691] audit: type=1400 audit(1556167988.381:41): avc: denied { write } for pid=7462 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 196.996802] hfsplus: umask requires a value [ 197.002966] hfsplus: unable to parse mount options 04:53:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e21, @rand_addr=0x24}}, [0x4, 0x1f, 0x8, 0x0, 0xfffffffffffffffe, 0x10000, 0xffffffffffffffff, 0xc6a, 0x1, 0x0, 0x0, 0xaf4, 0x80000000, 0x2000000001000, 0x95f]}, &(0x7f0000000180)=0x100) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000200)={0x0, 0x101}) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x11) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)={r2, 0x0, 0x1, [0x1]}, 0xa) syz_emit_ethernet(0x4a, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 04:53:08 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) socket$caif_stream(0x25, 0x1, 0x0) pipe2$9p(&(0x7f0000000000), 0x800) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") socket$inet6_udplite(0xa, 0x2, 0x88) [ 197.096906] hfsplus: umask requires a value [ 197.109159] audit: type=1400 audit(1556167988.381:42): avc: denied { read } for pid=7462 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 197.141209] hfsplus: unable to parse mount options 04:53:09 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e24, 0x41f, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}, 0x1c) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6gretap0\x00', 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000300)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000240)=0xffffffff, &(0x7f0000000280)=0x4) shutdown(r0, 0xfffffffffffffffd) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x7, 0x10000) r2 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x6, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000002c0)={r0}) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x1, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xf}}}, 0x1c) accept$alg(r2, 0x0, 0x0) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x2, &(0x7f0000000180)={0x2}, 0x8) fcntl$setsig(r3, 0xa, 0x1e) 04:53:09 executing program 4: r0 = socket$kcm(0x10, 0x480000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 04:53:09 executing program 2: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="020900000200000000c47dd31b650aad"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000007000006000000000000060000800000000000e00000010b00000000000000000035000000000000000000000000ff00000000030006000000000002000004000000bb000000000000000003000500000000000200423b000000000000004000000000"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r5, 0x4188aea7, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000e3ff0000"]) 04:53:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0xe8000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) r1 = getpid() read$FUSE(r0, &(0x7f0000000580), 0x1000) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)={0x0, 0x6}) ptrace(0xf, r1) ptrace$pokeuser(0x6, r1, 0x388, 0xfffffffffffffffe) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x0, 0x5, {0x7, 0x1d, 0x9, 0x24000, 0x100000000, 0x7, 0x265, 0x8}}, 0x50) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000440)={0x5f, 0x10001, 0x0, 0x0, 0x0, [], [], [], 0x1, 0x9}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc8800010}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xc8, r2, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x40}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffff7}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x8}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x929e1c0d836502e9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0xc8}, 0x1, 0x0, 0x0, 0x10}, 0x4000010) 04:53:09 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r1, &(0x7f0000004740)={&(0x7f0000000580)=@in6={0xa, 0x4e21, 0x0, @local, 0x9}, 0x80, 0x0}, 0xe803) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000b80)='9', 0x1}], 0x1}, 0xc000) sendmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)="1c", 0x1}], 0x1}, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xb) sendmsg$kcm(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000001e80)='r', 0x1}], 0x1}, 0x0) 04:53:09 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x15, 0x0, 0x8) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7fffffff) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = getpgrp(0x0) ptrace$setopts(0x4206, r1, 0x80000001, 0x0) 04:53:09 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fdatasync(r1) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x800, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000100)=0x7, 0x4) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000000c0)={'gretap0\x00', {0x2, 0x4e21, @remote}}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000000080)={0xd267, 0x7, 0x2, 0x0, 0x35d4, 0x80}) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, 0x0) 04:53:09 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400, 0x0) r2 = getpgrp(0x0) write$P9_RGETLOCK(r1, &(0x7f0000000040)={0x26, 0x37, 0x2, {0x1, 0x81, 0x1, r2, 0x8, 'vboxnet1'}}, 0x26) getpgrp(r2) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000080)={0x3, 0x1ff, 0x0, 0x1}, 0x10) 04:53:09 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb3c906d8544b0bb3ffef1d7020401", 0xf}], 0x4000000000000, 0x0) 04:53:09 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000fd0ff3)='/dev/usbmon#\x00', 0x5, 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x40189206, &(0x7f0000ddd000)) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/254, 0xfe}], 0x1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x210080, 0x0) 04:53:09 executing program 3: r0 = dup(0xffffffffffffffff) write$UHID_DESTROY(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x4, 0x400, 0x7, 0x8, 0x3, 0x0, 0x7, 0x0, 0x1f, 0xde, 0x6}, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0xfc0004) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r2, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x500, 0x0, &(0x7f0000004a80)={0x77359400}) 04:53:09 executing program 4: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@random="cd390b081bf2", @random="9766b383f21d", [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0xffffff88, 0x0, @empty, @mcast2, [], "f601929f106531aa"}}}}}}}, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x9, 0x403) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) 04:53:09 executing program 5: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x121080) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="05d38c2fb5fb6a1cfc8ae21c18538b445d6653eee5ca3e8d8f4adefae6f2bea5"], 0x20) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0x0, [], [{0x3, 0x24d, 0x9, 0x7, 0x5, 0xb3}, {0x7f, 0xfcd1, 0x4, 0x1f, 0x5, 0x9}], [[], [], []]}) recvmmsg(r2, &(0x7f0000000040), 0x20f, 0x0, 0x0) 04:53:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x800000000000, @ipv4, 0xfffffffffffffffd}, 0x1c) sendto$inet6(r1, &(0x7f00000000c0)="dd", 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000380)=[{{0x0, 0xfef3, 0x0, 0x0, 0x0, 0xfffffffffffffdcc}}], 0x400000000000490, 0x6, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2a, 0x88a02) write$P9_ROPEN(r2, &(0x7f0000000200)={0x18, 0x71, 0x2, {{0x30, 0x1, 0x6}, 0x1f}}, 0x18) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000140)=0x54) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x1) 04:53:09 executing program 2: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="020900000200000000c47dd31b650aad"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000007000006000000000000060000800000000000e00000010b00000000000000000035000000000000000000000000ff00000000030006000000000002000004000000bb000000000000000003000500000000000200423b000000000000004000000000"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r5, 0x4188aea7, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000e3ff0000"]) 04:53:09 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x10000, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000040)={@null, @default, @default, 0x1, 0x0, 0x6, [@bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x8) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x400000000000098, 0x0, 0x0) signalfd(r0, &(0x7f0000000100), 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ipv6_route\x00') preadv(r1, &(0x7f00000017c0), 0x14d, 0x0) poll(&(0x7f0000000f00)=[{r1}], 0x1, 0x0) 04:53:09 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x4000, 0x0) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f00000001c0)=0x1000) mkdir(&(0x7f0000000000)='./file0\x00', 0x8) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02b82e10f800000000000000000000000000000000f5fcd2db48adcd79ed9cc59aaf1df2e57e4fbccd98656850218de2860403"], 0xd, 0x3) 04:53:09 executing program 3: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2000, 0x105084) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x1000, 0x9, 0x80000001, 0x81, 0x4, 0x6, 0x72b, {0x0, @in6={{0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, [], 0x2b}, 0xffff}}, 0xa7, 0x8, 0x4, 0x743a, 0xe26b}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000300)={r3, 0x76, "ee7987ddad3b701b860508e743cde4d8a9170cd514ea6d6b9f990b87999dbf3d38cbcc9c7013c15bf4e643b3907f78e216d9e50091a80db0f65f3d5426867e63c5bb29fde25ac7bd48529aa1a0e6c500ccdd258ae37d0b3dd36b5fb0b080fe86bff31d5505e9dff529dc784392d3eb506815492270bf"}, &(0x7f0000000180)=0x7e) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f0000000000)=0x7, 0x4) r4 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r4) sendfile(r0, r1, 0x0, 0x102000002) 04:53:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x800000000000, @ipv4, 0xfffffffffffffffd}, 0x1c) sendto$inet6(r1, &(0x7f00000000c0)="dd", 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000380)=[{{0x0, 0xfef3, 0x0, 0x0, 0x0, 0xfffffffffffffdcc}}], 0x400000000000490, 0x6, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2a, 0x88a02) write$P9_ROPEN(r2, &(0x7f0000000200)={0x18, 0x71, 0x2, {{0x30, 0x1, 0x6}, 0x1f}}, 0x18) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000140)=0x54) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x1) 04:53:09 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ashmem\x00', 0x400001, 0x0) r1 = accept4$inet(0xffffffffffffff9c, 0x0, 0x0, 0x80000) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000e40)={0x0, {0x2, 0x4e23, @remote}, {0x2, 0x0, @empty}, {0x2, 0x200000004e22, @local}, 0x2, 0x0, 0x0, 0x0, 0x45, 0x0, 0x3f}) lseek(r1, 0x0, 0xe9514f5cfd3f2de3) r2 = perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x70, 0x4, 0x0, 0x0, 0x0, 0x66ae, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @remote, 0x4e23, 0x3, 'dh\x00', 0x20, 0x10000}, {@empty, 0x4e23, 0x10003, 0x5, 0x7, 0x12}}, 0x44) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000680)={0x0, 0x70, 0x59b, 0x10000, 0x2, 0x3, 0x0, 0xffffffff, 0x208, 0x3, 0x10001, 0x4, 0x6, 0x7a, 0x4de, 0x80000001, 0x400, 0x8, 0xffffffff80000001, 0x10001, 0x3, 0x8, 0x2, 0x8001, 0x5, 0x5, 0x5, 0x3, 0x4, 0x5, 0x200, 0x4, 0x3, 0x9, 0x7, 0x40, 0x3, 0x6, 0x0, 0x401, 0x4, @perf_bp={&(0x7f0000000340), 0x2}, 0x1, 0x100000000, 0x604e, 0x7, 0xfffffffffffff2dd, 0x5, 0x8}) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) syz_open_pts(r2, 0x2000000002) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x70, 0x0, 0x100, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb829, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getrandom(&(0x7f00000001c0)=""/5, 0x5, 0x9cb6b8d6719790dd) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = syz_open_dev$usbmon(0x0, 0xe1, 0x10d00) r5 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000200)=0x8) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec2903", 0x5}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r5, &(0x7f0000000180)={0x14, 0x69, 0x1, {0x0, 0x2, 0x4}}, 0x14) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r4, &(0x7f0000000240)="93be524b80fc4f9fa371c13aba3f679c5693d112aa5fcfe2517c14a5980bacce185f437324efcca6478c9229212b455e7984a4a464670749b71f4350288bd0bdae0da3b4012f2189932cc1ee13507e2b993c674c057598044e04231fa6ae24e372752a081c53608451c8eb567697f413f05b146ab4185e24c046fdfdcdf4b935647631d8ec951f598d28da1e29b309d82dc9bed6cb2083ead91a40c46902eb02d341fe56b5867bd0c2cddd4532e9afa92cdefea1cb22351073fd540fd1", &(0x7f0000000580)=""/223}, 0x18) getsockopt$inet_tcp_buf(r3, 0x6, 0x1c, &(0x7f0000000480)=""/205, &(0x7f0000000400)=0xfffffffffffffebd) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000380)) shutdown(0xffffffffffffffff, 0x1) 04:53:09 executing program 1: clone(0x9004000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000000)={0x7}, 0x7) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r3, 0x2081fc) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) fdatasync(r1) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000140)={0x0, r2, 0x7fff}) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r5 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r5, &(0x7f0000001440)={0x8, "c0c814a55b6300d28afc61ac7dd1ffb869b761e8e53ee36e4be89e9fea175523e4468dec44bf8b5473c7a5062b4ede67dcb24cb9484ccfff2b3a70befc56e8ab2eee3483f5bf78c16beac035b700eb84e2216f268d02b717d2046c273814475b412437f7dc08a13a55d3c02132999dfd9fe80b750eff4d7c1da975b3835602728ae09e72527fcee19377e29c6c19e1ccce0f75e0e54001e3e83e473fa3d37eca8be1b3de565571e0e84f310c11fa8616068113b038aaa5c69967699fc2aa41c6f26fc22cf68e3577242c9b4ca20fab9de5885e0648fbd7af089b05f38f152d2f8144461608733c567b6dc5d2a07022c3764565c85abcfd99dd7a85e58939278235d50e8b321be7dbaa5141e097c28364fad2f713d666ca94f4e429687fcabb72aceeaf8abe5b506d98dc393b6e97492d785ead0ca2953f92c4d2b2c9f616e3d98b36be55a923fc5892413f7a3b615cec89b52e0ecdcee0aa5af72bcbb91b4bade7435dd8b529feaf13f8b48fcaca5952235d2e909f8831d8ca05a0daa3f6c581f388e0c1879b41fe63ef3d122bd0c5acd4fb07b96797918791075ae7383bb1bbdea574b31301ff37ecc45671ee2e7fc55bf6244025d1fd82dca56a42a23aa826a0b1e102bd87893ddc05649304eb1866c796e46e0d57f552bd572891ef892918bb2e7f2c6bcf68f388ea0c50f48c06de1b46b1434cdf25ca1288ebabe2a33d1c6effb77f91ef75471e93952caeda8ac2b2677e46d62b8366922d093832bccb949e177b4417864812d22972d81d89158288b5318d017329d4e8f66273abf74c434f318ebf32c7629342a85336387231b1e579d57cff0b125bef9dddf0fc33f71cb59d5a8972cda06ba6bba4a89cb8d3b465492c431698984998b2979ea61fed3d99b049724f2bdda5a0700ccb28825da1343f41290e569a6d38d4ae3968147cf39b097efd78e058fc71523c12e724bf93dc4ecc02b5cb18d13b59ec8f85368ac1ea93ed0149c60c53569dc69cdb3f37470eab26ef010b03a7e651b9e8e9065da347660836eddb3988c9a0f394aad055f727310f646d6cb35131d02aaf24735792bfce250798bebf0d1a4495fca568b9449e81afef2937b50faf873257d7efa07d31759474d50ca2a7922e79ab47dd59b11dfd1ec43fef3551aed81d01ee4ab997c6cecc39013dcaa442aec803e4cebbc288b4f9e87b30613f0ec88ddc6f60f56787f4040897e6e6bdac317d74b27f97f2efadb031f03c61954fd0232373582b7fa315d3eb9f67053126d2ed0636f04d669c47bdeb078fbda177533902e20b5ce9d8f395ea4c0aaf2cae774fe99bc40105a9ca184bcb598ab2f49c1df62d32d1a6d73a26812cb47a2ccaf0e9b759df89ad1e18238d897b9fd658f6786a92a0c12bd0ee6dad8a430a67962363e5b9afb3329e4f1f6fcd7e63cb8f24872bcf5b8c349d9ce423666ca39f16884219dea338b388e40f4ad996419cb3858637364d8e5af67f846d77b2749115131a3642ef56681315e4a2cbca5e60febabf693570f515e09c2a8994a8e2be3cba28118ef429d4de781118182607dd2c2d5aaba621ea29c140338bd8f1787fd2a3f43bb7fa22a8ce053adb331a4c78eab569af317e14360a6bf1c8b7394f34bfc1a941ac88dab334d5a2d45fc83bee28884698fd82339c972a06efb369220049ca89727513bd4262ad6f94f55f659ec98b684b1d92e1b6a303548a196cc5316e9845baaf01e737ef047d3d1ac4fe13de618e8fd6471c225e688b73b866213f4765c1a1ecf041f66a11177b0425b0423c455dccfa35a34f3b1c4c9850267bd41dcc366f4f8fef6982699e9aee7f3edff90217c84f6865234676e65911e5e99739792161766e959d061d6e86797b595ae3cffc043da0929dce1b4bd27e04532800f14f69398a681d46f00197f547fa138e676a4c84e586e9a2037faad7d7342221c229ff13606688ab70305dc28d01270604fbcb2b5777541e637a10e7d6c2dfa76461b18c8b303234282f31b7ed8afd0cdcc3978c6520a182000ea312296c7d9df08c2a67b944bc519113822014a831c8d6a7f8d26a7a443666b6077bdc1c11cf47001bcbb484d163543445c77a02140191bbb813da818b4dc3ef1ca420f624e5cb67c48024aeb8691b549202750899938067a3ad49da19e9fffc6486b3525fba8b2ff991fb3b4c1a536818f2dad96f713ac264a22136c6a3a9eacb4f69ab08cfe2b971a7d916833c6a0370d4b0bc428db2e4b4013899668b73caf9c983e2f07e46b4b5b4f0d231edee8b1951e1d0e34c881d1fc5c6be05b92b13680398e7109bd18048f0bd980fceb24e59411873e7a8a7f95f4da2ba5c082fdda710361e163a213a3dbb82c08a69020545da4636c09a67cd962182a011cf5eb1c3d999abc7b834ee518bb53afe19941927ca190699abf79c334c52e206fc851deb7398947ad5bd125ef3f51349497142e921c85506c739f6319ae0eb8e3c551ceb7e16afc2d6aad36841ed8eb560ef984ee5e00f1ead2c646546b3c145e3700b07fc257551641cf3dcb76a8b3cc75994f2c3eb521cea22d64c8b72b2de506fde8185b70b4707b7f571668a5925ca21e605904d7c896a5d7290b9c4fc75ecc7ddbbd7f6f003a74f53d1a5432e0377a3efce1e7ac61e36dc13aeea57400d4d3986db3fccb6edaf83f86daeb42f416f58c502e74178e013b399d0b155e0df86b40b5f3f2ab0ad61c90870cee340c07977b55622699101e5372677dd4e208fa6b5d4834a2d6f37b2ead107218aa0e702d1f6a60bd4ad3a2e22807237129fdc02993ef1fffe3c285bd4f7b093b2da8d772ce2df7874bf9b7fd0893eb66a4931acc38129bfe4a8fc6b28ea83bcca1220b66c86d4d90914bb9e9a425fce618f11b66f93aa78515eac0f3956cb1e8b6f12d7f6f22c1ca5563e280b15c64732aec2a37d6010cee0fd2263ea3ea2011043153284b4a5fc87cc0dd8c36f084ce715a6e9ba3e8b2586726255d122f2b5677d6590405ae031df8f83840ef3011a7f5d18037407758270d980aa65d5a4aa26a35a61b65178b6183b282771e89a8fe47bd3ea5a23146b924a47c3cc2540a9c8d91d4a8924e010fb6d3e60457e0aa86749cc3444707fda055a0f489aecda68af7f0d7d31cf25641a10bcc0d00996cddf9059121639fa3ff2e5490bae6b702fcf226d8e50f27f0973e5e4cf543445524d0fe3bd55d3f215978bfabcba0d44c076f5b333b2095c70f6a5426338bf0c065ddce27f6730606d84d1ccef8cebcd15085fa8a5d0975dc47eeb09a4ab6da21d01916c97f4e266c4b01f2bfb3b6a08bb5a7cf834e56782d824e7c55b591cd883ed9e806a4f7033bbab49a2b8ab2cb0f6da9d76968208236b35a51f8eba3769a676ad60d69c475706a630f3a078ebaa6ba5bc25719867cb61d48cc3a381b261165c04f3c93f37d72fc15f43df1de34e24e80a46f5d15fb362e71cb4a5365dde04a53dc5e42745fbd601ff148db416244dd76ac16f24138ef9a02491eb5b48d731a8bdcd46040d0ff11a07c040b83db84bfd21ffb1d818203cb7d3f8fca47f1dc510afa8219ab031aaba2147aed7c50228930e895a72abf55ca6997131e231ea92e0059b680735548adf2d572c3540e096a644deb3750e3b341bbeffee70ff22e0b4e56142e4c1965c01a646dd9b5b0055f88f08987ad45adb844b9ffc84792073048c28bcb60f2666802052ee45dcd9a2950d55ecf0234a3dcf67e83cfa0bfb1285eb54e6292d8075c9e1b459e48556f416898557c9c864fc5de459feb53e33dd1a6860a2d1a836ab5ff6efaee123b3715a7137787ee4345efbce38074e262f363a8ff400345c8539d44a7286c7291246810bce063f0877db6585842380b530a4aaef6e36779a95fed220cef6c1fff2fdd5031f83987dc3282d432f322852cc9dc6d00c59d5ed83b386ff97c521e528e59f2df932467ac02d17f8818c2de26d69725f42cecaf186fab7b6e10b1ebd9a9a12ed83cd382d9a6f9a9bed2736cb0ec0260057f5ec704d2e1a64caad59e02ff2022174b23564cb0942e6769b12e0ae4d65dc4c5e6b6ceaf2667e085909c93a9768b7bfdac612801c0bc3848bad51e2367f788cbd1c5091ce0e9c567528c72003712e91247d87f1ff60d3865fc687a35886822079392f8d151b89e09469bef98e59139c460a53805a93245148cbb9a6a010dadc87e9b1a0e0a89e87e433ff1c0ad4b125760858c8badff4d82cbd31cf88f3e2e16a4e960e1e0b5825fc0f2b21d660cf60069d43fb6a8a96c44fa922164f02c9cd5ebb6fad848871224d157777b5a70dc6deb988506bd03aa4ce2200e9ce23641221784250c22d2c8635a3512f45d433cf66e158eb261f48a23d54f5ef4358df3487da471eb5775bdba565ee170be126b2300d0dad050212606f2d77a63fa2ab430e62670e852b89944e611509415bee36bf0961c8918bd8b0eb8af45b1a9d0420c7101a9c5f4a63efb9cc8de7897b5e2b02cb5885ad8d0d8ac7754ba8d4e9d37175e614e3f3a6a7b122bbc6dd9ce78f1b9a4e940a1160bb85650d8932fe1a82d0525630ba017be5129625a45c3cae66c7cdaa33ee704791db81ef2e11a2f528974fa388cd929c934dbdb21425e6117839ab33b2926b036457db3a43083c3ec17231aed4ee5b607a45a5735c9470c03a424b43efcea953c078717344aeb1449c0dfa3a3ec224b542c16cf735466bdaf26b522aef1db547b14f07ebd4f5da34426a46007757be47ed3f643c47f2c4467762cd049d6f4cf8a78d04f8318bdedcee80871e91c0330499d88254555c456d9bde8a892394267eac15c230cf7e7ba19ebc01b1905c80476de3cea8258f6d0820d159f4aa8a37fb378b2685da4e0e89d253187219869f1157bbe4a8a43eabf65e86a6d9b21e25d91c43c3036914427833ed87073886719069148e2e47219bb5da5d9664d64dc5c4ff71c0e808dadbb53a23e41e3c02fd0c9e0704490f3283d1864d15d795882e6522f31445556cab6832f273dac0c7aef4e3f8c09a34d1624fdb087d852f2e827fb2c3105f1afda54b9dc12cfde3cf7747daa5ac70904e82636a13155303f9a1198d6e7f9dc7be394ebc5db9e8380e290e6cae5f320caa56aa94490789fce2e2540b3de8865396f58e14d61d3cb122f7bd1af5a27c6fe733eba3cc39106efc906ea967fb833e2480aa80bd56ccd9e5c25304e2b8135f1453af70059e599cb67bc8eaaa38c39768e74d3da8aba0135f0192d7ddf0149ce62f353b0360251f1f88b272c6e85b4ee4e0563a6de80de83749af6e6aa4d80cab7031aff3f7e8d0c9114940549f828a62be9fd6a16db001369728b4b93d4ecf91563ae03def3ca4e9900a97657c4ff1e41c5742fb3329ba882ed61645aedb22f2543b83cd4007e5d228697a48064acc32ece41f2d5ead3f31a9689249e8b4bb57ac0b136b6c60ec531708235b94db823344aafbb9b79e21959635664b2193c3add0b28767906b7ba4118e6548e9a23b49e9181dc6f7dc7857425c9ab1b1451bc4572fd060190d0b5a76b8368b68e72a212bd0f89d0778d293b1d32f155f30c9aafe7215d2e746ea8f2c73a30bcd8c093a489519b60616b15afe69074ee77fb65caf5faf0aad49106057a91fdcd622a07ac21eb5c221f2e65323228af41b3eb894517c34c4f60ba20fb6f6c4309a7357884c0eeeb0a4874550107f2d0ffdc412f86bdf712f96183b3932cfb4da3f179cde1a288df9af09c243fae8c67b0d208d9cdb7adde8d5e548e0624b19da4818ef656b88280a", 0x1000}, 0xfffffc41) write$UHID_INPUT(r5, 0x0, 0xffffffffffffff46) fcntl$dupfd(r5, 0x406, r5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r5, 0xfffffffffffffffc, 0x0, 0x1000000004) tkill(r0, 0x38) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x3f}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000280)={r6, @in6={{0xa, 0x4e23, 0x6, @dev, 0x1}}, 0x100000000, 0x1, 0x0, 0x6, 0x20}, 0x98) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x39ff, 0x0, 0x100}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{0x2, 0x44, 0x66e7, 0xb4b}, {0x6, 0x9, 0x9, 0x4}, {0x5, 0x0, 0x10001, 0x5}, {0x7, 0x3f, 0x4, 0x9}, {0x4, 0x7, 0x3, 0xffffffff}, {0x7b, 0x4, 0x7, 0x5}, {0x7fff, 0xfffffffffffff698, 0x49, 0x38d3}, {0x3, 0x9, 0xa975, 0x8}]}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000000)=r5, 0x4) ptrace$setregs(0xd, r0, 0x1, &(0x7f0000000040)="e25425d8e338b2120db0bcf5") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000003c0)={&(0x7f0000000380)='./bus\x00', r5}, 0x10) ptrace$cont(0x9, r0, 0x0, 0x0) uselib(&(0x7f0000000340)='./bus\x00') [ 198.253272] IPVS: set_ctl: invalid protocol: 0 172.20.20.187:20003 04:53:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f00000000c0)={{0x5, 0x6d}}, 0x10) socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x20000200) clone(0x20000100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x7d4e03ef5baaa640) 04:53:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x803, 0xfffffffffffffffd) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0xffffffffffffff97) connect$inet(r0, &(0x7f0000000200)={0x2, 0x1000004e23}, 0x10) semctl$IPC_RMID(0x0, 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) poll(&(0x7f0000000040)=[{r0, 0x101}, {0xffffffffffffffff, 0xfffffffffffffffd}], 0x2, 0x0) 04:53:10 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x10000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) lseek(r1, 0x0, 0x1) sendfile(r2, r2, &(0x7f0000000440), 0x20) sendfile(r2, r2, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r3, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000073797a31000000000000fcffffffffffffff0000000000000000000000000000000022000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000000000000000000000049dec26a8eb0cf100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000686a96ee87ce00000000000000000000bff0e7c972e359a70000000032118300acc400b01d373dfe97d9000104000000000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699cfc26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612bb8601000080000000000000063887e2662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd4900"/417], 0x1) r7 = getpid() fcntl$setown(r3, 0x8, r7) sendfile(r5, r6, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x1000000030a6d) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) fstat(r1, &(0x7f0000000600)) getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r4, 0x0, 0xe, &(0x7f0000000340)='net/protocols\x00'}, 0x30) fstat(r0, &(0x7f0000001040)) fstat(r5, &(0x7f00000010c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000480)) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000001140)={{{@in6=@empty, @in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000580)=0xe8) lstat(&(0x7f0000000740)='./file0/file0/file0\x00', &(0x7f0000001240)) sendmsg$netlink(r6, &(0x7f00000007c0)={&(0x7f0000000180)=@proc={0x10, 0x0, 0x25dfdbfb, 0x600000}, 0xc, &(0x7f00000002c0)=[{&(0x7f0000000f00)=ANY=[@ANYBLOB="10000000000128bd7000fddbdf25"], 0x10}], 0x1, 0x0, 0x0, 0x1}, 0x4000) llistxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=""/69, 0x45) syz_genetlink_get_family_id$tipc(&(0x7f0000000780)='TIPC\x00') mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 198.610184] audit: type=1800 audit(1556167990.081:43): pid=7629 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.1" name="bus" dev="sda1" ino=16565 res=0 04:53:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f719bd070") clock_adjtime(0x0, &(0x7f0000001280)={0x3e24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0xfffffffffffffffe, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000000)) 04:53:10 executing program 0: pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000240), 0x4) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x40000000000c) write(r1, &(0x7f0000000000)="1f00000001019b00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) mount$9p_rdma(&(0x7f0000000180)='127.0.0/1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="74726166733d72646d612c708e72743d0000e8e8b100303030000100"]) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x1000, 0x10000) ioctl$sock_bt_hci(r2, 0x800448f0, &(0x7f0000000100)="35a9603a60725247cdbebe53c3c3e40a4870c51eb22979a87e8e3d343dcdd778be45d23b8614633dd7f03f163b15829209b7874d3ae58376444759aba3b308be812110fabc27604598f46c2964ccbce4a910342cd6975e5be6ce07d17c453674adbfc648856a663dd06c58a7fe44deb71f0f933c4c18") sendto$inet(r2, &(0x7f0000000000)="fdf016c9fba23238c0d905ac5e410beecd536f7cb406eadd497e55ef2a5461314044fd0b37f902d4b70af5658d4b367aab2707312ab586", 0x37, 0x4001, &(0x7f00000001c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) 04:53:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x803, 0xfffffffffffffffd) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0xffffffffffffff97) connect$inet(r0, &(0x7f0000000200)={0x2, 0x1000004e23}, 0x10) semctl$IPC_RMID(0x0, 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) poll(&(0x7f0000000040)=[{r0, 0x101}, {0xffffffffffffffff, 0xfffffffffffffffd}], 0x2, 0x0) 04:53:10 executing program 1: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='9p\x00', 0x1000000, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6163636573733dc6cb2695757365722c6163636573733d616e792c76657273696f6e3d3970323030302e752c6d6561737572652c7365636c6162656c2c6f626a5f726f6c653d2f6465762f766964096f23002c61707072616973655f747970653d696d617369672c646566636f6e746578743d756e636f6e66696e65645f752c00"]) fcntl$setstatus(r0, 0x4, 0x4000) ftruncate(r0, 0x8200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000180)='/dev/video#\x00', 0x3, 0x2) syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xb, 0x0) sendfile(r0, r2, 0x0, 0x8000ffffffff) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x44000, 0x0) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)={0xf5, 0x0, [0x1ff, 0xeddd, 0x0, 0x1fe91eba]}) [ 198.663116] audit: type=1400 audit(1556167990.131:44): avc: denied { map } for pid=7633 comm="syz-executor.3" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=28809 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 04:53:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) getsockopt$inet6_int(r1, 0x29, 0x10000000001, &(0x7f0000b67000), &(0x7f00000000c0)=0x1b0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x10840, 0x1) write$P9_RWRITE(r2, &(0x7f0000000100)={0xb, 0x77, 0x1, 0x80}, 0xb) 04:53:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c1207849bd070") r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x131000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000040), 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000002a80)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000002b40)={0x0, 0x0, &(0x7f0000002b00)={&(0x7f0000002ac0)={0x24, r4, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x800}}}, 0x24}}, 0x0) 04:53:10 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ashmem\x00', 0x400001, 0x0) r1 = accept4$inet(0xffffffffffffff9c, 0x0, 0x0, 0x80000) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000e40)={0x0, {0x2, 0x4e23, @remote}, {0x2, 0x0, @empty}, {0x2, 0x200000004e22, @local}, 0x2, 0x0, 0x0, 0x0, 0x45, 0x0, 0x3f}) lseek(r1, 0x0, 0xe9514f5cfd3f2de3) r2 = perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x70, 0x4, 0x0, 0x0, 0x0, 0x66ae, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @remote, 0x4e23, 0x3, 'dh\x00', 0x20, 0x10000}, {@empty, 0x4e23, 0x10003, 0x5, 0x7, 0x12}}, 0x44) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000680)={0x0, 0x70, 0x59b, 0x10000, 0x2, 0x3, 0x0, 0xffffffff, 0x208, 0x3, 0x10001, 0x4, 0x6, 0x7a, 0x4de, 0x80000001, 0x400, 0x8, 0xffffffff80000001, 0x10001, 0x3, 0x8, 0x2, 0x8001, 0x5, 0x5, 0x5, 0x3, 0x4, 0x5, 0x200, 0x4, 0x3, 0x9, 0x7, 0x40, 0x3, 0x6, 0x0, 0x401, 0x4, @perf_bp={&(0x7f0000000340), 0x2}, 0x1, 0x100000000, 0x604e, 0x7, 0xfffffffffffff2dd, 0x5, 0x8}) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) syz_open_pts(r2, 0x2000000002) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x70, 0x0, 0x100, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb829, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getrandom(&(0x7f00000001c0)=""/5, 0x5, 0x9cb6b8d6719790dd) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = syz_open_dev$usbmon(0x0, 0xe1, 0x10d00) r5 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000200)=0x8) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec2903", 0x5}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r5, &(0x7f0000000180)={0x14, 0x69, 0x1, {0x0, 0x2, 0x4}}, 0x14) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r4, &(0x7f0000000240)="93be524b80fc4f9fa371c13aba3f679c5693d112aa5fcfe2517c14a5980bacce185f437324efcca6478c9229212b455e7984a4a464670749b71f4350288bd0bdae0da3b4012f2189932cc1ee13507e2b993c674c057598044e04231fa6ae24e372752a081c53608451c8eb567697f413f05b146ab4185e24c046fdfdcdf4b935647631d8ec951f598d28da1e29b309d82dc9bed6cb2083ead91a40c46902eb02d341fe56b5867bd0c2cddd4532e9afa92cdefea1cb22351073fd540fd1", &(0x7f0000000580)=""/223}, 0x18) getsockopt$inet_tcp_buf(r3, 0x6, 0x1c, &(0x7f0000000480)=""/205, &(0x7f0000000400)=0xfffffffffffffebd) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000380)) shutdown(0xffffffffffffffff, 0x1) [ 198.802006] audit: type=1804 audit(1556167990.281:45): pid=7652 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir410780590/syzkaller.FiUov9/10/bus" dev="sda1" ino=16568 res=1 04:53:10 executing program 2: r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000440)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x1ff) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)='syz1\x02', 0x1ff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000380)={r3}) perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x0, 0x2, 0x3, 0x2, 0x0, 0x0, 0x0, 0x4, 0xfd, 0x1000, 0x101, 0x0, 0x0, 0x0, 0x4ff8, 0x6, 0x3, 0x0, 0x9, 0x3, 0x0, 0x800, 0x5, 0x0, 0x101, 0x8, 0x0, 0x6, 0xffffffffffff7fff, 0x9, 0x0, 0x8000, 0x0, 0x8000000000000000, 0x100, 0x10001, 0x0, 0x900, 0x7, @perf_bp={0x0}, 0x0, 0x6, 0x0, 0x5, 0x4, 0x62}, 0x0, 0x9, r2, 0x2) r5 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r5, 0xc0305710, &(0x7f0000000200)={0x1, 0x5, 0x3}) write$cgroup_subtree(r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) close(r2) ioctl$TIOCMSET(r4, 0x5418, &(0x7f0000000080)=0x3ff) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) [ 198.902111] EXT4-fs (sda1): re-mounted. Opts: (null) 04:53:10 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x305400, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netstat\x00') preadv(r1, &(0x7f00000004c0)=[{0x0}, {&(0x7f00000023c0)=""/4096, 0x1000}], 0x2, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000080)) 04:53:10 executing program 0: syz_emit_ethernet(0x3a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600002c0000000000329078ac1414fe775daea4610500ac1423bb070300000702907800"/65], 0x0) [ 199.010143] IPVS: set_ctl: invalid protocol: 0 172.20.20.187:20003 04:53:10 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(0x0, &(0x7f00000008c0)={'syz', 0x3}, &(0x7f0000000900)='\x00', 0xfffffffffffffffd) lstat(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) sendmsg$NBD_CMD_STATUS(r0, 0x0, 0x10001fffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000140)={{0xffffffffffffffff, 0x0, 0x40, 0x0, 0x100000000}, 0x6, 0x2}) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x7) r2 = socket$inet(0x10, 0x3, 0xc) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f00000002c0)) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000080)) ftruncate(r1, 0x3) fstat(r0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000500)=ANY=[@ANYBLOB="08000000000000000a004e2000000004000000000200000000000000000000000002000000000062f77d387308aab56e5f0000f20010245d"], 0x1) getresuid(&(0x7f00000001c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) r4 = getegid() write$FUSE_ENTRY(r0, &(0x7f0000000400)={0x90, 0x0, 0x1, {0x0, 0x2, 0x4, 0x8, 0xff, 0xfffffffffffffff8, {0x5, 0xffffffffffff0000, 0x4, 0x8000, 0x2, 0x9, 0x7, 0x8, 0x4000000000000, 0xf, 0x2, r3, r4, 0xfffffffffffffffc, 0x9}}}, 0x90) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000140)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e2800", 0x26}], 0x1}, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) readahead(0xffffffffffffffff, 0x7ffd, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000640)) arch_prctl$ARCH_GET_CPUID(0x1011) [ 199.480542] EXT4-fs (sda1): re-mounted. Opts: (null) [ 199.519485] audit: type=1804 audit(1556167990.991:46): pid=7690 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir410780590/syzkaller.FiUov9/10/bus" dev="sda1" ino=16568 res=1 [ 199.523778] ------------[ cut here ]------------ [ 199.551458] WARNING: CPU: 0 PID: 7689 at fs/direct-io.c:293 dio_complete+0x671/0x800 [ 199.559524] Kernel panic - not syncing: panic_on_warn set ... [ 199.559524] [ 199.566990] CPU: 0 PID: 7689 Comm: syz-executor.1 Not tainted 4.14.113 #3 [ 199.573922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.583385] Call Trace: [ 199.586009] dump_stack+0x138/0x19c [ 199.589663] panic+0x1f2/0x438 [ 199.592857] ? add_taint.cold+0x16/0x16 [ 199.596860] ? dio_complete+0x671/0x800 [ 199.600866] ? __warn.cold+0x14/0x34 [ 199.604581] ? dio_complete+0x671/0x800 [ 199.608550] __warn.cold+0x2f/0x34 [ 199.612116] ? ist_end_non_atomic+0x10/0x10 [ 199.616438] ? dio_complete+0x671/0x800 [ 199.620409] report_bug+0x216/0x254 [ 199.624039] do_error_trap+0x1bb/0x310 [ 199.628021] ? math_error+0x360/0x360 [ 199.631862] ? pagecache_isize_extended+0x250/0x250 [ 199.636912] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 199.641763] do_invalid_op+0x1b/0x20 [ 199.645493] invalid_op+0x1b/0x40 [ 199.648961] RIP: 0010:dio_complete+0x671/0x800 [ 199.653619] RSP: 0000:ffff88805d6671b8 EFLAGS: 00010216 [ 199.658982] RAX: 0000000000040000 RBX: 0000000000008200 RCX: ffffc9000824f000 [ 199.666249] RDX: 0000000000004c22 RSI: ffffffff819ae051 RDI: ffff888085ccc77c [ 199.673624] RBP: ffff88805d667200 R08: ffff88805e3b64c0 R09: 0000000000000002 [ 199.680912] R10: 0000000000000000 R11: ffff88805e3b64c0 R12: ffff8880a4cb33c0 [ 199.688715] R13: 0000000000008200 R14: ffff888085ccc978 R15: 0000000000000000 [ 199.696020] ? dio_complete+0x671/0x800 [ 199.700027] ? dio_complete+0x671/0x800 [ 199.704155] ? trace_hardirqs_on_caller+0x400/0x590 [ 199.709231] ? write_end_fn+0xa0/0xa0 [ 199.713056] do_blockdev_direct_IO+0x530e/0x7fc0 [ 199.717824] ? save_trace+0x290/0x290 [ 199.721644] ? sb_init_dio_done_wq+0x80/0x80 [ 199.726141] ? __lock_is_held+0xb6/0x140 [ 199.730405] ? ext4_dio_get_block_unwritten_async+0x1c0/0x1c0 [ 199.736327] ? __lock_is_held+0xb6/0x140 [ 199.740409] ? ext4_dio_get_block_unwritten_async+0x1c0/0x1c0 [ 199.746309] __blockdev_direct_IO+0xa1/0xd0 [ 199.750639] ? write_end_fn+0xa0/0xa0 [ 199.754465] ext4_direct_IO+0x70d/0x1890 [ 199.758528] ? ext4_dio_get_block_unwritten_async+0x1c0/0x1c0 [ 199.764435] generic_file_direct_write+0x1ec/0x430 [ 199.769458] __generic_file_write_iter+0x2bc/0x5b0 [ 199.774491] ext4_file_write_iter+0x2c0/0xfd0 [ 199.778995] ? ext4_file_mmap+0x2c0/0x2c0 [ 199.783176] ? __might_sleep+0x93/0xb0 [ 199.787090] do_iter_readv_writev+0x41e/0x680 [ 199.791699] ? vfs_dedupe_file_range+0x8f0/0x8f0 [ 199.796476] ? rw_verify_area+0xea/0x2b0 [ 199.800550] do_iter_write+0x154/0x550 [ 199.804457] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 199.809931] ? __kmalloc+0x379/0x7a0 [ 199.813653] vfs_iter_write+0x77/0xb0 [ 199.817462] iter_file_splice_write+0x578/0xae0 [ 199.822152] ? touch_atime+0xce/0x250 [ 199.825957] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 199.831695] ? rw_verify_area+0xea/0x2b0 [ 199.835770] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 199.840907] direct_splice_actor+0x126/0x1a0 [ 199.845330] splice_direct_to_actor+0x2a1/0x7b0 [ 199.850484] ? generic_pipe_buf_nosteal+0x10/0x10 [ 199.855350] ? do_splice_to+0x170/0x170 [ 199.859332] ? rw_verify_area+0xea/0x2b0 [ 199.863417] do_splice_direct+0x18d/0x230 [ 199.867674] ? splice_direct_to_actor+0x7b0/0x7b0 [ 199.872707] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 199.877484] ? __sb_start_write+0x153/0x2f0 [ 199.881822] do_sendfile+0x4db/0xbd0 [ 199.885556] ? do_compat_pwritev64+0x140/0x140 [ 199.890174] ? put_timespec64+0xb4/0x100 [ 199.894245] ? nsecs_to_jiffies+0x30/0x30 [ 199.898397] SyS_sendfile64+0x102/0x110 [ 199.902382] ? SyS_sendfile+0x130/0x130 [ 199.906350] ? do_syscall_64+0x53/0x630 [ 199.910323] ? SyS_sendfile+0x130/0x130 [ 199.914385] do_syscall_64+0x1eb/0x630 [ 199.918269] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 199.923117] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 199.928300] RIP: 0033:0x458d99 [ 199.931488] RSP: 002b:00007f7192230c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 199.939191] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000458d99 [ 199.946454] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003 [ 199.953722] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 199.960986] R10: 00008000ffffffff R11: 0000000000000246 R12: 00007f71922316d4 [ 199.968253] R13: 00000000004c5f83 R14: 00000000004da728 R15: 00000000ffffffff [ 199.976880] Kernel Offset: disabled [ 199.980758] Rebooting in 86400 seconds..