Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 37.258392] audit: type=1800 audit(1570982721.124:33): pid=7154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 37.285716] audit: type=1800 audit(1570982721.124:34): pid=7154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 38.535105] audit: type=1400 audit(1570982722.404:35): avc: denied { map } for pid=7329 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.60' (ECDSA) to the list of known hosts. 2019/10/13 16:05:28 fuzzer started [ 44.963143] audit: type=1400 audit(1570982728.834:36): avc: denied { map } for pid=7339 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/10/13 16:05:30 dialing manager at 10.128.0.105:40435 2019/10/13 16:05:30 syscalls: 2516 2019/10/13 16:05:30 code coverage: enabled 2019/10/13 16:05:30 comparison tracing: enabled 2019/10/13 16:05:30 extra coverage: extra coverage is not supported by the kernel 2019/10/13 16:05:30 setuid sandbox: enabled 2019/10/13 16:05:30 namespace sandbox: enabled 2019/10/13 16:05:30 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/13 16:05:30 fault injection: enabled 2019/10/13 16:05:30 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/13 16:05:30 net packet injection: enabled 2019/10/13 16:05:30 net device setup: enabled 2019/10/13 16:05:30 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 16:08:12 executing program 0: mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in6=@mcast2, 0x4e22, 0xfff, 0x0, 0x5, 0x2, 0x0, 0x80}, {0x0, 0x594, 0x100, 0x1, 0x401, 0x0, 0xffff, 0x9}, {0x40, 0x8, 0x8, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x2}, {{@in6=@mcast2, 0x4d3}, 0x5, @in=@remote, 0x3507, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7ff}}, 0xe8) socket$inet(0x10, 0x0, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x0, 0x0, 0xffffffffffffff49) [ 208.943193] audit: type=1400 audit(1570982892.814:37): avc: denied { map } for pid=7357 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1107 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 209.069622] IPVS: ftp: loaded support on port[0] = 21 16:08:13 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_NOTIFY_DELETE(r1, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xd}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x250}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0xfffffffffffffe5d, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x48, 0x24, 0x607, 0x0, 0x0, {0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8, 0x1, 'htb\x00'}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@dellink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 209.182334] chnl_net:caif_netlink_parms(): no params data found [ 209.234566] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.241984] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.250837] device bridge_slave_0 entered promiscuous mode [ 209.258653] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.265488] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.273882] device bridge_slave_1 entered promiscuous mode [ 209.304290] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 209.314736] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 209.342640] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 209.345633] IPVS: ftp: loaded support on port[0] = 21 [ 209.359729] team0: Port device team_slave_0 added [ 209.366872] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 209.377009] team0: Port device team_slave_1 added [ 209.393978] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 16:08:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000180)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffd}]}) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 209.412721] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 209.459728] audit: type=1400 audit(1570982893.334:38): avc: denied { map } for pid=7339 comm="syz-fuzzer" path="/root/syzkaller-shm732922993" dev="sda1" ino=16501 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 209.492607] device hsr_slave_0 entered promiscuous mode [ 209.530025] device hsr_slave_1 entered promiscuous mode [ 209.572098] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 209.584861] IPVS: ftp: loaded support on port[0] = 21 [ 209.592200] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 16:08:13 executing program 3: creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40046607, &(0x7f00000000c0)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000005d00)={&(0x7f00000002c0)=ANY=[@ANYBLOB="040100001000070d26bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="2040000000000000dc0012000c0001006970366772650000cc00020014000700fe8000000000000000000000000000aa14000700fe8800000000000000000000000001011400060000000000000000000000ffffffffffff1400070000000000e0ffffff000000000000000108000100", @ANYRES32=0x0, @ANYBLOB="08000500020000000800140033060000080010004e200000080002000000000014000700fe8000000000000000000000000000aa08000100", @ANYRES32=0x0, @ANYBLOB="08000f0005000000080013000000000008001800ff000000080011004e230000080017000100040004001200080011004e22000008000a0071c32e25b206", @ANYRES32=0x0], 0x104}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000240)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) write(r2, 0x0, 0x0) recvmmsg(r2, &(0x7f00000072c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) delete_module(&(0x7f0000000000)='selinux[eth1wlan1mime_typevmnet1:ppp0\x00', 0xc00) [ 209.654657] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.661167] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.668307] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.674703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.710278] chnl_net:caif_netlink_parms(): no params data found [ 209.874213] IPVS: ftp: loaded support on port[0] = 21 [ 209.881151] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 209.887238] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.913874] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.921049] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.928334] device bridge_slave_0 entered promiscuous mode [ 209.937434] chnl_net:caif_netlink_parms(): no params data found [ 209.947611] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 16:08:13 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) r1 = socket$nl_route(0x10, 0x3, 0x0) dup3(r1, r0, 0x0) [ 209.972035] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.978414] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.986573] device bridge_slave_1 entered promiscuous mode [ 210.013043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.047223] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.089395] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.102958] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 210.141047] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 210.147135] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.165471] IPVS: ftp: loaded support on port[0] = 21 [ 210.172244] bond0: Enslaving bond_slave_0 as an active interface with an up link 16:08:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x31, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) connect$inet(r0, &(0x7f0000000400)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800a1695e1dcfe87b1071") setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x20b) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 210.200101] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 210.217892] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 210.228716] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 210.241602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.250697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.258459] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.264883] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.274831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.284886] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.295609] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.302032] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.334173] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 210.342667] team0: Port device team_slave_0 added [ 210.350264] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 210.359589] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.365939] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.374445] device bridge_slave_0 entered promiscuous mode [ 210.381356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 210.400202] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 210.407423] team0: Port device team_slave_1 added [ 210.432634] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.440012] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.446881] device bridge_slave_1 entered promiscuous mode [ 210.468260] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 210.476683] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 210.484177] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 210.495669] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 210.507217] IPVS: ftp: loaded support on port[0] = 21 [ 210.517162] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 210.537030] chnl_net:caif_netlink_parms(): no params data found [ 210.547568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.567872] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 210.575128] team0: Port device team_slave_0 added [ 210.583692] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 210.591823] team0: Port device team_slave_1 added [ 210.603104] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 210.661603] device hsr_slave_0 entered promiscuous mode [ 210.699086] device hsr_slave_1 entered promiscuous mode [ 210.743402] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 210.754218] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 210.762187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.770475] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.778061] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 210.790736] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 210.797788] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 210.805219] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 210.820338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.828068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.846108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 210.866574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 210.874629] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 210.886422] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 210.940508] device hsr_slave_0 entered promiscuous mode [ 210.979122] device hsr_slave_1 entered promiscuous mode [ 211.029783] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 211.036903] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 211.051468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 211.059185] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.104343] chnl_net:caif_netlink_parms(): no params data found [ 211.116468] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.123511] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.131312] device bridge_slave_0 entered promiscuous mode [ 211.138616] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.146094] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.153696] device bridge_slave_1 entered promiscuous mode [ 211.175714] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 211.181873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 211.214087] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 211.223752] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 211.236540] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 211.261112] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 211.272079] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 211.311394] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 211.318596] team0: Port device team_slave_0 added [ 211.328701] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.335429] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.343041] device bridge_slave_0 entered promiscuous mode [ 211.356821] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.366005] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.373058] device bridge_slave_1 entered promiscuous mode [ 211.385602] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 211.393194] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 211.401805] team0: Port device team_slave_1 added [ 211.407478] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 211.415601] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 211.437919] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 211.451567] audit: type=1400 audit(1570982895.324:39): avc: denied { associate } for pid=7358 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 211.475318] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 211.541062] device hsr_slave_0 entered promiscuous mode [ 211.599191] device hsr_slave_1 entered promiscuous mode [ 211.640015] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 211.647063] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 211.658972] chnl_net:caif_netlink_parms(): no params data found [ 211.674242] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 211.681947] team0: Port device team_slave_0 added [ 211.694701] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 211.714595] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 211.725365] team0: Port device team_slave_1 added [ 211.733944] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 211.762129] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 211.810624] device hsr_slave_0 entered promiscuous mode [ 211.849093] device hsr_slave_1 entered promiscuous mode [ 211.919567] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 211.941875] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.948353] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.956930] device bridge_slave_0 entered promiscuous mode [ 211.963967] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 211.982004] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.988465] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.996047] device bridge_slave_1 entered promiscuous mode [ 212.016041] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.026036] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 212.035429] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 212.052230] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 212.061127] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 212.073439] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.080478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.104236] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 212.110397] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.124731] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 212.135039] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 212.141936] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.148283] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 212.156313] team0: Port device team_slave_0 added [ 212.164648] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.173760] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 212.182646] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 212.191639] team0: Port device team_slave_1 added [ 212.197659] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 212.205285] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 212.214281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.222159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.229922] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.236256] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.243672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.252387] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 212.260888] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 212.269668] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 212.279105] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 212.285671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.293666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.301806] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.308158] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.317009] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 212.325825] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 212.338985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 212.346689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.353622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.364481] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 212.377360] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 212.384589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 212.392936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.400079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.408177] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 212.414933] 8021q: adding VLAN 0 to HW filter on device team0 16:08:16 executing program 0: close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f00000000c0)) ptrace(0x10, r2) ptrace$getregset(0x4204, r2, 0x1, &(0x7f0000000240)={0x0, 0x1000000}) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x80, 0x0, 0x5, 0x0, 0x0, 0x24000000000000, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9c, 0x0, 0x7fff, 0x0, 0x0, 0x100, 0x0, 0x7fff, 0x0, 0x3f, 0x401, 0x401, 0x0, 0x13fd, 0x0, 0xfff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x7}, 0x0, 0x0, 0x0, 0x7, 0x10001, 0x8001, 0x800}, r2, 0xc, 0xffffffffffffffff, 0x9) ppoll(&(0x7f00000001c0)=[{}, {0xffffffffffffffff, 0x1100}, {r0, 0x4000}, {}], 0x4, &(0x7f0000000200)={0x0, 0x1c9c380}, &(0x7f0000000240)={0x8}, 0x8) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000008000/0x1000)=nil], &(0x7f0000000040), 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='veno\x00', 0x5) sendto$inet(r3, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="03268a927f1f6587b967480b41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a0cccb0844ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x2000c00c, 0x0, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0xa0000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r7, 0x40505412, &(0x7f00000003c0)={0x1, 0x5f3, 0xffff, 0x0, 0x7842552c909bd763}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r6, 0x404c534a, &(0x7f0000000340)={0x3, 0xd62, 0x2}) [ 212.471965] device hsr_slave_0 entered promiscuous mode [ 212.509557] device hsr_slave_1 entered promiscuous mode [ 212.549548] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 212.556769] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 212.576612] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 212.588454] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 212.597865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.608353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.616342] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.622739] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.635336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 212.643146] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.653044] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 212.662146] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 212.668209] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.681042] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 212.690971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.698031] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 212.705499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.713947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.722303] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.728675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.735889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 212.744643] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.754597] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 212.763837] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 212.773430] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 212.786932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 16:08:16 executing program 0: close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f00000000c0)) ptrace(0x10, r2) ptrace$getregset(0x4204, r2, 0x1, &(0x7f0000000240)={0x0, 0x1000000}) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x80, 0x0, 0x5, 0x0, 0x0, 0x24000000000000, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9c, 0x0, 0x7fff, 0x0, 0x0, 0x100, 0x0, 0x7fff, 0x0, 0x3f, 0x401, 0x401, 0x0, 0x13fd, 0x0, 0xfff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x7}, 0x0, 0x0, 0x0, 0x7, 0x10001, 0x8001, 0x800}, r2, 0xc, 0xffffffffffffffff, 0x9) ppoll(&(0x7f00000001c0)=[{}, {0xffffffffffffffff, 0x1100}, {r0, 0x4000}, {}], 0x4, &(0x7f0000000200)={0x0, 0x1c9c380}, &(0x7f0000000240)={0x8}, 0x8) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000008000/0x1000)=nil], &(0x7f0000000040), 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='veno\x00', 0x5) sendto$inet(r3, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="03268a927f1f6587b967480b41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a0cccb0844ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x2000c00c, 0x0, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0xa0000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r7, 0x40505412, &(0x7f00000003c0)={0x1, 0x5f3, 0xffff, 0x0, 0x7842552c909bd763}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r6, 0x404c534a, &(0x7f0000000340)={0x3, 0xd62, 0x2}) [ 212.796896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.813377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.822340] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.828712] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.841158] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 212.855679] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 212.865234] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 212.877799] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 212.892828] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.903344] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 212.911426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.918429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 212.926620] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.934478] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.942240] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.948581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.955813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 212.963720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.971467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 212.978972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 212.989537] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 212.999297] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready 16:08:16 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40800) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000280)=0x5, 0x4) socket$key(0xf, 0x3, 0x2) r1 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept$alg(r4, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@loopback, @in6=@local, 0x0, 0xded6, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x3, 0x6, 0x0, 0x4}}, 0xe8) r6 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$TIOCLINUX3(r6, 0x541c, &(0x7f0000000240)) ioctl$MON_IOCQ_URB_LEN(r6, 0x9201) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) rmdir(&(0x7f00000002c0)='./file0\x00') sendmmsg(r5, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r1, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) [ 213.015844] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 213.024092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.034830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.043862] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.052773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.061888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.074386] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 213.086001] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 213.096006] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 213.112564] hrtimer: interrupt took 42941 ns [ 213.113999] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.124453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.132273] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.139937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.147574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.154635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.167163] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 213.180793] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 213.200044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.207881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.222301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.235645] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 213.244966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.258405] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 213.266792] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.275240] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 213.289061] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 213.297459] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 213.310926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.319597] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.327182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.335110] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.347393] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 213.359939] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 213.366669] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.374966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.383124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.390805] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.397141] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.404106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.411689] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.419377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.432100] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 213.440181] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 213.447803] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 213.457232] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 213.479660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.487400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.516519] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.522994] bridge0: port 2(bridge_slave_1) entered forwarding state 16:08:17 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='trustE7nover\x03\x00\x00\x00up0\xc09\xb5', &(0x7f0000000780)=ANY=[], 0x0, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) fcntl$getflags(0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x80080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0xfffffffffffffee2, 0x0, 0x5, 0x0, 0x0, 0x0, 0x365f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) add_key$keyring(&(0x7f0000000400)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000200)=0x14) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000640)=@can_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8}, @CGW_MOD_OR={0x18, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "dfb6bc1eda3f6722"}, 0x4}}]}, 0x34}}, 0x0) keyctl$negate(0xd, 0x0, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000740)={&(0x7f0000000480)=@in6={0xa, 0x4e20, 0x7fff, @local}, 0x80, 0x0}, 0x20) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) accept4$rose(r3, &(0x7f0000000080)=@short={0xb, @remote, @bcast}, &(0x7f0000000100)=0x1c, 0x800) dup2(r1, 0xffffffffffffffff) [ 213.530011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.537461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.547389] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 213.578526] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 213.588356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.596352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.630137] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.637925] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 213.660005] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 213.669015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.686644] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 213.708686] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 213.719323] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 213.729705] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 213.736080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.750310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.757975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.773593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 16:08:17 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='trustE7nover\x03\x00\x00\x00up0\xc09\xb5', &(0x7f0000000780)=ANY=[], 0x0, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) fcntl$getflags(0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x80080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0xfffffffffffffee2, 0x0, 0x5, 0x0, 0x0, 0x0, 0x365f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) add_key$keyring(&(0x7f0000000400)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000200)=0x14) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000640)=@can_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8}, @CGW_MOD_OR={0x18, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "dfb6bc1eda3f6722"}, 0x4}}]}, 0x34}}, 0x0) keyctl$negate(0xd, 0x0, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000740)={&(0x7f0000000480)=@in6={0xa, 0x4e20, 0x7fff, @local}, 0x80, 0x0}, 0x20) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) accept4$rose(r3, &(0x7f0000000080)=@short={0xb, @remote, @bcast}, &(0x7f0000000100)=0x1c, 0x800) dup2(r1, 0xffffffffffffffff) [ 213.784553] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 213.796839] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 213.810000] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.817412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.826204] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.851535] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 213.871179] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 213.877260] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.906748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.923830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.947894] audit: type=1326 audit(1570982897.814:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7412 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c89a code=0xffff0000 [ 213.951640] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 213.996128] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 214.007813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.015616] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.023287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.031634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.039632] bridge0: port 1(bridge_slave_0) entered blocking state 16:08:17 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYRES16=r1], 0x0) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x800) ioctl$KDADDIO(r2, 0x4b34, 0x800) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/cuse\x00', 0x82, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0xb9540e8d966620ae) getpeername$packet(0xffffffffffffffff, &(0x7f00000016c0), &(0x7f0000001700)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002e00)={@loopback}, &(0x7f0000002e40)=0x14) r6 = socket(0x10, 0x802, 0x0) write(r6, &(0x7f0000000100)="240000002a0025f000154302000000000000c4000400000000e102000000020000000000", 0x24) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@initdev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000003040), &(0x7f0000003080)=0x14) r7 = socket(0x10, 0x802, 0x0) write(r7, &(0x7f0000000100)="240000002a0025f000154302000000000000c4000400000000e102000000020000000000", 0x24) r8 = socket(0x10, 0x802, 0x0) write(r8, &(0x7f0000000100)="240000002a0025f000154302000000000000c4000400000000e102000000020000000000", 0x24) r9 = accept4$vsock_stream(r3, &(0x7f00000003c0)={0x28, 0x0, 0x6933, @hyper}, 0x10, 0x180000) accept(r9, &(0x7f0000003880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000200)=0xfffffffffffffe9e) getpeername$packet(0xffffffffffffffff, &(0x7f0000007580), &(0x7f00000075c0)=0x14) sendmmsg$inet(r5, 0x0, 0x0, 0x20040010) epoll_create1(0x0) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x80000, 0x0) ioctl$VIDIOC_G_CTRL(r10, 0xc008561b, &(0x7f0000000140)={0x7ce60266, 0x9}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x31}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'vxcan1\x00'}, 0x18) inotify_init1(0x16148d3a808eb20d) ioctl(r11, 0x800000000008982, &(0x7f0000000080)) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="7c77f75d8db99811d3601cf9e2e4fe8f61c90c237b628ebd8a24b9b543ebd3ea28ec48590cc81457bc650d08538e36d35b365e040eb9c038da3df83ea0c1749b4976f31e512f654cfbc418fdcb94d946e6f6", @ANYRES16=r13, @ANYBLOB="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"], 0x20}}, 0x0) io_setup(0xb, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r14, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0}]) [ 214.046010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.053641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.068654] netlink: 'syz-executor.3': attribute type 16 has an invalid length. [ 214.090756] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 16:08:17 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@empty}}, &(0x7f0000000080)=0xe8) setfsuid(r0) syz_emit_ethernet(0x4a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd606c48a300142f00fe800000000000000000000000000000ff020000000000000000000000000001000088be", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="b225"], &(0x7f00000000c0)) [ 214.101376] netlink: 'syz-executor.3': attribute type 15 has an invalid length. [ 214.119530] audit: type=1400 audit(1570982897.974:41): avc: denied { create } for pid=7428 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 214.139453] netlink: 'syz-executor.3': attribute type 24 has an invalid length. [ 214.145639] audit: type=1400 audit(1570982897.984:42): avc: denied { write } for pid=7428 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 214.174837] netlink: 'syz-executor.3': attribute type 17 has an invalid length. 16:08:18 executing program 0: r0 = socket(0x2, 0x80805, 0x0) r1 = epoll_create1(0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x3000, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x72, &(0x7f0000000000)={r5, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r5, 0xffff, 0x6}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r5, 0x9}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000001c0)=ANY=[@ANYRES32=r6, @ANYBLOB="080004005369eae3e271efa8b387b3345f08c3e15f61616e04fffd17362e94aa1539560000000000000008e590318ff941d97da11bbbb28fc24570a4d324da5653fc400586817ef652d938"], 0xc) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000000eff4)={0x30000010}) shutdown(r0, 0x1) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r8, r9, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(0xffffffffffffffff) shutdown(r0, 0x0) [ 214.182932] audit: type=1400 audit(1570982897.984:43): avc: denied { read } for pid=7428 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 214.194074] netlink: 'syz-executor.3': attribute type 23 has an invalid length. [ 214.236208] netlink: 'syz-executor.3': attribute type 17 has an invalid length. [ 214.318034] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 214.337270] audit: type=1400 audit(1570982898.204:44): avc: denied { block_suspend } for pid=7437 comm="syz-executor.0" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 214.338358] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 214.373034] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.384148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.393500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.401392] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.407729] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.454550] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 214.466769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.478088] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 214.486044] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 214.494070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.505557] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 214.516569] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.526522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.535113] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.543305] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.590453] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 214.602684] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 214.625540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.637226] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.646234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.653918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.662056] netlink: 'syz-executor.3': attribute type 16 has an invalid length. [ 214.672960] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 214.681130] netlink: 'syz-executor.3': attribute type 15 has an invalid length. [ 214.723921] audit: type=1326 audit(1570982898.594:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7412 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c89a code=0xffff0000 [ 214.764563] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready 16:08:18 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYRES16=r1], 0x0) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x800) ioctl$KDADDIO(r2, 0x4b34, 0x800) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/cuse\x00', 0x82, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0xb9540e8d966620ae) getpeername$packet(0xffffffffffffffff, &(0x7f00000016c0), &(0x7f0000001700)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002e00)={@loopback}, &(0x7f0000002e40)=0x14) r6 = socket(0x10, 0x802, 0x0) write(r6, &(0x7f0000000100)="240000002a0025f000154302000000000000c4000400000000e102000000020000000000", 0x24) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@initdev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000003040), &(0x7f0000003080)=0x14) r7 = socket(0x10, 0x802, 0x0) write(r7, &(0x7f0000000100)="240000002a0025f000154302000000000000c4000400000000e102000000020000000000", 0x24) r8 = socket(0x10, 0x802, 0x0) write(r8, &(0x7f0000000100)="240000002a0025f000154302000000000000c4000400000000e102000000020000000000", 0x24) r9 = accept4$vsock_stream(r3, &(0x7f00000003c0)={0x28, 0x0, 0x6933, @hyper}, 0x10, 0x180000) accept(r9, &(0x7f0000003880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000200)=0xfffffffffffffe9e) getpeername$packet(0xffffffffffffffff, &(0x7f0000007580), &(0x7f00000075c0)=0x14) sendmmsg$inet(r5, 0x0, 0x0, 0x20040010) epoll_create1(0x0) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x80000, 0x0) ioctl$VIDIOC_G_CTRL(r10, 0xc008561b, &(0x7f0000000140)={0x7ce60266, 0x9}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x31}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'vxcan1\x00'}, 0x18) inotify_init1(0x16148d3a808eb20d) ioctl(r11, 0x800000000008982, &(0x7f0000000080)) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="7c77f75d8db99811d3601cf9e2e4fe8f61c90c237b628ebd8a24b9b543ebd3ea28ec48590cc81457bc650d08538e36d35b365e040eb9c038da3df83ea0c1749b4976f31e512f654cfbc418fdcb94d946e6f6", @ANYRES16=r13, @ANYBLOB="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"], 0x20}}, 0x0) io_setup(0xb, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r14, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0}]) [ 214.786623] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 214.805419] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready 16:08:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x15) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$FUSE_INIT(r1, &(0x7f0000000080)={0x50, 0x0, 0x3, {0x7, 0x1f, 0x6, 0x2000000, 0x4, 0x8, 0x0, 0x3}}, 0x50) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f00000005c0)="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", 0xa96}], 0x0, 0x0) [ 214.828996] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.843755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.851955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.886579] syz-executor.3 (7425) used greatest stack depth: 22512 bytes left [ 214.953713] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 215.002692] kvm: emulating exchange as write [ 215.023039] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 215.049903] 8021q: adding VLAN 0 to HW filter on device batadv0 16:08:19 executing program 4: syz_open_dev$rtc(0x0, 0x0, 0x1a0000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x1000000000000a) connect$rxrpc(r0, &(0x7f00000001c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b329490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e6a2037347ff1cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}}], 0x40000000000037b, 0xc000) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000003600)={0x0, 0x4f, "0fdf5913a80494979dd2823d8897658dd6314be670ba193c9e5946eb05402b72ee84a912d6cbeaae02f362f712badc5e33e3673e12fa524992e3a2487650b1729a2a740943494b1c3a1b8e7024543e"}, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x71, 0x0, &(0x7f0000001840)) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') [ 215.179102] protocol 88fb is buggy, dev hsr_slave_0 [ 215.290801] protocol 88fb is buggy, dev hsr_slave_0 [ 215.298223] protocol 88fb is buggy, dev hsr_slave_1 16:08:19 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYRES16=r1], 0x0) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x800) ioctl$KDADDIO(r2, 0x4b34, 0x800) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/cuse\x00', 0x82, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0xb9540e8d966620ae) getpeername$packet(0xffffffffffffffff, &(0x7f00000016c0), &(0x7f0000001700)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002e00)={@loopback}, &(0x7f0000002e40)=0x14) r6 = socket(0x10, 0x802, 0x0) write(r6, &(0x7f0000000100)="240000002a0025f000154302000000000000c4000400000000e102000000020000000000", 0x24) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@initdev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000003040), &(0x7f0000003080)=0x14) r7 = socket(0x10, 0x802, 0x0) write(r7, &(0x7f0000000100)="240000002a0025f000154302000000000000c4000400000000e102000000020000000000", 0x24) r8 = socket(0x10, 0x802, 0x0) write(r8, &(0x7f0000000100)="240000002a0025f000154302000000000000c4000400000000e102000000020000000000", 0x24) r9 = accept4$vsock_stream(r3, &(0x7f00000003c0)={0x28, 0x0, 0x6933, @hyper}, 0x10, 0x180000) accept(r9, &(0x7f0000003880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000200)=0xfffffffffffffe9e) getpeername$packet(0xffffffffffffffff, &(0x7f0000007580), &(0x7f00000075c0)=0x14) sendmmsg$inet(r5, 0x0, 0x0, 0x20040010) epoll_create1(0x0) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x80000, 0x0) ioctl$VIDIOC_G_CTRL(r10, 0xc008561b, &(0x7f0000000140)={0x7ce60266, 0x9}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x31}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'vxcan1\x00'}, 0x18) inotify_init1(0x16148d3a808eb20d) ioctl(r11, 0x800000000008982, &(0x7f0000000080)) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="7c77f75d8db99811d3601cf9e2e4fe8f61c90c237b628ebd8a24b9b543ebd3ea28ec48590cc81457bc650d08538e36d35b365e040eb9c038da3df83ea0c1749b4976f31e512f654cfbc418fdcb94d946e6f6", @ANYRES16=r13, @ANYBLOB="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"], 0x20}}, 0x0) io_setup(0xb, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r14, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0}]) 16:08:19 executing program 0: r0 = socket(0x2, 0x80805, 0x0) r1 = epoll_create1(0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x3000, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x72, &(0x7f0000000000)={r5, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r5, 0xffff, 0x6}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r5, 0x9}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000001c0)=ANY=[@ANYRES32=r6, @ANYBLOB="080004005369eae3e271efa8b387b3345f08c3e15f61616e04fffd17362e94aa1539560000000000000008e590318ff941d97da11bbbb28fc24570a4d324da5653fc400586817ef652d938"], 0xc) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000000eff4)={0x30000010}) shutdown(r0, 0x1) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r8, r9, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(0xffffffffffffffff) shutdown(r0, 0x0) 16:08:19 executing program 2: getrusage(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0xe) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000100)={0x0, 0x3}) syz_open_pts(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)) syz_open_pts(0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10001, 0x0) r7 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="23c041638cd1c7201ce4bea32aa6fbe543f5864dae689564aefa7f3a77bd6b332b674664e51f7e8dca2d26d9c14eb4d044beef9961f573a4d444d5965c50417e6a1bbceaf8dd0b5aa87331ee293417ce3b4fffe34e", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000016c0)=0xc) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$EVIOCGABS3F(r8, 0x8018457f, &(0x7f00000002c0)=""/157) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) 16:08:19 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = socket$inet(0x2, 0x3, 0x800000800000001) r1 = request_key(&(0x7f0000000900)='trusted\x00', &(0x7f0000000940)={'syz', 0x2}, &(0x7f0000000980)='syz', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000ac0)='keyring\x00', 0x0, 0x0, 0x0, r1) keyctl$setperm(0x5, r1, 0x501) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'team_slave_1\x00\x00\x00@'}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 16:08:19 executing program 4: syz_open_dev$rtc(0x0, 0x0, 0x1a0000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x1000000000000a) connect$rxrpc(r0, &(0x7f00000001c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b329490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e6a2037347ff1cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}}], 0x40000000000037b, 0xc000) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000003600)={0x0, 0x4f, "0fdf5913a80494979dd2823d8897658dd6314be670ba193c9e5946eb05402b72ee84a912d6cbeaae02f362f712badc5e33e3673e12fa524992e3a2487650b1729a2a740943494b1c3a1b8e7024543e"}, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x71, 0x0, &(0x7f0000001840)) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') 16:08:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffdc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept4$inet(r3, 0x0, &(0x7f0000000000), 0x400) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000007, &(0x7f0000000040)=0x2000000000000074, 0x246) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r5 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x7f, 0xea2b0aca6c200f9d) setsockopt$IP_VS_SO_SET_EDITDEST(r5, 0x0, 0x489, &(0x7f0000000140)={{0x2f, @broadcast, 0x4e21, 0x0, 'dh\x00', 0x20, 0x80000001, 0x48}, {@empty, 0x4e20, 0x0, 0x100, 0x0, 0x5fb}}, 0x44) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) getsockopt$IP_VS_SO_GET_DAEMON(r5, 0x0, 0x487, &(0x7f0000000400), &(0x7f0000000440)=0x30) pwritev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f00000002c0)="fb6c8b4fbfb06a5a8e742c0c937542f485720aa478aedd6712ea50a931b29e999a6a454374c741148e45b0ab97fa98182f9aecfbd4e773126c21d82b168d9bd9686f02460c4df33bf48994b41da5b9a5b6eba875ee1dc989ad4b2731d71da32e6797cc22d9e2bfa9ebddfb1f18651acc0013edb7d103d4297ac5341e52640631d63d6bcc0f9f82e8faf7cbe0d5e05b151fc1a230664821b537bd00c03686fb1b23c43dfd71da9ac7021c1aa6e654a08d4c354312731d9920fbc4585a458bd4c041ba44d55a1f1a9e586641d06b0ca868a5b2b735a2d4", 0xd6}, {&(0x7f00000001c0)="aa56a21fe3822a50419d8800db036b9568bbc405f1432c1f61e32e38eafbc8001fac8512bdef8c409792d73d029da36ecc27ac0fdad55f2bb46ae914d842b891e0fdde088da72be56970b3f3432ba8d508aec0e59d7001eb6e6413369bda1d4d007a18c40057ae8d9e737a7159e5895efd2446fc16b639ba37ca19671c193c1a4ee5ae35c86946c51b4617c56b8e9d0d7161250b4ebb7ff27c7ccdc0973f827536fa869d8ea77eeaffc51b71412f710491ba6b1cca0cd8c3", 0xb8}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r6, r7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$EVIOCGSW(r8, 0x8040451b, &(0x7f00000004c0)=""/137) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup3(r9, r10, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) write$FUSE_POLL(r11, &(0x7f0000000480)={0x18, 0x0, 0x1}, 0x18) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 16:08:19 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = socket$inet(0x2, 0x3, 0x800000800000001) r1 = request_key(&(0x7f0000000900)='trusted\x00', &(0x7f0000000940)={'syz', 0x2}, &(0x7f0000000980)='syz', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000ac0)='keyring\x00', 0x0, 0x0, 0x0, r1) keyctl$setperm(0x5, r1, 0x501) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'team_slave_1\x00\x00\x00@'}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 16:08:19 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x40, 0x0) ioctl$KVM_SMI(r0, 0xaeb7) creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='udf\x00', 0xc401, 0x0) [ 215.896472] print_req_error: I/O error, dev loop5, sector 64 [ 215.915539] print_req_error: I/O error, dev loop5, sector 256 [ 215.922170] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 215.939481] print_req_error: I/O error, dev loop5, sector 512 16:08:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000080)=""/97, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000480)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000000)=0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r6, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r6, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000080)=""/97, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r6, 0x4008af03, &(0x7f0000000480)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r6, 0x4004af61, &(0x7f0000000000)=0x1) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYRES32, @ANYRESOCT=0x0, @ANYRES32=r6]], 0xffffffaa) 16:08:19 executing program 4: syz_open_dev$rtc(0x0, 0x0, 0x1a0000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x1000000000000a) connect$rxrpc(r0, &(0x7f00000001c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b329490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e6a2037347ff1cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}}], 0x40000000000037b, 0xc000) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000003600)={0x0, 0x4f, "0fdf5913a80494979dd2823d8897658dd6314be670ba193c9e5946eb05402b72ee84a912d6cbeaae02f362f712badc5e33e3673e12fa524992e3a2487650b1729a2a740943494b1c3a1b8e7024543e"}, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x71, 0x0, &(0x7f0000001840)) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') [ 215.945856] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 215.965426] print_req_error: I/O error, dev loop5, sector 64 [ 215.971638] print_req_error: I/O error, dev loop5, sector 512 [ 215.978781] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 216.000591] device nr0 entered promiscuous mode 16:08:19 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x2, 0x18000) openat$cgroup_ro(r2, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1, 0xfffffffffffffffc}, 0x4) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='\x00', 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x10000, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) add_key$user(0x0, 0x0, &(0x7f00000002c0)="51a1d30d129f5b2b07f56999bb723901cc0f77f29bab2ed16baf2f1f32092f6f4b458a08e922c45ba65a6b98636b2b73d5c5dbd53ca6935fad148ffc8fc69ad231", 0x41, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) accept4(r0, 0x0, 0x0, 0x80800) syz_open_procfs(0x0, 0x0) 16:08:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2000000012, &(0x7f0000000000)=0x7ffffffffa, 0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000340)={0x4, [0x0, 0x0, 0x0, 0x0]}) sendto$inet(r0, 0x0, 0xff1b, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x2601, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ZERO(r6, 0x0, 0x48f, &(0x7f0000000400)={0x62, @broadcast, 0x4e23, 0x3, 'lblcr\x00', 0x2c, 0x5, 0x7a}, 0xfffffffffffffe86) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x7fff, 0x6, 0xfffc, 0x8, 0x0, 0x36e, 0x31, {0x0, @in6={{0xa, 0x4e24, 0x7ff, @mcast1, 0x7}}, 0x80000001, 0x2a7, 0x200, 0x10000, 0xfffc0000}}, &(0x7f0000000180)=0xb0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000001c0)={r7, 0xda6, 0x1, [0x8]}, 0xa) r8 = fcntl$dupfd(r2, 0x0, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup3(r9, r10, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="280000001e000102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="0000f8ffffff0700998a00", @ANYRES32=r12], 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'vcan0\x00', r12}) setsockopt$inet_mreqn(r11, 0x0, 0x24, &(0x7f00000003c0)={@multicast1, @local, r13}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$TCSETAF(r8, 0x5408, &(0x7f0000000100)={0x700d, 0x4, 0x112, 0x5, 0x19, 0x0, 0x6, 0x0, 0x9, 0x20}) sendto$inet(r0, &(0x7f0000001ac0)="8c5e9e81e0f7ab32", 0x1192aca8268c9077, 0x4, 0x0, 0xfe5f) recvfrom$inet(r0, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x0, 0x0, 0xfffffffffffffe3d) r14 = fcntl$dupfd(0xffffffffffffffff, 0x0, r8) ioctl$PPPIOCGUNIT(r14, 0x80047456, &(0x7f0000000300)) [ 216.021034] print_req_error: I/O error, dev loop5, sector 1024 [ 216.027215] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 16:08:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2, 0x0, 0x8, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000006c0)=[{0x0}], 0x0, 0x0) r0 = getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) connect$rose(r3, &(0x7f0000000140)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @default]}, 0x40) r4 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) syz_open_procfs$namespace(r5, &(0x7f00000001c0)='ns/mnt\x00') perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x43, 0x6, 0x9, 0x0, 0x0, 0x1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2, @perf_config_ext={0xffffffffdc02fc27, 0x2}, 0x5800, 0x8, 0x1, 0x0, 0x200, 0x4, 0x7}, r0, 0x0, r4, 0x8) [ 216.101846] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 216.124922] print_req_error: I/O error, dev loop5, sector 64 [ 216.131161] print_req_error: I/O error, dev loop5, sector 1024 [ 216.137312] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 216.169173] print_req_error: I/O error, dev loop5, sector 2048 [ 216.175425] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 216.249302] print_req_error: I/O error, dev loop5, sector 64 [ 216.255494] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 16:08:20 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22, 0x0, 0x0, 0x0, 0x0, 0x20000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) pipe(&(0x7f0000000180)) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x4000) r2 = socket$bt_hidp(0x1f, 0x3, 0x6) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) socket$unix(0x1, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|', 0x2761, 0x0) write$P9_RWSTAT(r3, &(0x7f0000000000)={0x7}, 0x7) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, 0x0) write$P9_RGETATTR(r4, &(0x7f0000000880)={0xa0, 0x19, 0x2, {0x400, {0x44}, 0x2, 0x0, 0x0, 0x40, 0x80000001, 0x5, 0x3, 0x3, 0xffff, 0x4, 0x0, 0x0, 0x1, 0xfffffffffffffffc, 0x7, 0xff, 0x1, 0xab}}, 0xa0) ioprio_get$uid(0x3, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0xd8) [ 216.307726] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 216.328980] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1) [ 216.373442] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:08:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4400000010000105000000000000000000000000a79c4139ca860a75143773de8a2781ae985d22e91550197b0b035208a26bbfb475446177d58d830ce8a0339448c8ab18e035682556282e76a9", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008001500000000000800010004000000"], 0x44}}, 0x0) 16:08:20 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x11201, 0x0) r2 = dup(r1) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r2, r0, 0x0, 0x1) [ 216.613419] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 16:08:20 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x2, 0x18000) openat$cgroup_ro(r2, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1, 0xfffffffffffffffc}, 0x4) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='\x00', 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x10000, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) add_key$user(0x0, 0x0, &(0x7f00000002c0)="51a1d30d129f5b2b07f56999bb723901cc0f77f29bab2ed16baf2f1f32092f6f4b458a08e922c45ba65a6b98636b2b73d5c5dbd53ca6935fad148ffc8fc69ad231", 0x41, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) accept4(r0, 0x0, 0x0, 0x80800) syz_open_procfs(0x0, 0x0) 16:08:20 executing program 2: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x1, &(0x7f0000000240)={0x0, 0x1000000}) timer_create(0x2, &(0x7f0000000180)={0x0, 0x32, 0x0, @tid=r0}, &(0x7f00000002c0)=0x0) timer_getoverrun(r1) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) open(&(0x7f0000000200)='./file0/file0\x00', 0x14602, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndpcmc(0x0, 0x4, 0x100) connect$vsock_dgram(r2, &(0x7f0000000300)={0x28, 0x0, 0x0, @host}, 0x10) r3 = getpgrp(0x0) r4 = gettid() rt_tgsigqueueinfo(r3, r4, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffa}) sched_setattr(r4, 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r6, 0x4040ae75, &(0x7f0000000280)={0x5721e621, 0x7, 0x1, 0x601}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 16:08:20 executing program 5: pivot_root(0x0, 0x0) unshare(0x28020400) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8000, 0x40) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, &(0x7f00000004c0)) open$dir(0x0, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r3, 0x0, 0x8004, 0x7fff) fallocate(r3, 0x3, 0x0, 0xfff9) openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r4, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='cmdline\x00') read$FUSE(r5, 0x0, 0x116) ioctl$RTC_WIE_ON(r5, 0x700f) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r7 = fcntl$dupfd(r6, 0x0, r6) bind$bt_rfcomm(r7, 0x0, 0x0) write$P9_RXATTRWALK(r7, &(0x7f0000000140)={0xf, 0x9, 0x5}, 0xfffffffffffffd5f) recvmmsg(r7, &(0x7f0000000c40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x4a79bb8416330e5e, 0x0) r8 = syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x0) r9 = dup(r8) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r9, 0x0, 0x20000040) ptrace$pokeuser(0x6, 0x0, 0x0, 0x2) r10 = socket$inet6(0xa, 0x3, 0x6) r11 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r10, r11, &(0x7f00000000c0)=0x202, 0x8) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) 16:08:20 executing program 4: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="747200000000000000042c08"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000040)) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@bridge_getneigh={0x28, 0x1e, 0x201, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r4}]}, 0x28}}, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) sendmsg$can_bcm(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r4}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x2, 0x1, 0x7, {r5, r6/1000+10000}, {0x77359400}, {0x4, 0x0, 0x1}, 0x1, @can={{0x3}, 0x0, 0x5, 0x0, 0x0, "adeacf49964c3085"}}, 0x48}, 0x1, 0x0, 0x0, 0x18090}, 0x80) [ 216.868904] protocol 88fb is buggy, dev hsr_slave_0 [ 216.874020] protocol 88fb is buggy, dev hsr_slave_1 [ 216.901291] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 216.967986] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 216.993811] 9pnet_virtio: no channels available for device ./file0 [ 217.022524] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 217.032392] syz-executor.2 (7592) used greatest stack depth: 20912 bytes left 16:08:21 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e1e, @broadcast}, {0x2, 0x4e21, @broadcast}, 0x1b0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)='ip6tnl0\x00', 0x100000005, 0x4, 0xffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$rtc(0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000000)=""/191, &(0x7f00000000c0)=0x18) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@uid={'uid'}}]}) 16:08:21 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x222900, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000140)={0x4, 0x5, 0x1}) fanotify_init(0x0, 0x0) syz_open_procfs(0x0, 0x0) getpgrp(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeb46b7c9ec4f26f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0xfffffffffffffdcd) rt_sigaction(0x2000019, 0x0, 0x0, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x309580, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000002c0)={0x3a, @remote, 0x0, 0x0, 'ovf\x00', 0xac9c99f93102500b, 0x4010001, 0x6c}, 0x2c) socket(0x10, 0x80002, 0x7) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000200)) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000340)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r3, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x56420f97db2d6d22, &(0x7f0000000000)={0x0, 0x7530}, 0x10) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) dup(0xffffffffffffffff) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, 0x0) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 16:08:21 executing program 2: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x1, &(0x7f0000000240)={0x0, 0x1000000}) timer_create(0x2, &(0x7f0000000180)={0x0, 0x32, 0x0, @tid=r0}, &(0x7f00000002c0)=0x0) timer_getoverrun(r1) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) open(&(0x7f0000000200)='./file0/file0\x00', 0x14602, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndpcmc(0x0, 0x4, 0x100) connect$vsock_dgram(r2, &(0x7f0000000300)={0x28, 0x0, 0x0, @host}, 0x10) r3 = getpgrp(0x0) r4 = gettid() rt_tgsigqueueinfo(r3, r4, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffa}) sched_setattr(r4, 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r6, 0x4040ae75, &(0x7f0000000280)={0x5721e621, 0x7, 0x1, 0x601}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 217.078549] 9pnet_virtio: no channels available for device ./file0 16:08:21 executing program 4: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x1, &(0x7f0000000240)={0x0, 0x1000000}) timer_create(0x2, &(0x7f0000000180)={0x0, 0x32, 0x0, @tid=r0}, &(0x7f00000002c0)=0x0) timer_getoverrun(r1) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) open(&(0x7f0000000200)='./file0/file0\x00', 0x14602, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndpcmc(0x0, 0x4, 0x100) connect$vsock_dgram(r2, &(0x7f0000000300)={0x28, 0x0, 0x0, @host}, 0x10) r3 = getpgrp(0x0) r4 = gettid() rt_tgsigqueueinfo(r3, r4, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffa}) sched_setattr(r4, 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r6, 0x4040ae75, &(0x7f0000000280)={0x5721e621, 0x7, 0x1, 0x601}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 16:08:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x803, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x8000, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbs={{0x8, 0x1, 'cbs\x00'}, {0x284, 0x2, @TCA_CBS_PARMS={0x18}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x24, 0x11, 0x9, 0x0, 0x0, {0x0, r4}}, 0x24}}, 0x0) 16:08:21 executing program 5: bind$alg(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x220101, 0x0) fchdir(r0) socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) connect$vsock_stream(0xffffffffffffffff, &(0x7f00000001c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10) creat(&(0x7f00000000c0)='./bus\x00', 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) fallocate(r3, 0x8, 0xfffffffffffffffc, 0x7fff) [ 217.304746] audit: type=1400 audit(1570982901.164:46): avc: denied { create } for pid=7615 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 217.317926] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 217.356651] audit: type=1400 audit(1570982901.224:47): avc: denied { setopt } for pid=7615 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 217.386912] audit: type=1400 audit(1570982901.254:48): avc: denied { ioctl } for pid=7615 comm="syz-executor.1" path="socket:[27422]" dev="sockfs" ino=27422 ioctlcmd=0x8991 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 217.391489] kasan: CONFIG_KASAN_INLINE enabled [ 217.430684] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 217.458639] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 217.465007] CPU: 0 PID: 7630 Comm: syz-executor.3 Not tainted 4.19.79 #0 [ 217.471843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.481214] RIP: 0010:hrtimer_active+0x11e/0x230 [ 217.485970] Code: 48 39 c3 0f 84 d3 00 00 00 e8 ce 1f 0f 00 48 8b 45 c8 80 38 00 0f 85 06 01 00 00 49 8b 5d 30 4c 8d 63 10 4c 89 e0 48 c1 e8 03 <42> 0f b6 14 38 4c 89 e0 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 [ 217.489512] ISOFS: Unable to identify CD-ROM format. [ 217.504864] RSP: 0018:ffff888051647350 EFLAGS: 00010202 [ 217.504876] RAX: 0000000000000002 RBX: 0000000000000000 RCX: ffffc9000c4b2000 [ 217.504884] RDX: 00000000000339c8 RSI: ffffffff815c5ab2 RDI: ffff88808795d980 [ 217.504892] RBP: ffff8880516473a8 R08: ffff888088f00680 R09: 0000000000000000 [ 217.504900] R10: ffffed1010f2bae4 R11: ffff88808795d727 R12: 0000000000000010 [ 217.504908] R13: ffff88808795d980 R14: ffff888056a8ea00 R15: dffffc0000000000 [ 217.504918] FS: 00007ffaa530e700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 217.504926] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 217.504940] CR2: 00000000015971c8 CR3: 00000000952bc000 CR4: 00000000001406f0 [ 217.517588] kobject: 'loop5' (00000000ec18ff6e): kobject_uevent_env [ 217.522641] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 217.522650] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 217.522655] Call Trace: [ 217.522680] hrtimer_try_to_cancel+0x74/0x5b0 [ 217.522697] ? hrtimer_run_softirq+0x270/0x270 [ 217.530109] kobject: 'loop5' (00000000ec18ff6e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 217.537336] ? __lock_is_held+0xb6/0x140 [ 217.619186] hrtimer_cancel+0x20/0x40 [ 217.622972] qdisc_watchdog_cancel+0x16/0x20 [ 217.627362] cbs_destroy+0x5e/0xd0 [ 217.630884] ? cbs_dequeue_soft+0x400/0x400 [ 217.635196] qdisc_create+0xaa6/0x1230 [ 217.639073] ? tc_get_qdisc+0xbb0/0xbb0 [ 217.643034] ? nla_parse+0x1fc/0x2f0 [ 217.646732] tc_modify_qdisc+0x51b/0x1bdc [ 217.650862] ? qdisc_create+0x1230/0x1230 [ 217.655001] ? find_held_lock+0x35/0x130 [ 217.659051] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 217.664566] ? qdisc_create+0x1230/0x1230 [ 217.668694] rtnetlink_rcv_msg+0x463/0xb00 [ 217.672912] ? rtnetlink_put_metrics+0x560/0x560 [ 217.677652] ? netdev_pick_tx+0x300/0x300 [ 217.681783] ? netlink_deliver_tap+0x22d/0xc20 [ 217.686356] ? find_held_lock+0x35/0x130 [ 217.690402] netlink_rcv_skb+0x17d/0x460 [ 217.694448] ? rtnetlink_put_metrics+0x560/0x560 [ 217.699184] ? netlink_ack+0xb30/0xb30 [ 217.703052] ? kasan_check_read+0x11/0x20 [ 217.707180] ? netlink_deliver_tap+0x254/0xc20 [ 217.711745] rtnetlink_rcv+0x1d/0x30 [ 217.715451] netlink_unicast+0x537/0x720 [ 217.719504] ? netlink_attachskb+0x770/0x770 [ 217.723894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.729413] netlink_sendmsg+0x8ae/0xd70 [ 217.733456] ? netlink_unicast+0x720/0x720 [ 217.737677] ? selinux_socket_sendmsg+0x36/0x40 [ 217.742328] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.747845] ? security_socket_sendmsg+0x8d/0xc0 [ 217.752590] ? netlink_unicast+0x720/0x720 [ 217.756808] sock_sendmsg+0xd7/0x130 [ 217.760514] ___sys_sendmsg+0x803/0x920 [ 217.764484] ? copy_msghdr_from_user+0x430/0x430 [ 217.769220] ? lock_downgrade+0x880/0x880 [ 217.773352] ? kasan_check_read+0x11/0x20 [ 217.777500] ? __fget+0x367/0x540 [ 217.780949] ? iterate_fd+0x360/0x360 [ 217.784742] ? lock_downgrade+0x880/0x880 [ 217.788885] ? __fget_light+0x1a9/0x230 [ 217.792840] ? __fdget+0x1b/0x20 [ 217.796199] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 217.801720] __sys_sendmsg+0x105/0x1d0 [ 217.805591] ? __ia32_sys_shutdown+0x80/0x80 [ 217.809997] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 217.814742] ? do_syscall_64+0x26/0x620 [ 217.818701] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.824046] ? do_syscall_64+0x26/0x620 [ 217.828016] __x64_sys_sendmsg+0x78/0xb0 [ 217.832079] do_syscall_64+0xfd/0x620 [ 217.835867] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.841039] RIP: 0033:0x459a59 [ 217.844213] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 217.863191] RSP: 002b:00007ffaa530dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 217.870881] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 217.878235] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000008 [ 217.885486] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 217.892736] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffaa530e6d4 [ 217.899986] R13: 00000000004c7be8 R14: 00000000004dd980 R15: 00000000ffffffff [ 217.907236] Modules linked in: [ 217.914989] ---[ end trace 73df785c7e0b80d0 ]--- [ 217.919978] RIP: 0010:hrtimer_active+0x11e/0x230 [ 217.926365] kobject: 'loop0' (000000009ff1663b): kobject_uevent_env [ 217.931085] Code: 48 39 c3 0f 84 d3 00 00 00 e8 ce 1f 0f 00 48 8b 45 c8 80 38 00 0f 85 06 01 00 00 49 8b 5d 30 4c 8d 63 10 4c 89 e0 48 c1 e8 03 <42> 0f b6 14 38 4c 89 e0 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 [ 217.933732] kobject: 'loop0' (000000009ff1663b): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 217.953934] RSP: 0018:ffff888051647350 EFLAGS: 00010202 [ 217.967195] RAX: 0000000000000002 RBX: 0000000000000000 RCX: ffffc9000c4b2000 [ 217.977851] RDX: 00000000000339c8 RSI: ffffffff815c5ab2 RDI: ffff88808795d980 [ 217.985760] RBP: ffff8880516473a8 R08: ffff888088f00680 R09: 0000000000000000 [ 217.996654] R10: ffffed1010f2bae4 R11: ffff88808795d727 R12: 0000000000000010 [ 218.004174] R13: ffff88808795d980 R14: ffff888056a8ea00 R15: dffffc0000000000 16:08:21 executing program 5: bind$alg(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x220101, 0x0) fchdir(r0) socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) connect$vsock_stream(0xffffffffffffffff, &(0x7f00000001c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10) creat(&(0x7f00000000c0)='./bus\x00', 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) fallocate(r3, 0x8, 0xfffffffffffffffc, 0x7fff) [ 218.012129] FS: 00007ffaa530e700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 218.020585] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 218.026624] CR2: 0000000000606ed8 CR3: 00000000952bc000 CR4: 00000000001406f0 [ 218.034011] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 218.041705] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 218.049448] Kernel panic - not syncing: Fatal exception [ 218.056382] Kernel Offset: disabled [ 218.060003] Rebooting in 86400 seconds..