[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 122.381529][ T33] kauditd_printk_skb: 4 callbacks suppressed [ 122.381577][ T33] audit: type=1800 audit(1584209830.429:39): pid=11740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 122.431832][ T33] audit: type=1800 audit(1584209830.469:40): pid=11740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 124.351113][ T33] audit: type=1400 audit(1584209832.399:41): avc: denied { map } for pid=11914 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.253' (ECDSA) to the list of known hosts. 2020/03/14 18:17:25 fuzzer started [ 137.199409][ T33] audit: type=1400 audit(1584209845.249:42): avc: denied { map } for pid=11923 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/03/14 18:17:30 dialing manager at 10.128.0.26:39629 2020/03/14 18:17:30 syscalls: 2967 2020/03/14 18:17:30 code coverage: enabled 2020/03/14 18:17:30 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2020/03/14 18:17:30 extra coverage: enabled 2020/03/14 18:17:30 setuid sandbox: enabled 2020/03/14 18:17:30 namespace sandbox: enabled 2020/03/14 18:17:30 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/14 18:17:30 fault injection: enabled 2020/03/14 18:17:30 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/14 18:17:30 net packet injection: enabled 2020/03/14 18:17:30 net device setup: enabled 2020/03/14 18:17:30 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/14 18:17:30 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 142.632071][ T33] audit: type=1400 audit(1584209850.679:43): avc: denied { integrity } for pid=11938 comm="syz-executor" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 18:19:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r1, 0x1, 0x0, 0x0, {0x18}}, 0x14}}, 0x0) [ 275.254895][ T33] audit: type=1400 audit(1584209983.309:44): avc: denied { map } for pid=11941 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=17460 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 275.753042][T11942] IPVS: ftp: loaded support on port[0] = 21 [ 275.965980][T11942] chnl_net:caif_netlink_parms(): no params data found [ 276.117979][T11942] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.125741][T11942] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.135122][T11942] device bridge_slave_0 entered promiscuous mode [ 276.150238][T11942] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.157818][T11942] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.167192][T11942] device bridge_slave_1 entered promiscuous mode [ 276.215965][T11942] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 276.233991][T11942] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 276.283841][T11942] team0: Port device team_slave_0 added [ 276.298649][T11942] team0: Port device team_slave_1 added [ 276.343296][T11942] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 276.350358][T11942] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 276.376606][T11942] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 276.394143][T11942] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 276.401180][T11942] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 276.427479][T11942] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 276.639649][T11942] device hsr_slave_0 entered promiscuous mode [ 276.893742][T11942] device hsr_slave_1 entered promiscuous mode [ 277.324337][ T33] audit: type=1400 audit(1584209985.379:45): avc: denied { create } for pid=11942 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 277.331389][T11942] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 277.349401][ T33] audit: type=1400 audit(1584209985.379:46): avc: denied { write } for pid=11942 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 277.349498][ T33] audit: type=1400 audit(1584209985.379:47): avc: denied { read } for pid=11942 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 277.482564][T11942] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 277.653822][T11942] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 277.913930][T11942] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 278.410369][T11942] 8021q: adding VLAN 0 to HW filter on device bond0 [ 278.448801][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 278.458105][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 278.480807][T11942] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.503148][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 278.514162][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.523628][ T3903] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.531894][ T3903] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.586566][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.596055][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 278.605829][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.615161][ T3903] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.622332][ T3903] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.631366][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 278.642348][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 278.664449][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 278.674684][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 278.714427][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 278.724524][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 278.734815][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 278.745735][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 278.755273][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 278.788282][T11942] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 278.801833][T11942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 278.826147][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 278.835863][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 278.878766][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 278.889405][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 278.919659][T11942] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 278.998880][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 279.009207][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 279.074554][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 279.084125][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 279.110941][T11942] device veth0_vlan entered promiscuous mode [ 279.120434][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 279.129621][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 279.159580][T11942] device veth1_vlan entered promiscuous mode [ 279.175464][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 279.259328][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 279.269669][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 279.293436][T11942] device veth0_macvtap entered promiscuous mode [ 279.318461][T11942] device veth1_macvtap entered promiscuous mode [ 279.375824][T11942] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 279.384250][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 279.393736][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 279.402997][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 279.413437][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 279.440382][T11942] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 279.450969][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 279.461102][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 279.908624][ T33] audit: type=1400 audit(1584209987.939:48): avc: denied { associate } for pid=11942 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 280.185170][ T33] audit: type=1400 audit(1584209988.229:49): avc: denied { open } for pid=11967 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 280.208906][ T33] audit: type=1400 audit(1584209988.239:50): avc: denied { kernel } for pid=11967 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 18:19:48 executing program 1: openat$vhci(0xffffffffffffff9c, 0x0, 0x22000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 280.233044][ T33] audit: type=1400 audit(1584209988.239:51): avc: denied { confidentiality } for pid=11967 comm="syz-executor.0" lockdown_reason="unsafe use of perf" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 [ 280.280399][T11970] tipc: All keys are flushed! [ 280.364775][T11968] tipc: All keys are flushed! 18:19:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffff2, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001400)=ANY=[@ANYBLOB="380000002400070500ee30cf7c00000000a2a300", @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000009000100686673630000000008000200000000004c7609f9a86943f42df39d15d5d8fb034edbe0b2539cf4e52a63860a4da38cea6b6940dd552405dcb09d9ab875dcfcb65029105e59c14961e69ea933222fa74cdc312c427dd691e5cc5400523c9503"], 0x38}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0x48, 0x28, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x0, 0xffffffff}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) 18:19:48 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) pipe(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 280.839176][T11975] IPVS: ftp: loaded support on port[0] = 21 18:19:49 executing program 0: setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x210, @dev}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) socket(0x25, 0x1, 0x0) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000000), 0x4) [ 281.080380][T11975] chnl_net:caif_netlink_parms(): no params data found [ 281.375639][T11975] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.383136][T11975] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.392438][T11975] device bridge_slave_0 entered promiscuous mode [ 281.408453][T11975] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.415780][T11975] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.425281][T11975] device bridge_slave_1 entered promiscuous mode [ 281.477859][T11975] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 281.496822][T11975] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 281.547158][T11975] team0: Port device team_slave_0 added [ 281.562260][T11975] team0: Port device team_slave_1 added [ 281.645332][T11975] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 281.652537][T11975] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 281.678988][T11975] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 281.695593][ C0] hrtimer: interrupt took 62074 ns [ 281.711484][T11975] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 281.718659][T11975] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 281.744999][T11975] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 18:19:49 executing program 0: setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x210, @dev}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) socket(0x25, 0x1, 0x0) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000000), 0x4) [ 281.851675][T11975] device hsr_slave_0 entered promiscuous mode [ 281.883971][T11975] device hsr_slave_1 entered promiscuous mode [ 281.913878][T11975] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 281.921520][T11975] Cannot create hsr debugfs directory [ 282.398714][T11975] netdevsim netdevsim1 netdevsim0: renamed from eth0 18:19:50 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x6c00) dup3(r1, r0, 0x0) [ 282.447198][T11975] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 282.526026][T11975] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 282.578603][T11975] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 282.613848][T12001] serio: Serial port pts0 18:19:50 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x400) ioctl$FS_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000040)) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_destroy(r1) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000, 0x200000}]) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0) read$usbmon(r2, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r2, 0x80605414, &(0x7f0000000100)) [ 283.030357][T11975] 8021q: adding VLAN 0 to HW filter on device bond0 18:19:51 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="fa41030000009af22b8f5e5126a889d61dfe49ff7d7561f1f8793481ed000000000000", 0x2}, {&(0x7f0000000280)="caa2d23dfd7fcbd0d5523488ebb9e2eac0f8998df5f737f8ee9efa08adcf3ba256e2abbfe70822dc4c3530e7b64a0468cc261e12979ebeb724c431a19a84abeb763b5363d5ab37d81a7b9f993076423d83f612d6bc04469f63f2c6f35725ff8e9fb0d11b590ea953e454de73564499cc9d277686b59054ff66b43da678fe983de72ca57ec4511d664077da0041360c0ffe6389c0447367bd1c82841e676190fbf1cabfa03dd0cbca6b454cf7827b657d46bb2f4ed5c0992bca5bea4993b6260bf9979f1870e9823c50"}, {&(0x7f0000000040)="993ca9006258048d432b070260"}], 0x200000cc, 0x0, 0x6}}, {{0x0, 0x0, &(0x7f00000006c0), 0x1}}], 0x2, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0) read$usbmon(r2, 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f0000000140)) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000080)=@routing={0x0, 0x6, 0x0, 0x0, 0x0, [@dev, @dev, @empty]}, 0x38) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendto$inet6(r1, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0) r3 = dup2(0xffffffffffffffff, r1) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r3, 0xc0045520, &(0x7f00000000c0)=0x6) [ 283.072195][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 283.081198][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 283.105408][T11975] 8021q: adding VLAN 0 to HW filter on device team0 [ 283.202620][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.213175][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.222398][ T3903] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.229647][ T3903] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.257597][ T33] audit: type=1400 audit(1584209991.309:52): avc: denied { name_bind } for pid=12012 comm="syz-executor.0" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 283.268712][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 283.281207][ T33] audit: type=1400 audit(1584209991.309:53): avc: denied { node_bind } for pid=12012 comm="syz-executor.0" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 283.356994][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.367338][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.376640][ T3903] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.383910][ T3903] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.393075][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 283.403993][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 18:19:51 executing program 0: syz_emit_ethernet(0x22, &(0x7f00000000c0)={@broadcast, @random="140000009c20", @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback}}}}}, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETXW(r1, 0x5435, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000040)={0x0, 0x200, 0x6}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x24, 0x33, 0x119, 0x0, 0x0, {0x2}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}]}, 0x24}}, 0x0) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f0000000040)) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0) read$usbmon(r3, 0x0, 0x0) ioctl$CAPI_INSTALLED(r3, 0x80024322) syz_emit_ethernet(0xce, &(0x7f0000000100)={@multicast, @broadcast, @val={@void, {0x8100, 0x0, 0x1, 0x2}}, {@x25={0x805, {0x1, 0x3, 0x1f, "0e98deface791f954896de8e7b6a97bfe7517c247924585af7b84220c8ab3f4b6b48d54526bdda0e4218424a4826ea0a61b0e45bbc12bf806dbadf95c903605ab0e9e14bb13f7e74159df46e3dffa1a8b3ec615e455a7843f04d8cb2fd138b8db8de560eab8eddc0154835e1c49c6569a569a0ce44539ffdde068f25d737112867434c4c62d23d52e72b57ec214520dfa1fa6012d3605dd13455cb7bdd75e9076f9074bb66a4207d393fd133a9386ffa4d58ce46bbb62a9e5a"}}}}, &(0x7f0000000000)={0x0, 0x4, [0xa4b, 0x4a, 0xf12, 0x830]}) [ 283.431155][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 283.442225][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 283.458915][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 283.498024][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 283.508861][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 283.549755][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 283.559562][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 283.575192][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 283.584272][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 283.602058][T11975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 283.675479][T12017] openvswitch: netlink: Key 0 has unexpected len 4 expected 0 [ 283.704445][T12018] openvswitch: netlink: Key 0 has unexpected len 4 expected 0 18:19:51 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"]) signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) [ 283.719208][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 283.727235][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 283.772672][T11975] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 283.838090][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 283.848086][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 283.939663][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 283.950603][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 283.975248][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 283.985121][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 283.995951][T11975] device veth0_vlan entered promiscuous mode [ 284.036401][T11975] device veth1_vlan entered promiscuous mode [ 284.120633][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 284.130037][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 284.139844][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 284.149651][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 284.174695][T11975] device veth0_macvtap entered promiscuous mode [ 284.197259][T11975] device veth1_macvtap entered promiscuous mode [ 284.256440][T11975] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 284.268446][T11975] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 284.281888][T11975] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 284.290019][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 284.299500][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 284.309390][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 284.319196][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 284.344526][T11975] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 284.355504][T11975] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 284.368922][T11975] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 284.379654][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 284.389504][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:19:53 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="602b99f7022f1c5c0a040c996268b81e2a373cca474d206c1b7bc30c1500b5f2a7885233a4e6bc46a31951224756999e89fa498a585546a902504b33254477c78a6b096e10d4e66acc19773bdb084a173e6f70d9d126102d6bb92a2c00f94715cfe9c62b6d046587b15e15e233f6663f3e9c2fbcb86f0223a03af0d3d24a31bb44513db8e5bce5bd55480f6c7fb9123943a712ebcf62774e6172169034caadff68c7212ae0603b3873fbd55f9d34d378b9f97ec4ab4c10c8ccdbae733e6bbf756533bf3a503ca61ef61f4eb0e3dd2cf1d34fe92ce686d7ba8cd3b21dfc999795b507531374a5cf4a38b0351927502cbe95965298e9e6a2ef073b9c1409f4c43258d560ef1024479a76cdde46251561f51e037d8bcacf22fc"]) signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) [ 285.566787][ T33] audit: type=1400 audit(1584209993.619:54): avc: denied { prog_load } for pid=12047 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 285.743429][ T33] audit: type=1400 audit(1584209993.789:55): avc: denied { prog_run } for pid=12047 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 18:19:53 executing program 1: openat$vhci(0xffffffffffffff9c, 0x0, 0x22000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 18:19:54 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r3, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) setsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000080)=@routing={0x0, 0x6, 0x0, 0x0, 0x0, [@dev, @dev, @empty]}, 0x38) connect$inet6(r3, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0) setsockopt$sock_timeval(r3, 0x1, 0x14, &(0x7f0000000040)={0x77359400}, 0x8) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) ioctl$PPPIOCGL2TPSTATS(r0, 0x8004745a, 0x0) 18:19:54 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xc) write$P9_RREMOVE(r0, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) fdatasync(r0) 18:19:54 executing program 1: openat$vhci(0xffffffffffffff9c, 0x0, 0x22000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 18:19:55 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x20) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000000)=r3, 0x4) syz_read_part_table(0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000040)="0201a6ffffff0a000000ff45ac0000ffffffa600080000000000000000400000000063000000e1000000887700720030070063000fffff000000008000da55aa", 0x40, 0x1c0}]) [ 287.257767][T12066] loop0: p1 p2 p3 p4 [ 287.261917][T12066] loop0: partition table partially beyond EOD, truncated [ 287.269707][T12066] loop0: p1 start 10 is beyond EOD, truncated [ 287.275947][T12066] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 287.293624][T12066] loop0: p3 start 225 is beyond EOD, truncated [ 287.299983][T12066] loop0: p4 start 255 is beyond EOD, truncated [ 287.480618][T12070] loop0: p1 p2 p3 p4 [ 287.484837][T12070] loop0: partition table partially beyond EOD, truncated [ 287.492383][T12070] loop0: p1 start 10 is beyond EOD, truncated [ 287.498952][T12070] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 287.544823][T12070] loop0: p3 start 225 is beyond EOD, truncated [ 287.551145][T12070] loop0: p4 start 255 is beyond EOD, truncated 18:19:55 executing program 1: openat$vhci(0xffffffffffffff9c, 0x0, 0x22000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 18:19:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x204400, 0x190) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}, 0x20) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000001c0)={r5, 0x401}, &(0x7f0000000340)=0x8) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = socket(0x40000000002, 0x3, 0x2) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x6, 0x20}) dup2(r6, r0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x6) sendmmsg$inet(r0, &(0x7f0000000f00)=[{{&(0x7f0000000180)={0x2, 0x0, @remote}, 0x10, 0x0}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x18, 0x0, 0x8, {r7, @empty, @broadcast}}}], 0x18}}], 0x2, 0x0) 18:19:56 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x6, 0x48000) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000440)={0x2e, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x3, 'sed\x00', 0x4, 0x7, 0x53}, 0x2c) mmap(&(0x7f0000285000/0x4000)=nil, 0x4000, 0x0, 0x110, r0, 0x778f8000) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x440180, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0) read$usbmon(r2, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="bd0000008000000020000000607abe5fc11683d5aa53638cc3d1a2ec3b0d6577cb7e2d365482aff3e0a7316759a4755c78329e2db9386a607c7f8a9e5d749ee9844f3cdc1e19e4ea62cf8bcebac79d99045aa5e0abbb12914c704f4248954fc6ca8f02dbff138b7546dfaff129705e3efef20c15ca911be7f32894648bff377046acb0590632435572aba92f4300db3adf1ab515cb8cc6f6a7c49a6e3421de1069ce3af2de97ca05c1c7097f5d49ca6ac33996d927368a7a333ff45d964f363010991f838f76ac6b46"]) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000340), &(0x7f0000000380)=0xe) getpeername$l2tp(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f0000000140)=0x10) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0) read$usbmon(r4, 0x0, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x67, 0x2a3900) ioctl$BLKROTATIONAL(r5, 0x127e, &(0x7f00000003c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x5, 0x2, 0x8, 0x5, 'syz0\x00', 0x3}) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) 18:19:56 executing program 1: openat$vhci(0xffffffffffffff9c, 0x0, 0x22000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 18:19:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x2, 0x1, 0x0, 0x4}, {0x20, 0x3, 0x9, 0x8}, {0x887, 0x1f, 0x0, 0x4}, {0x4, 0xff, 0x3, 0xffffffff}, {0xffff, 0x1, 0x62, 0x40}]}) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc00000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="2800000007000300070000002e2f06006c65302e2f66696c653000006e25191b93701eaf27101fc54ac29182f81797f9664c0d53"], 0x28}, 0x1, 0x0, 0x0, 0x44050}, 0x80) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000150600000fff52004506000002ffffffd50600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffed1}, 0x48) 18:19:57 executing program 0: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x141a40, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x40, r4, 0x42b}, 0x40}}, 0x0) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r4, 0x800, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x401}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20040041}, 0x404c800) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e04e2ff1b008111e00f80ecdb4cb9f207c804a011000000880412fb0a0002000a11da1b40d805000373d20083b8", 0x2e}], 0x85, 0x0, 0x0, 0x5865}, 0x0) 18:19:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = open(&(0x7f0000000080)='./bus\x00', 0x82, 0x80) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010046) 18:19:57 executing program 1: openat$vhci(0xffffffffffffff9c, 0x0, 0x22000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 18:19:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = open(&(0x7f0000000080)='./bus\x00', 0x82, 0x80) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010046) 18:19:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = open(&(0x7f0000000080)='./bus\x00', 0x82, 0x80) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010046) 18:19:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = open(&(0x7f0000000080)='./bus\x00', 0x82, 0x80) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010046) 18:19:58 executing program 1: openat$vhci(0xffffffffffffff9c, 0x0, 0x22000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 18:19:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) open(&(0x7f0000000080)='./bus\x00', 0x82, 0x80) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) 18:19:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) open(&(0x7f0000000080)='./bus\x00', 0x82, 0x80) 18:19:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 18:19:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:19:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:19:59 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 18:19:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:19:59 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 18:19:59 executing program 2: openat$vhci(0xffffffffffffff9c, 0x0, 0x22000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 18:19:59 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 18:19:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:19:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 18:19:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:19:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 18:20:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:20:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 292.203663][T12161] IPVS: ftp: loaded support on port[0] = 21 18:20:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:20:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) [ 292.622737][T12161] chnl_net:caif_netlink_parms(): no params data found 18:20:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) [ 292.859634][T12161] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.867026][T12161] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.876795][T12161] device bridge_slave_0 entered promiscuous mode [ 292.909647][T12161] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.917051][T12161] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.927389][T12161] device bridge_slave_1 entered promiscuous mode [ 293.005238][T12161] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 293.044354][T12161] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 293.153975][T12161] team0: Port device team_slave_0 added [ 293.168965][T12161] team0: Port device team_slave_1 added [ 293.213439][T12161] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 293.220506][T12161] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 293.246625][T12161] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 293.267825][T12161] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 293.274955][T12161] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 293.301114][T12161] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 293.410129][T12161] device hsr_slave_0 entered promiscuous mode [ 293.454821][T12161] device hsr_slave_1 entered promiscuous mode [ 293.523012][T12161] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 293.530659][T12161] Cannot create hsr debugfs directory [ 293.816418][T12161] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 293.942521][T12161] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 294.043078][T12161] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 294.095467][T12161] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 294.533829][T12161] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.578540][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 294.587611][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 294.612363][T12161] 8021q: adding VLAN 0 to HW filter on device team0 [ 294.641330][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 294.651318][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 294.661651][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.668921][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.742502][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 294.752254][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 294.762073][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 294.771309][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.778561][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.787636][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 294.798522][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 294.817335][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 294.827998][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 294.840649][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 294.864675][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 294.875225][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 294.903873][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 294.913925][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 294.948738][T12161] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 294.961924][T12161] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 294.974380][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 294.984427][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 295.060089][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 295.067871][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 295.108362][T12161] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 295.180221][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 295.191234][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 295.256762][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 295.266399][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 295.290805][T12161] device veth0_vlan entered promiscuous mode [ 295.300295][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 295.310375][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 295.351826][T12161] device veth1_vlan entered promiscuous mode [ 295.436013][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 295.445432][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 295.454662][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 295.464347][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 295.490022][T12161] device veth0_macvtap entered promiscuous mode [ 295.513985][T12161] device veth1_macvtap entered promiscuous mode [ 295.577504][T12161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 295.588933][T12161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 295.599013][T12161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 295.609558][T12161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 295.623395][T12161] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 295.632998][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 295.642256][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 295.651587][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 295.661459][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 295.686982][T12161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 295.699084][T12161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 295.709127][T12161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 295.719676][T12161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 295.733516][T12161] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 295.746832][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 295.757179][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:20:04 executing program 2: openat$vhci(0xffffffffffffff9c, 0x0, 0x22000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 18:20:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:20:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:05 executing program 2: openat$vhci(0xffffffffffffff9c, 0x0, 0x22000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 18:20:05 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 18:20:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:05 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 18:20:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:06 executing program 2: openat$vhci(0xffffffffffffff9c, 0x0, 0x22000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 18:20:06 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 18:20:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:20:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x22, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:20:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x22, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:07 executing program 2: openat$vhci(0xffffffffffffff9c, 0x0, 0x22000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 18:20:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x22, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:20:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x33, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:20:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x33, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:20:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x33, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:08 executing program 2: openat$vhci(0xffffffffffffff9c, 0x0, 0x22000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 18:20:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:20:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x3c, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:20:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x3c, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:20:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x3c, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:20:09 executing program 2: openat$vhci(0xffffffffffffff9c, 0x0, 0x22000) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 18:20:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 18:20:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:09 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 18:20:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x42, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:10 executing program 3: openat$vhci(0xffffffffffffff9c, 0x0, 0x22000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 18:20:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x42, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:10 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 18:20:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x42, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 18:20:10 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 18:20:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x43, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:11 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 18:20:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x43, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:11 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 303.285748][T12356] IPVS: ftp: loaded support on port[0] = 21 18:20:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x43, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:11 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 303.811563][T12356] chnl_net:caif_netlink_parms(): no params data found [ 304.035798][T12356] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.043209][T12356] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.052555][T12356] device bridge_slave_0 entered promiscuous mode [ 304.071214][T12356] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.079124][T12356] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.088876][T12356] device bridge_slave_1 entered promiscuous mode [ 304.150147][T12356] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 304.171638][T12356] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 304.228108][T12356] team0: Port device team_slave_0 added [ 304.245373][T12356] team0: Port device team_slave_1 added [ 304.287329][T12356] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 304.294808][T12356] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 304.320875][T12356] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 304.370005][T12356] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 304.377218][T12356] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 304.403484][T12356] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 304.500265][T12356] device hsr_slave_0 entered promiscuous mode [ 304.577244][T12356] device hsr_slave_1 entered promiscuous mode [ 304.683064][T12356] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 304.690688][T12356] Cannot create hsr debugfs directory [ 304.977514][T12356] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 305.025767][T12356] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 305.096608][T12356] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 305.185810][T12356] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 305.601234][T12356] 8021q: adding VLAN 0 to HW filter on device bond0 [ 305.651051][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 305.660111][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 305.687313][T12356] 8021q: adding VLAN 0 to HW filter on device team0 [ 305.722622][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 305.733023][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 305.742266][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.749543][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.763823][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 305.783122][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 305.792712][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 305.802318][ T3903] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.809581][ T3903] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.855801][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 305.867017][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 305.903748][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 305.914236][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 305.924579][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 305.935227][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 305.981182][T12356] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 305.991849][T12356] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 306.007131][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 306.017058][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 306.027086][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 306.037215][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 306.046702][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 306.097150][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 306.115952][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 306.124710][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 306.165427][T12356] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 306.240732][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 306.250872][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 306.321314][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 306.330985][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 306.357986][T12356] device veth0_vlan entered promiscuous mode [ 306.368017][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 306.377221][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 306.416690][T12356] device veth1_vlan entered promiscuous mode [ 306.503709][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 306.513173][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 306.522489][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 306.532436][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 306.561179][T12356] device veth0_macvtap entered promiscuous mode [ 306.591225][T12356] device veth1_macvtap entered promiscuous mode [ 306.648350][T12356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 306.659673][T12356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 306.669742][T12356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 306.680262][T12356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 306.690205][T12356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 306.700789][T12356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 306.714928][T12356] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 306.727033][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 306.737016][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 306.746289][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 306.756222][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 306.780953][T12356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 306.791772][T12356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 306.803554][T12356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 306.814133][T12356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 306.824079][T12356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 306.834595][T12356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 306.848453][T12356] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 306.856559][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 306.866507][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:20:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 18:20:16 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 18:20:16 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x121440, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0) read$usbmon(r1, 0x0, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001580)='/dev/uinput\x00', 0x802, 0x0) pidfd_getfd(r1, r2, 0x0) r3 = gettid() tkill(r3, 0x16) clone3(&(0x7f0000000480)={0x8949000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000240)=0x0, {0x32}, &(0x7f0000000280)=""/133, 0x85, &(0x7f0000000340)=""/207, &(0x7f0000000440)=[r3, 0xffffffffffffffff], 0x2}, 0x50) prctl$PR_SET_PTRACER(0x59616d61, r4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='xfs\x00', 0x8003, 0x0) 18:20:16 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:16 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:17 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c98"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) 18:20:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:17 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:17 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:19 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) 18:20:19 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x10082, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xe) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000040)={0x3, 0x0, 0x4, {0x8, 0x3f, 0x4, 0x3}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@remote, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000440)=0xe4) bind$xdp(r0, &(0x7f0000000480)={0x2c, 0x8, r1, 0x28, r0}, 0x10) connect$rxrpc(r0, &(0x7f00000004c0)=@in4={0x21, 0xfffb, 0x2, 0x10, {0x2, 0x4e21, @rand_addr=0x4}}, 0x24) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0185647, &(0x7f0000000540)={0x990000, 0xd5f, 0xcbc40000, 0xffffffffffffffff, 0x0, &(0x7f0000000500)={0x9a090b, 0x10000, [], @ptr=0x80000001}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, &(0x7f0000000780)=0xe4) getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000800)=0x14) sendmsg$NL80211_CMD_NEW_MPATH(r2, &(0x7f0000000900)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000008c0)={&(0x7f0000000840)={0x78, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x4, 0xffffffffffffffff}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r1}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @multicast}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x5, 0x2}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r3}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xd5, 0xffffffffffffffff}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r1}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x78}}, 0xc0) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000940)={0x7d36e58d, "31407292b416d55ecee121d59be2178d6a3ea817ffd1fcfafcb554ffbdd73ec1", 0x2}) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$sock_int(r5, 0x1, 0x20, &(0x7f0000000980), &(0x7f00000009c0)=0x4) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000a00)={0xc3b, {{0x2, 0x4e21, @multicast2}}, 0x1, 0x4, [{{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e22, @empty}}, {{0x2, 0x4e24, @local}}, {{0x2, 0x4e24, @empty}}]}, 0x28c) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, &(0x7f0000000cc0)) r6 = dup3(r5, 0xffffffffffffffff, 0x80000) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r6, &(0x7f0000000e00)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d40)={0x50, 0x2, 0x7, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x100}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x5}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0xf7}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4048055}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0185648, &(0x7f0000000ec0)={0x9f0000, 0x4, 0x5, 0xffffffffffffffff, 0x0, &(0x7f0000000e80)={0x9c0908, 0x4, [], @p_u32=&(0x7f0000000e40)=0x380000}}) sendmsg$AUDIT_GET_FEATURE(r7, &(0x7f0000000fc0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x10, 0x3fb, 0x300, 0x70bd2d, 0x25dfdbfd, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4040000) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000001000)=@gcm_128={{0x303}, "67b2183da3bbed25", "0491513e61034e0effbab1ee0cc75bc2", "6be277e6", "0aeaf85237e28791"}, 0x28) 18:20:19 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x80040, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000080)=@routing={0x0, 0x6, 0x0, 0x0, 0x0, [@dev, @dev, @empty]}, 0x38) sendto$inet6(r1, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20, 0x8, @empty, 0x4}, 0x1c) listen(r0, 0x4) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000cf6e7a049700c3567ddfa02e0697a4d7b413fcb7b2999ce2d3317923aa3013eb16f6c08661592c9f60b2b9a5cbccdb0e252d7abf2f7bc9667501060f34f844ac3154f9fd5749c81c"], 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$llc(r5, &(0x7f0000000000)={0x1a, 0x320, 0x6, 0x82, 0x1f, 0x7f, @remote}, 0x10) 18:20:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:20 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) [ 312.017514][ T33] audit: type=1400 audit(1584210020.069:56): avc: denied { name_connect } for pid=12453 comm="syz-executor.3" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 18:20:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:20 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r1, &(0x7f00000002c0)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)=""/179, 0xb3}], 0x1, &(0x7f0000000300)=""/56, 0x38}, 0x10063) r2 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0) read$usbmon(r3, 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000280)={0x2, r3}) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$kcm(0x10, 0x2, 0x10) syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000022000535d25a80648c63940d0124fc60100002400a000000053582c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 18:20:20 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) [ 312.719412][T12470] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 18:20:20 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) [ 312.991293][T12470] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 313.033898][T12480] IPVS: ftp: loaded support on port[0] = 21 18:20:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) [ 313.539987][T12480] chnl_net:caif_netlink_parms(): no params data found [ 313.750468][T12480] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.757774][T12480] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.767274][T12480] device bridge_slave_0 entered promiscuous mode [ 313.803695][T12480] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.810911][T12480] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.820729][T12480] device bridge_slave_1 entered promiscuous mode [ 313.909885][T12480] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 313.936715][T12480] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 313.985481][T12480] team0: Port device team_slave_0 added [ 314.001065][T12480] team0: Port device team_slave_1 added [ 314.051140][T12480] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 314.058923][T12480] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 314.085026][T12480] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 314.103637][T12480] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 314.110794][T12480] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 314.137023][T12480] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 314.300063][T12480] device hsr_slave_0 entered promiscuous mode [ 314.373899][T12480] device hsr_slave_1 entered promiscuous mode [ 314.433016][T12480] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 314.440645][T12480] Cannot create hsr debugfs directory [ 314.753788][T12480] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 314.861647][T12480] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 314.906062][T12480] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 315.002072][T12480] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 315.368123][T12480] 8021q: adding VLAN 0 to HW filter on device bond0 [ 315.415581][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 315.424546][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 315.442727][T12480] 8021q: adding VLAN 0 to HW filter on device team0 [ 315.469685][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 315.479957][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 315.489243][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.496490][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.553380][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 315.562612][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 315.572639][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 315.581856][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.589100][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.599663][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 315.619868][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 315.654305][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 315.664491][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 315.694850][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 315.704650][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 315.715155][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 315.734768][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 315.744292][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 315.777371][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 315.786377][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 315.807077][T12480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 315.879856][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 315.888070][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 315.931952][T12480] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 316.143882][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 316.154070][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 316.241051][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 316.251051][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 316.280903][T12480] device veth0_vlan entered promiscuous mode [ 316.294901][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 316.304043][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 316.347750][T12480] device veth1_vlan entered promiscuous mode [ 316.431931][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 316.441427][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 316.450638][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 316.459957][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 316.483996][T12480] device veth0_macvtap entered promiscuous mode [ 316.506359][T12480] device veth1_macvtap entered promiscuous mode [ 316.563902][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 316.575005][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 316.588814][T12480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 316.600844][T12480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.610853][T12480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 316.621374][T12480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.631324][T12480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 316.641850][T12480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.651869][T12480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 316.662379][T12480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.676467][T12480] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 316.686947][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 316.697130][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 316.778035][T12480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 316.789120][T12480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.799319][T12480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 316.809863][T12480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.820623][T12480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 316.831338][T12480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.841299][T12480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 316.851884][T12480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.865908][T12480] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 316.876975][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 316.887034][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:20:25 executing program 4: ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000040)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x41187, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x200241, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x807c6406, &(0x7f0000000180)=""/147) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) set_mempolicy(0x4000, &(0x7f0000000140)=0x7ffe, 0x2) r1 = socket$rxrpc(0x21, 0x2, 0x2) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8982, &(0x7f0000000080)={0x8, 'veth1_vlan\x00', {'bond0\x00'}}) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 18:20:25 executing program 0 (fault-call:2 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:20:25 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x22, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:25 executing program 3: socket$bt_rfcomm(0x1f, 0x1, 0x3) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x2a4, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c0000004200fd03eff904f8ffffffffffffff0000000000"], 0x14}}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x200000000000007}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000380)=[@op, @op]}], 0x4924aa4, 0x0) socket$l2tp(0x2, 0x2, 0x73) 18:20:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket(0x10, 0x803, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x2d3, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000000400000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000005700000004000000040004800900020073797a30000000000900010073797a340000000008000340000000000900020073798530000000000400048004000480080103400000000a140004800900030000f8ffffffffff130000001100000000000000000000000000000a6d69c59862908a"], 0xb8}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0400b26d000000c825ab5ddb81b6ed5cef3105126d19db47b613585fb5ddbfce4d7c6700ce3afe20a7cfd7bc1b8d5387599a2e3cd494cf1e9127f1af06c9d9d436caeee2c8f5ebb86fab2fef5bc02ca36b75fce2bcb603aef8169fdf61bb5c93d1e7cf4ea2820bf2ee126e68c00930a225950865d979361f663655265ee9c91a640087b0230431291b27944c7e4c6ef14abd234aa4abb4dc9db532096262cbd8aa386ece398fcb712c6f56b533552e03002efd1dd29a6a13fc04e2d7855aa0bf23dc4f880a8a691ea71ee836e6574c2836bac4ae1c978676f3e179e083b9b5aca999077e1862ce319e30888069d7272655290285c5d68b0d1a587e2aa5fa7b9705d51385c8dd2b49219724279aa206a913246ddbce6508590e4db895033bb3ca38800d30bd64bca231fd17faa829139b602853fb2b2e33960e2a483e33b8b737a8e7a634feb92864491b700ed2f01d041b6afc3cc655bf1c1209b7c89c7711dea13b939fa38c2b5a25141cb9696d03025458b80578a7f983ec54a0463ae7f49903fd812ae631d460263709679d07bc487a0afe2aa996ad694fa8795fc37026491cd5bbea068edcf5808790113dd126a06f054e6fed0e3784dbf9455381e56b238287afe1a94d945846f890de2eadb19c570e713fd33e75507620be2085607c631fcb55c1e399b85b106aebbd58f5bbd00bae2e5264329f78fe03ca6cf12b797ba671c8b7ff09c243c765427e8360540805d18fc8d738"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000014007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000900)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xfff0}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r3, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000080)=@routing={0x0, 0x6, 0x1, 0x0, 0x0, [@dev, @dev={0xfe, 0x80, [], 0xa}, @empty]}, 0x38) connect$inet6(r3, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="0c0100002800000425bd7000fddbdf2500000000", @ANYRES32=r2, @ANYBLOB="f1ff07000e000a00e0ff0500060005001f40000006000500cdc20000060005002000000006000500037f0000080001007265640008000100736662000900010068667363000000002400020010000200000000000800000080000000100001000500000001000100000000800800010061746d0080000200210003002a8baa6d293ec1f25e37c0cba2a00f5ad0ef8036cfd4e003f8f9f6f0af00000008000100", @ANYRES32=r3, @ANYBLOB="080004000e000a00080004000f00f1ff08000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="1e0104980a2f589df8b6bf437f5a1ab41d7f44df258ff6d173e5bece73ab000008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB], 0x10c}, 0x1, 0x0, 0x0, 0x4040}, 0x4040000) 18:20:26 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x22, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) [ 318.035972][T12539] IPVS: ftp: loaded support on port[0] = 21 [ 318.337515][ T33] audit: type=1400 audit(1584210026.389:57): avc: denied { create } for pid=12544 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 318.355218][T12549] IPVS: ftp: loaded support on port[0] = 21 [ 318.456456][T12547] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. [ 318.488941][ T33] audit: type=1400 audit(1584210026.509:58): avc: denied { write } for pid=12544 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 18:20:26 executing program 5: ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0185649, &(0x7f0000000080)={0x980000, 0x9840, 0x2, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x9b0950, 0x6, [], @p_u16=&(0x7f0000000000)=0x9}}) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xa0, r1, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @ipv4={[], [], @broadcast}}, @NLBL_UNLABEL_A_SECCTX={0x21, 0x7, 'system_u:object_r:ld_so_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'gre0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x80}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0xa0}, 0x1, 0x0, 0x0, 0x800}, 0x20000004) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000280)={0x0, @bt={0x1c800000, 0x3, 0x0, 0x2, 0x8, 0x200, 0x1, 0x2, 0x1000, 0x6, 0x8001, 0x3, 0x7, 0x8001, 0x8, 0x11, {0x0, 0x7}, 0x6, 0x89}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000340)={0x2, [0x0, 0x0]}, &(0x7f0000000380)=0xc) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f00000003c0)=0x1000) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bind$rose(r2, &(0x7f0000000440)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @null}, 0x1c) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000480)={0x1}) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f00000004c0)={0xff, 0xff}) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/mls\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000006c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000540)}}, 0x10) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000700)='/dev/video36\x00', 0x2, 0x0) r4 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r4) ustat(0x4c, &(0x7f0000000740)) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000780)='/proc/capi/capi20\x00', 0x400, 0x0) r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000800)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(r5, &(0x7f0000000900)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000008c0)={&(0x7f0000000840)={0x54, r6, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000805}, 0x1) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000980)={0x7, 0x7f, 0x2}, 0x7) 18:20:26 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x22, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:26 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCGPKT(r0, 0x80045430, 0x0) [ 318.618906][T12551] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. 18:20:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:26 executing program 0: syz_genetlink_get_family_id$smc(&(0x7f0000000140)='SMC_PNETID\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = syz_open_pts(0xffffffffffffffff, 0x10000) ioctl$TCSETX(r1, 0x5433, &(0x7f0000000100)={0x2, 0x3f, [0xffff, 0x3ff, 0xfeff, 0xffff, 0x7], 0x80}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2180, 0x0) ioctl$VIDIOC_G_EDID(r2, 0xc0245628, &(0x7f00000000c0)={0x0, 0x0, 0xff, [], &(0x7f0000000080)}) [ 318.843397][ T7] tipc: TX() has been purged, node left! 18:20:27 executing program 3: syz_mount_image$reiserfs(&(0x7f00000002c0)='reiserfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)={[{@resize={'resize'}, 0x22}]}) 18:20:27 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x33, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:27 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) listen(r0, 0x0) close(r0) 18:20:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74) [ 319.387427][T12578] REISERFS warning (device loop3): super-6507 reiserfs_parse_options: bad value 0x0000000000000000" for -oresize [ 319.387427][T12578] [ 319.479054][T12578] REISERFS warning (device loop3): super-6507 reiserfs_parse_options: bad value 0x0000000000000000" for -oresize [ 319.479054][T12578] 18:20:27 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x33, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:27 executing program 4: r0 = fsopen(&(0x7f0000000100)='btrfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) 18:20:27 executing program 3: init_module(&(0x7f0000000340)='\x00\x00:\x04\x00\xaaU\x1b~\x0f\xd2\x00\x1c\xe7\xc7=\xc4\x95_!\xf2\xac\xda\xf0\x11\xe0I\x8b\nT\xf8\xdd\xff\xca\xf4\xde\xcc\xea\xfa|\xe1!\x83\xcb5\xf2\x14z\t\xea\xa7\x83\'\xa66\xf7\x8f\xa7X\xb3U{\xc4\xe3\xe4q\x9d\x19m\x9aS0\xa0\xaf\xa6hj\xf7T\xe2\xef\x83@c\xf8\xa4\x03\xb9\xbb \xb0e\x94\x8f\x1c\xfa\xce\x82\xfd\x8b\x14\xfd*cb\x17>\xdb\x19#\xae\xc7\x19\xb2vd\xe3\xdfK\xc4\xa4\xfeB\xe6\xd2\x8cI\xa8\xb2$\x83\xceah\xbfI-{\x15\xdesMr\xc5\xeb\xbd\xbb\xf67\xe4W^\vm\xfd\x82\"\x8a\x92\x1d\x0e\xc32\x0eW\xb0Y \x90\xef\x9d\xda\xe5:\xc9\xe7s\x97\xb1\xfc\xed\x97\x124\x12\\-\xc12\x1f\xf9PCp\xd9\t\x00\x00\x00\x00\x00\x00\x00\x17nf\n\xdb\xc2\x83\x7f\x89\xaa\f+6+\xf6\xd9:o\xc3\x02\x04.O\xd5T\xa36\n\xaf\xd48\xda\xf4\xb5\x85\xe6v_\x11r\x1aC\xa6_Y\xaf\x17\xae\xe0\xc5\xec\x00ODXD\x95H\xa1u\xb8O\xd76\xf0\x16\xb4\xa0\xee\x12\x8a\x99%\x1b\xc9+\x9c\xe6\'\xa2\xb8\x90\xfcI\xb3\xc4\xf6l2\xaak3\xdd3t\x0e\xf0@\xc7\xf6=U\x14*y,\x13\xdf\xe6\x13\xf2ar\x18\xb6\xb6\x1f\x8fK\xf8F\xc6\xa1\xaa\x9b\xdd\xbe#\x03_\xd4\xbe\xc5\x02\x82\x94\xc3Y\xca\x06nSd\xdeQ\xe6\\\xbb\xd7Lu1\xd3K\xdd,\x0f\x8a\xf8s\x97w\x93\"\x94\x96b,M\x99\xbd\xe3\xcd,$B8\xaf+!\x7f\xe3bPe\xc8k?[\x1c\x04\x887(4\xd2\xc0\x1fV\xf2\xe0\x86\xd2\t\nl\xbbe{\\\xa4\f\x15\x95\xe7M\xd0n\x91Y\x8bu\xfa\xcey,%\xe9\r \x02\x85\xb3\xc5\x86M5JX\x89:\xdd/\x13\x10zG\xad\xf3\xfaGf:>n\xc4,.\xa0\xb7\x8d\xdc8\x8e\x9d\x84W\xab\x86\x1e\xa9\xc2\xb4\n\x90_/3\xfe\x0f\xf7\xd9k\xa1\xa3\x02%u\xaf\xbf@\xe7\xae\xb8\xba\x1c\xa2\xc7RNk15E8\xf8\xf3\xa5@\x1a\x19\xc9\x90\b\xe4\x96\xe9\xb9b\xb7\"$!\a\"\xf2a\xeb\xd9\xc4\x9c\x83P,\xf7A\x19\xf7\xd5\xef~\xfa\xcf\x17\xdd,\x12\nG\"\x15s\xa9\xb8)\"\xf5\x13\xe5>N\xa8\xca\x99e\xdd\xc2\x01\xd4', 0xffead, &(0x7f0000000580)='bdev%\x00u\xc7\x87\xc0\'\x86\xbb\xde\xe7\xe5\x15\xc7!\x84\xdd\'uxe9\xebR\xb0B\x0e$\xec\x87K\xff\x17\xc5\xd8\xcc!\xe5\xaf\x0fs\fl\"Vl\xf7BZ\xce6U\x90\x1e\xd8\x04K7_\xc5\xd7\xb3\xbb\xed\x8f5\xa5\xbe\xaa\x84\x1be`bwh\xdb\t(\xe42\xc9j\x81\xe1\x15w\x1d\t\x11=Wt\xa3D\xeb\xb5\xb0\x0f\xd8R\v2Z\x97P[T\xed\xb16\xfc\xb5f5\xb1\xb5\xa6$\xca\x18`\x10\x00\xd6XA\xc4A\x05fz9\xa8\x13\x86&\x1e\xe4\x0e\xf9\xc2\xf3\xc5\x03Q\xef\xf3N\x10\xbf\x1d\xef\x8bPJ\xf7\xfa\xa5F\xc2\x01]Wv\xc3X\xfe\x85\xa6w\xff\xd9\xe2f\x95\xf2\xaf\xf2\xa3\xa0ntO\xfb\xf9A\xc3\xb2:0*\x18\xd8\xfa\xc0\x1c\x80\x93\xdd-\x1d\xd9\x94k\x18\xef\x18\xcd\x9e\xc9\xbd\xeb\xfc\x91\xbco\xb5w=nHw\x93U\x87V\xfc:^D\xe3^dr^e\xc9H\xf0\x96m\x90\x97RK\x96\x1e\xeb=\xca,|\xa4S\x92qje\x9eg\x9dd\xb9\x92\v\x88d') [ 320.097734][ T33] audit: type=1400 audit(1584210028.149:59): avc: denied { module_load } for pid=12595 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=1 [ 320.349190][T12603] IPVS: ftp: loaded support on port[0] = 21 [ 320.658251][T12603] chnl_net:caif_netlink_parms(): no params data found [ 320.785136][T12603] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.792315][T12603] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.801187][T12603] device bridge_slave_0 entered promiscuous mode [ 320.812619][T12603] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.821298][T12603] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.830137][T12603] device bridge_slave_1 entered promiscuous mode [ 320.884969][T12603] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 320.904737][T12603] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 320.937254][T12603] team0: Port device team_slave_0 added [ 320.948969][T12603] team0: Port device team_slave_1 added [ 320.980898][T12603] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 320.987929][T12603] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 321.013974][T12603] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 321.028178][T12603] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 321.035447][T12603] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 321.062055][T12603] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 321.138771][T12603] device hsr_slave_0 entered promiscuous mode [ 321.194179][T12603] device hsr_slave_1 entered promiscuous mode [ 321.233031][T12603] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 321.240698][T12603] Cannot create hsr debugfs directory [ 321.411160][T12603] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 321.460806][T12603] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 321.528238][T12603] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 321.589721][T12603] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 321.800368][T12603] 8021q: adding VLAN 0 to HW filter on device bond0 [ 321.825995][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 321.835349][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.853237][T12603] 8021q: adding VLAN 0 to HW filter on device team0 [ 321.871658][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 321.880911][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 321.891104][ T3903] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.898336][ T3903] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.908481][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 321.922366][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 321.932247][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 321.942932][T12566] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.950115][T12566] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.973173][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 321.994298][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 322.015571][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 322.026534][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 322.037228][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 322.051880][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 322.062237][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 322.085724][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 322.096040][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.114707][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 322.124437][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.140464][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 322.182085][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 322.189926][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 322.216957][T12603] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 322.327113][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 322.339074][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 322.380903][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 322.390502][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 322.403285][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 322.411789][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 322.425935][T12603] device veth0_vlan entered promiscuous mode [ 322.453438][T12603] device veth1_vlan entered promiscuous mode [ 322.505887][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 322.514570][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 322.523734][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 322.532923][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 322.556345][T12603] device veth0_macvtap entered promiscuous mode [ 322.576296][T12603] device veth1_macvtap entered promiscuous mode [ 322.614883][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 322.625665][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.635684][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 322.646176][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.656154][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 322.666794][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.676792][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 322.687324][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.697303][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 322.707816][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.720418][T12603] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 322.730074][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 322.738836][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 322.747719][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 322.757043][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 322.780102][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 322.790915][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.800910][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 322.816711][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.826705][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 322.837239][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.847194][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 322.857774][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.867793][T12603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 322.878363][T12603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.890867][T12603] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 322.902508][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 322.912433][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:20:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000280)={0x0, 0x2, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, r1, 0x305}, 0x14}}, 0x0) 18:20:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74) 18:20:31 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a45322, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) 18:20:31 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @loopback}}}, 0x90) 18:20:31 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x33, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) getsockopt$inet_int(r1, 0x0, 0xb, 0x0, &(0x7f0000000100)) 18:20:31 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x3c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000380)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0x5}, @exp_smc, @generic={0x0, 0x9, "cbd60441fbaca2"}, @sack_perm={0x4, 0x2}, @timestamp, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 18:20:31 executing program 4: timer_create(0x2, &(0x7f0000000040)={0x0, 0x20, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) timer_settime(0x0, 0xffffffffffffffff, &(0x7f0000000140)={{0x77359400}, {0x0, 0x9}}, 0x0) 18:20:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74) 18:20:31 executing program 5: mknod(&(0x7f00000007c0)='./file0\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000340)=@sha1={0x1, "e386e5bddd973a32868727937f1095f962c39f31"}, 0x15, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 18:20:32 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x3c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:32 executing program 3: getpriority(0x6, 0x0) 18:20:32 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmmsg$nfc_llcp(r0, &(0x7f00000011c0)=[{&(0x7f0000001040)={0x27, 0x3, 0x0, 0xffffff7f, 0x0, 0x0, "c3495523fb8b72782c0836b1fea745247b708a0b9ee19e0b89aff71670af3a21c03057a2c3ea58b7356b25b6d3a24f3ed914846716c9e08a6761d52e977d9e"}, 0x60, 0x0}], 0x1, 0x0) 18:20:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) connect$pptp(r1, &(0x7f00000000c0)={0x18, 0x2, {0x0, @rand_addr=0x6}}, 0x1e) 18:20:32 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85}) connect$can_bcm(r0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0) close(r0) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}}) socket(0x10, 0x802, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r3, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) listen(r3, 0x0) listen(r3, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) 18:20:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x36}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 18:20:32 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r1) truncate(&(0x7f0000002700)='./bus\x00', 0x0) 18:20:32 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x3c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt(r0, 0x10e, 0xb, &(0x7f0000000240)="75cc11ec", 0x4) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="24000000200007041dfffd946f610500020000001f00000000000800050006000400ff7e", 0x24}], 0x1}, 0x0) [ 325.052099][T12708] llc_conn_state_process: llc_conn_service failed [ 325.057986][T12710] netlink: 'syz-executor.4': attribute type 6 has an invalid length. 18:20:33 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) [ 325.115522][T12712] netlink: 'syz-executor.4': attribute type 6 has an invalid length. 18:20:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f0000000840)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000140)='K', 0x1}], 0x1}}], 0x1, 0x600d054) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000000)="8d", 0x1}], 0x1}, 0x24008040) [ 325.208783][T12701] llc_conn_state_process: llc_conn_service failed 18:20:33 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) waitid$P_PIDFD(0x3, r0, 0x0, 0x8, 0x0) 18:20:33 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85}) connect$can_bcm(r0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0) close(r0) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}}) socket(0x10, 0x802, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r3, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) listen(r3, 0x0) listen(r3, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) 18:20:33 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) [ 325.628530][T12726] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:20:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=@mpls_newroute={0x24, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_DST={0x8, 0x4}]}, 0x24}}, 0x0) 18:20:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/14, 0xe) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:20:34 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='tracefs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100028, &(0x7f0000000340)={[{@mode={'mode'}}]}) [ 325.981800][T12737] llc_conn_state_process: llc_conn_service failed 18:20:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="020700090200000000008000bd5a00000021472aefe41c4301889c91ff7f000000001600aa20675d9f82d3869feeed860e6cb504000000cad7cb69050046b6e50e067f000000000000c1374611c0dd34c12d100ea73cc21c5ed2ac1e4640dd4d226fdc90887e50f948fcf32bab60844794d3f3477681280d8d206bfebd201986fe24352453e388796c27433690fb"], 0x10}}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={0x0}, 0x1, 0xfffff000}, 0x0) 18:20:34 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:34 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32, @ANYBLOB="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"/344], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 18:20:34 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85}) connect$can_bcm(r0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0) close(r0) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}}) socket(0x10, 0x802, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r3, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) listen(r3, 0x0) listen(r3, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) 18:20:34 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x80) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf92a1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 326.814609][T12771] llc_conn_state_process: llc_conn_service failed 18:20:35 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x42, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:35 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x73) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 18:20:35 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85}) connect$can_bcm(r0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0) close(r0) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}}) socket(0x10, 0x802, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r3, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) listen(r3, 0x0) listen(r3, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) 18:20:35 executing program 0: io_setup(0x7, &(0x7f0000000000)=0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="0006000000000000fe800000004000000000000000000000fe8000"/56], 0x38) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendto$inet6(r1, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0) read$usbmon(r2, 0x0, 0x0) io_cancel(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x6, 0x800, r1, &(0x7f0000000080)="6fd05b9f3c807af56c21505afec1957f0ed9562922a95e579c5717e306655ffa750af5fbd1336bc732f1c40ff6befa0a11709b6636182439f0e8ae911696a8a081154619114653faa93de35b6d90baad694edba4e2293e1fd164c6f902ffc9dcb60021745128a236810aa4a21d2cb5a9ad60739a110608c109ad80bcb67ad116789940f057fbf6859333ac5537c951dc471bd033c1745c7e1874899eed9f5541b26860440c4b9cb7bfccbd848970d7584a91fec88683bb47649160", 0xbb, 0x46b2, 0x0, 0x3, r2}, &(0x7f0000000180)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000040)) 18:20:35 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x42, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0x2, &(0x7f0000000040)=@raw=[@map_val], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 327.583863][T12792] llc_conn_state_process: llc_conn_service failed 18:20:36 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000800) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x20000000) 18:20:36 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x42, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:36 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85}) connect$can_bcm(r0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0) close(r0) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}}) socket(0x10, 0x802, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r3, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) listen(r3, 0x0) listen(r3, 0x0) 18:20:36 executing program 3: r0 = socket(0x10, 0x80002, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x18, 0xa, 0x1, 0x0, 0x0, {}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x50}}, 0x0) 18:20:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, 0x0, &(0x7f0000000040)) 18:20:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}}, 0x0) [ 329.022281][ T33] audit: type=1400 audit(1584210037.069:60): avc: denied { watch } for pid=12971 comm="syz-executor.1" path="/root/syzkaller-testdir180379221/syzkaller.xqB0rh/61/file0" dev="sda1" ino=16673 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 18:20:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="380000001000050700cc58a80100000000000000", @ANYRES32=r3, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r3, @ANYBLOB="8014d350d222f2"], 0x38}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x20}}, 0x0) 18:20:37 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x43, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) [ 329.364159][T12985] llc_conn_state_process: llc_conn_service failed 18:20:37 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)={0x2, 0x5, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2}]}, 0x20}}, 0x0) 18:20:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)={0x2c, 0xb, 0x6, 0xa2fa8f3ae354a9cb, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x2c}}, 0x0) [ 329.557498][T12995] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=12995 comm=syz-executor.0 18:20:37 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85}) connect$can_bcm(r0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0) close(r0) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}}) socket(0x10, 0x802, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r3, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) listen(r3, 0x0) 18:20:37 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x43, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x3, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x64}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 18:20:38 executing program 4: r0 = fsopen(&(0x7f0000000200)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='\x00', &(0x7f00000000c0)='\xb6\x00', 0x0) 18:20:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') writev(r0, &(0x7f0000000040)=[{&(0x7f0000000080)='y', 0x1}], 0x1) 18:20:38 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x43, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000014020000de1ad5017a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff0700000a0404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466dfc6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) [ 330.122524][T13016] llc_conn_state_process: llc_conn_service failed [ 330.228764][T13023] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=13023 comm=syz-executor.0 18:20:38 executing program 1: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x10200000, 0x0, 0x20000dd, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) 18:20:38 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85}) connect$can_bcm(r0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0) close(r0) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}}) socket(0x10, 0x802, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r3, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) listen(r3, 0x0) 18:20:38 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/timer_list\x00', 0x0, 0x0) lseek(r0, 0x1ff, 0x0) [ 330.607160][T13034] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (8000000) 18:20:38 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0xfedd) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4000007, 0x1a013, r1, 0x0) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 18:20:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000680)={'syz_tun\x00', &(0x7f0000000580)=@ethtool_drvinfo={0x4a, "499b190fa52894aed482358bbfab286416b2ca458ec429fbbd9c707d8b8abd69", "7b9f55621402b1d29afeaa439fc1f28ea6d2898daccc348a725fabf96add4706", "02e9c2562220d9889d3fa366118e8c631bc860a1a842cc5445663f32dec4d38d", "ed8d19b95525ed766cc3ee624f7e5f0da8cdb536cb776b40216393bd47eee621", "c013a6add4073b69adee0881006d328e29732d98e7310f409036f1a7f7d9a0ef", "55ee4e5ab909000700"}}) 18:20:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x40, r5, 0x42b}, 0x40}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r5, 0x800, 0x70bd26, 0x25dfdbfc, {{}, {}, {0x8, 0x11, 0x10000}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40008841) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:20:38 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:38 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000280)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$team(0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) [ 330.939705][T13038] llc_conn_state_process: llc_conn_service failed 18:20:39 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85}) connect$can_bcm(r0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0) close(r0) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}}) socket(0x10, 0x802, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r3, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) listen(r3, 0x0) 18:20:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$sock_SIOCINQ(r2, 0x541b, 0x0) 18:20:39 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:39 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) 18:20:39 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1b8b77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a44f0b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fde"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x19, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x0, 0x2}, 0x3c) [ 331.634884][T13075] llc_conn_state_process: llc_conn_service failed 18:20:39 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) [ 331.857926][ T33] audit: type=1400 audit(1584210039.909:61): avc: denied { map_create } for pid=13084 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 18:20:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) signalfd(r1, &(0x7f0000000080)={[0x1, 0x9]}, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="0006000000000000fe800000000000000000a1460000003e00fe8000000000000000000000004ae2fdb4a2494e08000000000000000000000004000000000000"], 0x38) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendto$inet6(r1, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000000)) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:20:40 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85}) connect$can_bcm(r0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0) close(r0) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}}) socket(0x10, 0x802, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) listen(r3, 0x0) listen(r3, 0x0) 18:20:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x4c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0xe6c}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x1c, 0x2, [@TCA_CGROUP_ACT={0x18, 0x1, [@m_ipt={0x14, 0x0, 0x0, 0x0, {{0x8, 0x1, 'ipt\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x4c}}, 0x0) 18:20:40 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:40 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85}) connect$can_bcm(r0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0) close(r0) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}}) socket(0x10, 0x802, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) listen(r3, 0x0) listen(r3, 0x0) 18:20:40 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x4, 0x4, 0x3ac, 0x1c0, 0x0, 0x1c0, 0x2cc, 0x2cc, 0x2cc, 0x4, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'rose0\x00', 'veth0_to_bridge\x00'}, 0xbc, 0xe0}, @unspec=@STANDARD={0x24, '\x00', 0x0, 0x1c0}}, {{@arp={@dev, @local, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0\x00'}, 0xbc, 0xe0}, @unspec=@CLASSIFY={0x24, 'CLASSIFY\x00'}}, {{@arp={@multicast1, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'vcan0\x00'}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @broadcast, @remote}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3f8) 18:20:41 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:41 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000440)=@in={0x2, 0x4e24, @multicast2}, 0x21, &(0x7f00000004c0)=[{&(0x7f0000000500), 0x4ad}], 0x1}}], 0x75d, 0x0) 18:20:41 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85}) connect$can_bcm(r0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0) close(r0) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}}) socket(0x10, 0x802, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) listen(r3, 0x0) listen(r3, 0x0) 18:20:41 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xb0dfa6905c3ca5e5, 0x0) 18:20:41 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x4, 0x4, 0x3ac, 0x1c0, 0x0, 0x1c0, 0x2cc, 0x2cc, 0x2cc, 0x4, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'rose0\x00', 'veth0_to_bridge\x00'}, 0xbc, 0xe0}, @unspec=@STANDARD={0x24, '\x00', 0x0, 0x1c0}}, {{@arp={@dev, @local, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0\x00'}, 0xbc, 0xe0}, @unspec=@CLASSIFY={0x24, 'CLASSIFY\x00'}}, {{@arp={@multicast1, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'vcan0\x00'}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @broadcast, @remote}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3f8) 18:20:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$OSF_MSG_REMOVE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x175c, 0x1, 0x5, 0x401, 0x0, 0x0, {0x7, 0x0, 0xa}, [{{0x254, 0x1, {{0x1, 0x6}, 0x80, 0x1f, 0x1, 0xc68c, 0xb, 'syz0\x00', "19c314e052e8579b9c40e5831b9e7b85c69ba67777c092d038e870d11b0e051c", "7f49c7334dd6fba70f5b47e663c3d10e765c6b6011e064e07f601812634853bd", [{0xcb, 0x1f, {0x0, 0x4}}, {0x9, 0x1, {0x0, 0x7}}, {0x5, 0x6, {0x0, 0x800}}, {0x0, 0x6, {0x2, 0x3}}, {0x7, 0x4be, {0x0, 0x1}}, {0x5, 0xbaec, {0x2, 0x6}}, {0x101, 0xffff}, {0x0, 0x4, {0x0, 0x8001}}, {0x3, 0x6, {0x1, 0x85}}, {0x2, 0x3, {0x0, 0x8047}}, {0x7, 0xb76, {0x3, 0xfffffffe}}, {0x7, 0x1, {0x1, 0x7ff}}, {0x5909, 0x3, {0x2, 0x3}}, {0x0, 0x3f, {0x3, 0x101}}, {0x6, 0x3, {0x2, 0x8}}, {0x91a, 0x2, {0x2, 0xffff0000}}, {0x78, 0xfba4, {0x1, 0x5a3}}, {0x6, 0x9, {0x0, 0x850d}}, {0xb0d4, 0x3, {0x1, 0xfffffe01}}, {0x0, 0x9, {0x3}}, {0x2, 0x0, {0x3, 0x7ff}}, {0x7, 0x1ff, {0x0, 0x1}}, {0x7, 0x0, {0x3, 0x7ff}}, {0x0, 0x32, {0x2, 0xe6}}, {0x100, 0x3741, {0x2, 0xffffffc0}}, {0x40, 0x1f, {0x1, 0x9}}, {0x1, 0xfffd, {0x1, 0x6}}, {0x800, 0xaf, {0x3, 0x106d19d8}}, {0xbe, 0x9, {0x2, 0x29c6}}, {0x101, 0x985, {0x3}}, {0x3ff, 0x7fff, {0x0, 0x1}}, {0x1ff, 0x79, {0x1, 0xdc4}}, {0x7f, 0x1f, {0x2, 0x6}}, {0x1, 0x5, {0x0, 0xacf}}, {0xfff, 0x6, {0x0, 0x101}}, {0x3ff, 0x5, {0x0, 0x6}}, {0x8, 0x9, {0x1, 0x5}}, {0x2, 0x6, {0x3, 0x4}}, {0x0, 0x2, {0x2, 0x401}}, {0x9, 0x1, {0x1, 0x6}}]}}}, {{0x254, 0x1, {{0x2, 0x401}, 0x3, 0x7, 0x7, 0x3, 0x0, 'syz0\x00', "10cb2bb5392d1f73ee4a4615486293257174afb56e4e4ca24c303910a57fca3b", "bd8032effb374a655ebeb89b9e3d34aa797f095967b61cb594575077284f6500", [{0x20, 0x4, {0x0, 0x8}}, {0x8, 0x80, {0x3, 0x1}}, {0x6, 0x3800, {0x3, 0x3}}, {0xf19, 0x878, {0x1, 0x7fff}}, {0xc1, 0x40, {0x2, 0x9}}, {0x0, 0x4, {0x0, 0xf0}}, {0x4, 0x63d, {0x0, 0x7}}, {0xa7, 0x5, {0x0, 0xffffffff}}, {0x8001, 0x6, {0x3, 0xffffffc1}}, {0x4, 0x2, {0x3, 0xeec3}}, {0x2, 0x80, {0x0, 0x3}}, {0xa0, 0x1, {0x3, 0x1}}, {0x81, 0x546, {0x3, 0x7fff}}, {0x3, 0x3ff, {0x2, 0x5e05802b}}, {0x2206, 0x5, {0x1, 0x2}}, {0x2546, 0x7b24}, {0x6, 0x2, {0x2, 0x9}}, {0x2, 0x96, {0x1, 0x9}}, {0x4, 0xff76, {0x0, 0x49}}, {0x9c8e, 0x6, {0x3}}, {0x7, 0x8, {0x2, 0x9}}, {0x4, 0x6, {0x0, 0x7f}}, {0x434e, 0x5, {0x1}}, {0x4, 0x7, {0x0, 0x3}}, {0x1, 0x9, {0x1, 0x7fffffff}}, {0x95, 0x4, {0x0, 0xfffffff9}}, {0x3, 0x7fff, {0x3, 0x9}}, {0x3, 0x4, {0x3}}, {0x0, 0x7d, {0x2, 0x7}}, {0x401, 0x7, {0x1, 0x2}}, {0x324f, 0x6, {0x2, 0x45}}, {0x3, 0x2f, {0x3, 0x1}}, {0x1, 0x80, {0x1, 0x7}}, {0xfffd, 0x7ff, {0x2}}, {0x9, 0x81, {0x3, 0x7}}, {0x2, 0x3f, {0x2, 0x9}}, {0x8, 0x40, {0x1, 0x6}}, {0x3f, 0x101, {0x0, 0x534315e6}}, {0x50, 0x5, {0x0, 0x9}}, {0x5, 0x8, {0x0, 0x91}}]}}}, {{0x254, 0x1, {{0x0, 0x40000}, 0xe3, 0x5, 0x6, 0x7, 0x11, 'syz0\x00', "4e7b06a742b64e23fac92dce5c1a5949996fad147d02def69b57e625e5647c59", "9bc8f60d3fcf2b2a2581a14f1d4d73a4f8949f060bfe65fc3e19322469be374a", [{0x7, 0x4, {0x1, 0x9}}, {0x8000, 0x800, {0x3, 0x5}}, {0xab0, 0x7, {0x1, 0x7fffffff}}, {0x1, 0x7, {0x1, 0x400}}, {0x9, 0x9, {0x0, 0x9}}, {0x5, 0xb5, {0x3, 0x4a4}}, {0x7ff, 0x8, {0x3, 0x101}}, {0xff, 0x7fff, {0x0, 0x7}}, {0x1000, 0x8000, {0x3, 0x2}}, {0x175b, 0x2, {0x3, 0x7}}, {0x9, 0x0, {0x3, 0x1}}, {0x8, 0x1, {0x3, 0x2}}, {0x8, 0x9, {0x0, 0x5}}, {0x401, 0x6, {0x3, 0x1eefe7db}}, {0xffff, 0x4, {0x3}}, {0x7ff, 0x0, {0x3, 0x7}}, {0x1, 0x40, {0x1, 0x1}}, {0x1000, 0x73fa, {0x3, 0x7}}, {0x40, 0x0, {0x1, 0x100}}, {0xb, 0x8, {0x3, 0x1}}, {0x9, 0x8, {0x2, 0x1000}}, {0x81, 0x8, {0x3, 0x3}}, {0xffff, 0x20, {0x0, 0x2}}, {0x3ff, 0x9, {0x0, 0x6}}, {0x1, 0xdab, {0x0, 0x1947}}, {0x9, 0x7ff, {0x0, 0xff}}, {0x800, 0x40a, {0x2, 0x80000000}}, {0x1, 0x7, {0x2, 0x98}}, {0x4f80, 0x0, {0x2}}, {0x80, 0x3, {0x0, 0xfd2}}, {0x1, 0x7ff, {0x1, 0x80000001}}, {0x3f, 0x4, {0x3, 0x1d04}}, {0xff, 0x3, {0x1, 0x4}}, {0x1, 0xfffd, {0x2, 0x7}}, {0x3, 0x6, {0x183b282102b7c565, 0x7fff}}, {0x7, 0x132, {0x0, 0x4}}, {0x5, 0x81, {0x3, 0x80000000}}, {0x9, 0xfff, {0x2, 0x6}}, {0x1fa, 0x0, {0x1, 0x10001}}, {0x1000, 0x8, {0x2, 0xfffe0000}}]}}}, {{0x254, 0x1, {{0x1, 0xfffffffc}, 0xc1, 0x7, 0xfff, 0x5, 0x18, 'syz1\x00', "8de5f706c897e50568c091bfb8565c0c6ab70cb0ed45c1dff44d2e4686b898bc", "25725d19ca81e928890e859bed9b9a559383d914cf76cbbffa06730c6fd489cb", [{0x4, 0x3, {0x3, 0x7}}, {0x0, 0x5, {0x3, 0x6}}, {0x1000, 0x6, {0x0, 0x1}}, {0x565b, 0x2, {0x3, 0x1f}}, {0x2, 0x20, {0x0, 0xffff}}, {0x9, 0x5a, {0x3, 0x1fe}}, {0x8, 0x4, {0x0, 0xff}}, {0x1, 0x1000, {0x3, 0x8001}}, {0x7fff, 0x8, {0x1, 0x5}}, {0x7, 0x9, {0x1, 0x2}}, {0x0, 0x2, {0x3, 0x2}}, {0xfff, 0x2, {0x0, 0x7f}}, {0x4, 0x20, {0x1}}, {0x100, 0x0, {0x0, 0x40}}, {0x1, 0x9, {0x1, 0x19}}, {0x81, 0x6, {0x3, 0xfffffffb}}, {0x400, 0x0, {0x0, 0xe781}}, {0x1, 0xff00, {0x3, 0x5}}, {0x9, 0x400, {0x2, 0x7fff}}, {0x2, 0x979, {0x2, 0xfffffff7}}, {0x1, 0x8, {0x2, 0x1}}, {0x8000, 0xee, {0x1, 0x8}}, {0x7f, 0x40, {0x1, 0xffffffff}}, {0x3, 0x7df, {0x0, 0x1}}, {0x8011, 0x3, {0x3, 0x8}}, {0x7ff, 0x1f, {0x1, 0x2}}, {0x401, 0x5, {0x0, 0x8}}, {0xc, 0xa9, {0x0, 0x300}}, {0xffff, 0x32, {0x2, 0x1ea6b126}}, {0x8, 0x2, {0x1, 0xeb2}}, {0x2, 0x2, {0x0, 0x10001}}, {0x33bd, 0x7, {0x3, 0xffff0001}}, {0x2, 0x400, {0x2, 0x18da}}, {0x81, 0xfffd, {0x3, 0x8000}}, {0x0, 0x6, {0x1, 0x800}}, {0x72e, 0x0, {0x0, 0x6}}, {0x8, 0x81, {0x2, 0x40}}, {0x6, 0x7f, {0x1, 0x6}}, {0x549, 0x3, {0x2, 0x3}}, {0x0, 0x1, {0x2, 0x1020000}}]}}}, {{0x254, 0x1, {{0x0, 0xffffffff}, 0xfe, 0xf5, 0x1, 0x9, 0x1c, 'syz1\x00', "2c9dd21baad892336d98747f66852a1ee68f6ed328b1408c47fbaa4684408d89", "be49c8abdfdcd9971adc71941f78ddc389830e98f8bf4a725386939bb770c7e7", [{0xdb, 0x3, {0x2, 0x1f}}, {0x5, 0x400, {0x3, 0x7fffffff}}, {0x7f, 0x200, {0x2, 0xe8}}, {0x401, 0x3ff, {0x2, 0x3f}}, {0x6, 0x101, {0x0, 0x200}}, {0x8, 0x8001, {0x2, 0x400}}, {0x7, 0x3f, {0x2, 0x2d}}, {0x3, 0x8001, {0x1, 0x8}}, {0x8, 0x9, {0x3, 0x6}}, {0x4, 0x100, {0x0, 0x20}}, {0x6ba, 0x0, {0x3, 0xe92}}, {0x81, 0x2, {0x2, 0x7}}, {0x3, 0x3, {0x2, 0x40000000}}, {0x4, 0xa05}, {0x101, 0x4e, {0x3, 0x8a12}}, {0x9a, 0x5f, {0x0, 0x2}}, {0xe90, 0xa39, {0x1, 0x6}}, {0x9, 0x6, {0x1, 0x7fff}}, {0x1, 0x9, {0x1, 0x9}}, {0x4, 0x8e, {0x0, 0x2}}, {0x101, 0x2, {0x2, 0xab}}, {0x2, 0x6, {0x0, 0x400}}, {0x6, 0x40, {0x0, 0x3ff}}, {0x81, 0x20c, {0x0, 0x6}}, {0x0, 0x1, {0x1, 0xc9e5}}, {0x23, 0x400, {0x2, 0x5b0}}, {0x8fe, 0xf000, {0x2, 0x1}}, {0x3f, 0x7, {0x1, 0x1}}, {0x4, 0x6, {0x3, 0x2}}, {0x3, 0x9, {0x0, 0x6}}, {0xdf, 0x3, {0x3}}, {0x5, 0x2, {0x2, 0x1}}, {0x9, 0x200, {0x3, 0x2}}, {0x8000, 0x200, {0x2, 0x4}}, {0x61, 0x4, {0x2, 0x9}}, {0x1000, 0x8, {0x2, 0x4}}, {0x200, 0x1000, {0x0, 0x20000}}, {0x202, 0x7f, {0x0, 0x7}}, {0x6, 0xffff, {0x0, 0xb47}}, {0x4, 0xc3c, {0x3, 0x8}}]}}}, {{0x254, 0x1, {{0x0, 0x8000}, 0x6, 0x81, 0x1000, 0x2, 0x22, 'syz1\x00', "e67eb62a29888aa466556ecab8ad321ca9d138db21f92629c52d712b098e72aa", "5edce2b71dd198adb7f6f0e1a6f7d3e3013090f4d2efa84ef1be5943bad93e55", [{0x5, 0x9, {0x3, 0x4}}, {0xff, 0x5, {0x3, 0x8}}, {0x7, 0xb08b, {0x0, 0x6591a7d7}}, {0x3, 0xff, {0x1, 0xfd}}, {0xbe82, 0x401, {0x1, 0x2}}, {0x9e8e, 0x731d, {0x3, 0x32}}, {0x1000, 0x190a, {0x1}}, {0xffff, 0x0, {0x3, 0x3}}, {0x82, 0xab05, {0x3, 0x3}}, {0x24c1, 0x3, {0x3, 0x81}}, {0xff, 0x5, {0x3, 0x2}}, {0x9a, 0x9, {0x0, 0x9}}, {0x3, 0x5, {0x2}}, {0x5dac, 0x8, {0x0, 0x4}}, {0x4, 0x1, {0x3, 0x7}}, {0x36e, 0x6, {0x2, 0x9}}, {0x60b9, 0x4, {0x2, 0x200}}, {0x3ff, 0x1b9, {0x1, 0x5d5}}, {0x7f, 0x1, {0x1}}, {0x100, 0x7ff, {0x1, 0x6}}, {0x7ff6, 0xf, {0x1, 0x6}}, {0x8, 0xff7f, {0x1, 0x6}}, {0xff9a, 0x8000, {0x1, 0x80000001}}, {0xaf, 0x8d, {0x1, 0x7}}, {0x0, 0x20, {0x1, 0x6}}, {0x6, 0x3f, {0x1, 0x5}}, {0x9, 0x8000, {0x3, 0x6}}, {0x40, 0x542, {0x3, 0x414e}}, {0x8, 0x6, {0x2, 0x5}}, {0x6, 0xfff9, {0x3, 0xd936}}, {0x9, 0x401, {0x2, 0x7}}, {0xff00, 0x8001, {0x2, 0x6}}, {0x8000, 0x1, {0x1, 0x6}}, {0x8, 0x1ff, {0x1, 0x5}}, {0xf46, 0x2, {0x0, 0x9b}}, {0x8001, 0x3, {0x3, 0x8}}, {0x200, 0x3, {0x2, 0xfffffffd}}, {0x44f, 0x5, {0x1, 0x2}}, {0x4, 0x0, {0x0, 0x88}}, {0x9, 0xfffd, {0x2, 0x5}}]}}}, {{0x254, 0x1, {{0x1}, 0x7, 0x2, 0xa349, 0x0, 0xc, 'syz0\x00', "2457eb11d11e39f5e8618cbecdd64d91816308d616da46a714be2e7797e903ca", "1fe4ddf8101dab888434f2e76ee3fadaafaade32b39e778638e3ae650467f7c8", [{0x1f, 0x28, {0x3, 0x12}}, {0x1, 0x1, {0x0, 0x2}}, {0xfffd, 0xfffc, {0x0, 0x2}}, {0xff, 0x6, {0x2, 0x1}}, {0x7fff, 0x7, {0x0, 0xffffffe1}}, {0x7f, 0x1, {0x1, 0x1f}}, {0x0, 0x2, {0x2, 0xff}}, {0x400, 0x9, {0x1, 0x7}}, {0x6, 0x1f, {0x0, 0x86a3}}, {0x6, 0x68, {0x3, 0xc9}}, {0x5, 0xfff, {0x1, 0x7ff}}, {0x1ff, 0x52, {0x2, 0x3}}, {0x40, 0x9, {0x1, 0x1}}, {0x7ff, 0x4, {0x3, 0x4b6a3aa0}}, {0x5, 0x5, {0x0, 0x2695}}, {0x7f, 0x3e, {0x3}}, {0x0, 0x8, {0x3, 0x8001}}, {0xae40, 0x8000, {0x0, 0x2}}, {0x7, 0x0, {0x3, 0xba}}, {0xe9e, 0x64ae, {0x0, 0x8}}, {0xfff8, 0x37d, {0x3, 0xffffffff}}, {0x65, 0x800, {0x3, 0x40000000}}, {0x1, 0x101, {0x0, 0x5fe}}, {0x8, 0x4, {0x0, 0xff}}, {0x3, 0x101, {0x2, 0x7}}, {0x7, 0x3, {0x2, 0x2}}, {0x0, 0x81, {0x0, 0x7}}, {0x1, 0x9, {0x0, 0x5}}, {0x3, 0x4, {0x3, 0x7}}, {0xfcf4, 0x40, {0x2, 0xf201}}, {0x1, 0x81, {0x1, 0x1249}}, {0x8000, 0x5, {0x1, 0x40}}, {0x1, 0x7, {0x2, 0x9}}, {0x9, 0x81, {0x1, 0x100}}, {0xef80, 0x2, {0x3, 0x3}}, {0x2, 0x3, {0x2, 0x20}}, {0x8f, 0x9, {0x1, 0x3}}, {0x3ff, 0x2}, {0xffff, 0xfff, {0x2, 0x9}}, {0xffff, 0xffff, {0x3, 0x400}}]}}}, {{0x254, 0x1, {{0x1, 0x5f}, 0x3f, 0x6, 0x4, 0x7, 0xe, 'syz0\x00', "cb1da44adf2fb8fa8f58e1af431e88c10df4baedb1978a447145abe04b3f985d", "d7ce982b9fa1479e38acd1f32e7c4d8b74300ab1f5b5f9a6064704d426141f4a", [{0x4, 0x55, {0x0, 0xb27a}}, {0x4, 0x401, {0x1, 0x2c7}}, {0x1, 0xc56, {0x3, 0x800}}, {0x6, 0x400, {0x0, 0x80000001}}, {0xffff, 0xcd35, {0x2, 0x3f}}, {0x6, 0x4, {0x2, 0x80000001}}, {0x4, 0x1, {0x3}}, {0x1, 0xce4, {0x3, 0x5}}, {0x8, 0xdf, {0x2, 0x7}}, {0x5, 0x6, {0x3, 0x5}}, {0x6, 0x6, {0x1, 0x7}}, {0x7, 0xfffb, {0x1, 0x6}}, {0x101, 0x6, {0x3, 0x24}}, {0x1000, 0xecb0, {0x3, 0xff000000}}, {0x3, 0xff, {0x0, 0x7}}, {0x3, 0x20, {0x3, 0x4}}, {0x8000, 0x807, {0x2, 0x8001}}, {0xfe00, 0x401, {0x0, 0x1000}}, {0x35b, 0xe3, {0x1, 0x8}}, {0x200, 0x0, {0x1, 0x3}}, {0x7c4, 0x5, {0x1, 0x2}}, {0x5, 0xfeff, {0x3, 0x10001}}, {0x4, 0x22, {0x3, 0x5}}, {0x40, 0x2, {0x3, 0x7}}, {0x25e, 0x800, {0x2, 0x7ff}}, {0x1, 0x1, {0x1, 0x401}}, {0x3d21, 0x4, {0x3, 0x200}}, {0x6, 0x6, {0x1, 0x6}}, {0x3ff, 0xfff8, {0x1, 0xffffffff}}, {0x8, 0x7fff, {0x0, 0x100}}, {0x1, 0x100, {0x1, 0xff}}, {0x3, 0xf801, {0x2}}, {0x5, 0x4, {0x1}}, {0x8, 0x7ff, {0x3}}, {0x40, 0x5, {0x0, 0x7}}, {0x200, 0x3f, {0x3}}, {0x39c7, 0xf801, {0x2, 0x4}}, {0x80, 0x8000, {0x3, 0x10000}}, {0xdd, 0x93d0, {0x4, 0x4}}, {0x303, 0xfffd, {0x3, 0x6}}]}}}, {{0x254, 0x1, {{0x3, 0x8}, 0x2, 0x5, 0x6, 0x3000, 0x7, 'syz0\x00', "14f1fc8ae5360efc794fabebe4976a662f2ebaa46cd8973eeec66e2572f295db", "063d82131880cc9e78445d5f0a9ac65026050614cfb0665d0d85f055f214f42a", [{0x8, 0x5, {0x2, 0x81}}, {0x3e6, 0xff00, {0x2, 0x9}}, {0x8, 0x7, {0x3, 0x8}}, {0x3f, 0x9, {0x1, 0x2}}, {0x1000, 0x9, {0x3, 0xffffffff}}, {0x3, 0xfff9, {0x0, 0x1}}, {0x3, 0x0, {0x2, 0x1}}, {0x20, 0x0, {0x2, 0x2}}, {0x80, 0xfff, {0x0, 0x8}}, {0x8001, 0x400, {0x1, 0x7}}, {0x7fff, 0x901, {0x3, 0x4de}}, {0x3, 0x3, {0x0, 0x6}}, {0x0, 0x1, {0x1, 0x4}}, {0xff31, 0x7f, {0x1, 0x1}}, {0x3, 0x3, {0x3, 0x4}}, {0x401, 0xf33, {0x3, 0xc84}}, {0x40, 0x9, {0x3, 0x7}}, {0xb7, 0x3, {0x2, 0x8001}}, {0x8, 0x4, {0x1, 0xfffff562}}, {0x7, 0x2, {0x1, 0x2}}, {0x26c, 0x0, {0x1, 0x2}}, {0x6, 0x0, {0x0, 0x10001}}, {0x1, 0x8, {0x3, 0x9}}, {0x1, 0x7f, {0x0, 0x2}}, {0xf765, 0xd36, {0x0, 0x400}}, {0x7, 0x5, {0x0, 0x9}}, {0x2, 0xad81, {0x1, 0xfffff7f8}}, {0x101, 0x3, {0x0, 0x5}}, {0x401, 0x6, {0x1, 0x6}}, {0x6, 0x8, {0x3, 0x49}}, {0x8000, 0x6, {0x2, 0x4b}}, {0x7, 0x8000, {0x1, 0x98d}}, {0x6, 0xfb3, {0x3, 0x2}}, {0xbe2d, 0x102, {0x3, 0x3}}, {0x3, 0xff, {0x1, 0xffff}}, {0x1, 0x3, {0x1, 0x1}}, {0x36fa, 0x0, {0x2, 0x200}}, {0x400, 0x7cf, {0x2, 0x8}}, {0x8, 0x7, {0x1, 0x8}}, {0xfffc, 0x1, {0x1, 0x800}}]}}}, {{0x254, 0x1, {{0x2, 0x6}, 0xff, 0x8a, 0xabf, 0x401, 0x17, 'syz1\x00', "7b9d8f1000298adff1b5976cdedfe89bd7e8e49575823115e40d405e206f49b6", "9cb9f794f280d36db3e93dca031456b015236a3e530647225967adda1416d4e8", [{0x5, 0x0, {0x0, 0x101}}, {0x5, 0xfff, {0x3, 0x8000}}, {0x0, 0x9, {0x1, 0x62}}, {0x401, 0x6, {0x2, 0x476018d8}}, {0x6, 0xea9, {0x2, 0x8}}, {0x5, 0x400, {0x1, 0x901}}, {0x9, 0x9, {0x3, 0x3ff}}, {0x4, 0x2, {0x2, 0x800}}, {0x7ff, 0xfffc, {0x0, 0x6}}, {0x8, 0x8001, {0x0, 0x9}}, {0x1a, 0x2, {0x0, 0x3}}, {0x800, 0x2, {0x2, 0xfffffffd}}, {0xfffb, 0x8000, {0x0, 0xff}}, {0x401, 0x6, {0x2, 0x7}}, {0x8, 0x9, {0x3, 0xfffffffa}}, {0x6, 0x0, {0x1, 0x6}}, {0x5, 0xcb3b, {0x1, 0x4}}, {0xfff8, 0x401}, {0xfff7, 0x7, {0x2, 0x1}}, {0x4, 0x100, {0x1, 0x9}}, {0x5, 0x7f, {0x2}}, {0x3, 0xff80, {0x2, 0xeb9}}, {0x8, 0x7f, {0x1, 0x8}}, {0x9, 0x20, {0x1, 0x3}}, {0x6, 0x6, {0x1, 0x6}}, {0x9, 0x6, {0x0, 0x4}}, {0x4db, 0x1, {0x1, 0x200}}, {0x1, 0x400, {0x0, 0x8001}}, {0x4, 0x2, {0x1, 0x401}}, {0x1, 0xfe4b, {0x1, 0xffffffff}}, {0xffff, 0x5, {0x2}}, {0x40b5, 0x3}, {0x6, 0x0, {0x3, 0xbb83}}, {0x866, 0x3, {0x3, 0x101}}, {0x101, 0xb6b6, {0x2, 0x20}}, {0xffbe, 0x7, {0x3, 0x9}}, {0x3ff, 0x5, {0x0, 0x20}}, {0x8, 0x0, {0x3}}, {0x100, 0xfff, {0x3, 0xfffff801}}, {0x9, 0x2, {0x0, 0x5}}]}}}]}, 0x175c}, 0x1, 0x0, 0x0, 0x40000d1}, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:20:41 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:41 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x4, 0x4, 0x3ac, 0x1c0, 0x0, 0x1c0, 0x2cc, 0x2cc, 0x2cc, 0x4, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'rose0\x00', 'veth0_to_bridge\x00'}, 0xbc, 0xe0}, @unspec=@STANDARD={0x24, '\x00', 0x0, 0x1c0}}, {{@arp={@dev, @local, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0\x00'}, 0xbc, 0xe0}, @unspec=@CLASSIFY={0x24, 'CLASSIFY\x00'}}, {{@arp={@multicast1, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'vcan0\x00'}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @broadcast, @remote}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3f8) 18:20:41 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff}, 0x6) [ 333.842994][T13147] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1281 sclass=netlink_route_socket pid=13147 comm=syz-executor.0 18:20:42 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85}) connect$can_bcm(r0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0) close(r0) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}}) socket(0x10, 0x802, 0x0) connect$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) 18:20:42 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:42 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:42 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="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", 0x48b, 0xc001, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000280)="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", 0x122, 0x400c020, 0x0, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000200)=0x3, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000580), 0x4) [ 334.531189][T13170] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1281 sclass=netlink_route_socket pid=13170 comm=syz-executor.0 18:20:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x13, 0x0, &(0x7f0000000080)) 18:20:43 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x4, 0x4, 0x3ac, 0x1c0, 0x0, 0x1c0, 0x2cc, 0x2cc, 0x2cc, 0x4, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'rose0\x00', 'veth0_to_bridge\x00'}, 0xbc, 0xe0}, @unspec=@STANDARD={0x24, '\x00', 0x0, 0x1c0}}, {{@arp={@dev, @local, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0\x00'}, 0xbc, 0xe0}, @unspec=@CLASSIFY={0x24, 'CLASSIFY\x00'}}, {{@arp={@multicast1, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'vcan0\x00'}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @broadcast, @remote}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3f8) 18:20:43 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85}) connect$can_bcm(r0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0) close(r0) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}}) socket(0x10, 0x802, 0x0) connect$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) 18:20:43 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000780)={'bond_slave_1\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=0x0}}) 18:20:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000080)=@routing={0x0, 0x6, 0x0, 0x0, 0x0, [@dev, @dev, @empty]}, 0x38) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendto$inet6(r1, &(0x7f0000000040)="84", 0x1, 0x200400d4, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f00000000c0)='u32\x00', 0x0, 0xffffffffffffffff) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000014007a2a30005000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000900)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x0, 0xfff0}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan1\x00', r6}) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 18:20:43 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x4, 0x4, 0x3ac, 0x1c0, 0x0, 0x1c0, 0x2cc, 0x2cc, 0x2cc, 0x4, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'rose0\x00', 'veth0_to_bridge\x00'}, 0xbc, 0xe0}, @unspec=@STANDARD={0x24, '\x00', 0x0, 0x1c0}}, {{@arp={@dev, @local, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0\x00'}, 0xbc, 0xe0}, @unspec=@CLASSIFY={0x24, 'CLASSIFY\x00'}}, {{@arp={@multicast1, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'vcan0\x00'}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @broadcast, @remote}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3f8) 18:20:43 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:43 executing program 4: add_key(&(0x7f0000000240)='rxrpc\x00', 0x0, &(0x7f00000002c0)="d4", 0x1, 0xfffffffffffffffc) 18:20:43 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6e8d3ca8, 0x8, 0x8, 0x8001, 0x85}) connect$can_bcm(r0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002600)=""/202, 0x0) close(r0) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000240)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x0, 0x1ff, 0x10000, 0x8001, 0x2, 0x9, 0xd6a6, 0x80000000, 0x20]}}) socket(0x10, 0x802, 0x0) connect$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) 18:20:43 executing program 3: socket$kcm(0x11, 0x2, 0x0) r0 = socket$kcm(0x10, 0x80000000000002, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00003c9733f5f087110008abca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702000000000000", 0x39}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 18:20:44 executing program 2: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x44, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 18:20:44 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x4, 0x4, 0x3ac, 0x1c0, 0x0, 0x1c0, 0x2cc, 0x2cc, 0x2cc, 0x4, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'rose0\x00', 'veth0_to_bridge\x00'}, 0xbc, 0xe0}, @unspec=@STANDARD={0x24, '\x00', 0x0, 0x1c0}}, {{@arp={@dev, @local, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0\x00'}, 0xbc, 0xe0}, @unspec=@CLASSIFY={0x24, 'CLASSIFY\x00'}}, {{@arp={@multicast1, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'vcan0\x00'}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @broadcast, @remote}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3f8) 18:20:44 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 336.330221][T13224] ===================================================== [ 336.337206][T13224] BUG: KMSAN: kernel-infoleak in kmsan_copy_to_user+0x81/0x90 [ 336.344671][T13224] CPU: 0 PID: 13224 Comm: syz-executor.4 Not tainted 5.6.0-rc2-syzkaller #0 [ 336.353335][T13224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.363390][T13224] Call Trace: [ 336.366764][T13224] dump_stack+0x1c9/0x220 [ 336.371122][T13224] kmsan_report+0xf7/0x1e0 [ 336.375563][T13224] kmsan_internal_check_memory+0x238/0x3d0 [ 336.381406][T13224] kmsan_copy_to_user+0x81/0x90 [ 336.386373][T13224] _copy_to_user+0x15a/0x1f0 [ 336.390989][T13224] tty_compat_ioctl+0x1482/0x1850 [ 336.396027][T13224] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 336.401869][T13224] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 336.407689][T13224] ? tty_poll+0x4b0/0x4b0 [ 336.412028][T13224] __se_compat_sys_ioctl+0x57c/0xed0 [ 336.417329][T13224] ? kmsan_get_metadata+0x4f/0x180 [ 336.422441][T13224] __ia32_compat_sys_ioctl+0xd9/0x110 [ 336.427810][T13224] ? compat_ptr_ioctl+0x150/0x150 [ 336.432827][T13224] do_fast_syscall_32+0x3c7/0x6e0 [ 336.437911][T13224] entry_SYSENTER_compat+0x68/0x77 [ 336.443015][T13224] RIP: 0023:0xf7f8dd99 [ 336.447077][T13224] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 336.466758][T13224] RSP: 002b:00000000f5d880cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 336.475157][T13224] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000541e [ 336.483126][T13224] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 336.491084][T13224] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 336.499040][T13224] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 336.506996][T13224] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 336.514975][T13224] [ 336.517289][T13224] Local variable ----v32.i105@tty_compat_ioctl created at: [ 336.524474][T13224] tty_compat_ioctl+0xf12/0x1850 [ 336.529422][T13224] tty_compat_ioctl+0xf12/0x1850 [ 336.534335][T13224] [ 336.536645][T13224] Bytes 50-51 of 60 are uninitialized [ 336.541996][T13224] Memory access of size 60 starts at ffff968bc13dbce0 [ 336.548842][T13224] Data copied to user address 0000000020000040 [ 336.554984][T13224] ===================================================== [ 336.561902][T13224] Disabling lock debugging due to kernel taint [ 336.568042][T13224] Kernel panic - not syncing: panic_on_warn set ... [ 336.574630][T13224] CPU: 0 PID: 13224 Comm: syz-executor.4 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 336.584673][T13224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.594715][T13224] Call Trace: [ 336.598002][T13224] dump_stack+0x1c9/0x220 [ 336.602326][T13224] panic+0x3d5/0xc3e [ 336.606240][T13224] kmsan_report+0x1df/0x1e0 [ 336.610736][T13224] kmsan_internal_check_memory+0x238/0x3d0 [ 336.616546][T13224] kmsan_copy_to_user+0x81/0x90 [ 336.621382][T13224] _copy_to_user+0x15a/0x1f0 [ 336.625974][T13224] tty_compat_ioctl+0x1482/0x1850 [ 336.630987][T13224] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 336.636811][T13224] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 336.642604][T13224] ? tty_poll+0x4b0/0x4b0 [ 336.646923][T13224] __se_compat_sys_ioctl+0x57c/0xed0 [ 336.652203][T13224] ? kmsan_get_metadata+0x4f/0x180 [ 336.657315][T13224] __ia32_compat_sys_ioctl+0xd9/0x110 [ 336.662679][T13224] ? compat_ptr_ioctl+0x150/0x150 [ 336.667694][T13224] do_fast_syscall_32+0x3c7/0x6e0 [ 336.672718][T13224] entry_SYSENTER_compat+0x68/0x77 [ 336.677818][T13224] RIP: 0023:0xf7f8dd99 [ 336.681887][T13224] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 336.701521][T13224] RSP: 002b:00000000f5d880cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 336.709934][T13224] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000541e [ 336.717903][T13224] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 336.725881][T13224] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 336.733858][T13224] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 336.741834][T13224] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 336.750551][T13224] ------------[ cut here ]------------ [ 336.755995][T13224] kernel BUG at mm/kmsan/kmsan.h:87! [ 336.761272][T13224] invalid opcode: 0000 [#1] SMP [ 336.766116][T13224] CPU: 0 PID: 13224 Comm: syz-executor.4 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 336.776153][T13224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.786200][T13224] RIP: 0010:kmsan_internal_check_memory+0x3c0/0x3d0 [ 336.792765][T13224] Code: 5b 41 5c 41 5d 41 5e 41 5f 5d c3 0f 0b 48 c7 c7 06 4c 88 98 31 c0 e8 e1 70 48 ff 0f 0b 0f 0b 0f 0b 0f 0b e8 02 8f 48 ff 0f 0b <0f> 0b 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 83 ff [ 336.812351][T13224] RSP: 0018:ffff968bc13db748 EFLAGS: 00010046 [ 336.818393][T13224] RAX: 0000000000000002 RBX: 0000000006ef00b3 RCX: 0000000006ef00b3 [ 336.826377][T13224] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff968bc13db824 [ 336.834337][T13224] RBP: ffff968bc13db7f0 R08: 0000000000000000 R09: ffff926fafc28ed0 [ 336.842284][T13224] R10: 0000000000000000 R11: ffffffff8f616f70 R12: 0000000000000000 [ 336.850380][T13224] R13: 0000000000000001 R14: 0000000000000002 R15: 0000000000000001 [ 336.858330][T13224] FS: 0000000000000000(0000) GS:ffff926fafc00000(0063) knlGS:00000000f5d88b40 [ 336.867251][T13224] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 [ 336.873811][T13224] CR2: 0000000008158000 CR3: 00000000319d8000 CR4: 00000000001406f0 [ 336.881761][T13224] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 336.889722][T13224] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 336.897680][T13224] Call Trace: [ 336.900974][T13224] kmsan_check_memory+0xd/0x10 [ 336.905719][T13224] iowrite8+0x99/0x2e0 [ 336.909775][T13224] pvpanic_panic_notify+0x99/0xc0 [ 336.914862][T13224] ? pvpanic_mmio_remove+0x60/0x60 [ 336.919966][T13224] atomic_notifier_call_chain+0x12a/0x240 [ 336.925717][T13224] panic+0x468/0xc3e [ 336.929613][T13224] kmsan_report+0x1df/0x1e0 [ 336.934100][T13224] kmsan_internal_check_memory+0x238/0x3d0 [ 336.939907][T13224] kmsan_copy_to_user+0x81/0x90 [ 336.944749][T13224] _copy_to_user+0x15a/0x1f0 [ 336.949346][T13224] tty_compat_ioctl+0x1482/0x1850 [ 336.954352][T13224] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 336.960161][T13224] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 336.965957][T13224] ? tty_poll+0x4b0/0x4b0 [ 336.970270][T13224] __se_compat_sys_ioctl+0x57c/0xed0 [ 336.975592][T13224] ? kmsan_get_metadata+0x4f/0x180 [ 336.980695][T13224] __ia32_compat_sys_ioctl+0xd9/0x110 [ 336.986097][T13224] ? compat_ptr_ioctl+0x150/0x150 [ 336.991109][T13224] do_fast_syscall_32+0x3c7/0x6e0 [ 336.996137][T13224] entry_SYSENTER_compat+0x68/0x77 [ 337.001242][T13224] RIP: 0023:0xf7f8dd99 [ 337.005294][T13224] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 337.024899][T13224] RSP: 002b:00000000f5d880cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 337.033311][T13224] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000541e [ 337.041322][T13224] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 337.049283][T13224] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 337.057243][T13224] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 337.065203][T13224] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 337.073171][T13224] Modules linked in: [ 337.077060][T13224] ---[ end trace 7046023676196b68 ]--- [ 337.082514][T13224] RIP: 0010:kmsan_internal_check_memory+0x3c0/0x3d0 [ 337.089088][T13224] Code: 5b 41 5c 41 5d 41 5e 41 5f 5d c3 0f 0b 48 c7 c7 06 4c 88 98 31 c0 e8 e1 70 48 ff 0f 0b 0f 0b 0f 0b 0f 0b e8 02 8f 48 ff 0f 0b <0f> 0b 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 83 ff [ 337.108682][T13224] RSP: 0018:ffff968bc13db748 EFLAGS: 00010046 [ 337.114733][T13224] RAX: 0000000000000002 RBX: 0000000006ef00b3 RCX: 0000000006ef00b3 [ 337.122698][T13224] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff968bc13db824 [ 337.131472][T13224] RBP: ffff968bc13db7f0 R08: 0000000000000000 R09: ffff926fafc28ed0 [ 337.139424][T13224] R10: 0000000000000000 R11: ffffffff8f616f70 R12: 0000000000000000 [ 337.147378][T13224] R13: 0000000000000001 R14: 0000000000000002 R15: 0000000000000001 [ 337.155358][T13224] FS: 0000000000000000(0000) GS:ffff926fafc00000(0063) knlGS:00000000f5d88b40 [ 337.164302][T13224] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 [ 337.170919][T13224] CR2: 0000000008158000 CR3: 00000000319d8000 CR4: 00000000001406f0 [ 337.178885][T13224] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 337.186847][T13224] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 337.194804][T13224] Kernel panic - not syncing: Fatal exception [ 337.201500][T13224] Kernel Offset: 0x9400000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 337.213030][T13224] Rebooting in 86400 seconds..