[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 32.141954] random: sshd: uninitialized urandom read (32 bytes read) [ 32.394154] kauditd_printk_skb: 9 callbacks suppressed [ 32.394162] audit: type=1400 audit(1568827565.542:35): avc: denied { map } for pid=6776 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 32.448405] random: sshd: uninitialized urandom read (32 bytes read) [ 33.021932] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.88' (ECDSA) to the list of known hosts. [ 38.578348] random: sshd: uninitialized urandom read (32 bytes read) 2019/09/18 17:26:11 fuzzer started [ 38.765042] audit: type=1400 audit(1568827571.912:36): avc: denied { map } for pid=6786 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16480 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 39.743393] random: cc1: uninitialized urandom read (8 bytes read) 2019/09/18 17:26:13 dialing manager at 10.128.0.105:45739 2019/09/18 17:26:13 syscalls: 2466 2019/09/18 17:26:13 code coverage: enabled 2019/09/18 17:26:13 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/09/18 17:26:13 extra coverage: extra coverage is not supported by the kernel 2019/09/18 17:26:13 setuid sandbox: enabled 2019/09/18 17:26:13 namespace sandbox: enabled 2019/09/18 17:26:13 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/18 17:26:13 fault injection: enabled 2019/09/18 17:26:13 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/18 17:26:13 net packet injection: enabled 2019/09/18 17:26:13 net device setup: enabled [ 41.675260] random: crng init done 17:27:25 executing program 0: 17:27:25 executing program 1: 17:27:25 executing program 5: 17:27:25 executing program 2: 17:27:25 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000640)='2', 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 17:27:25 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) [ 112.692747] audit: type=1400 audit(1568827645.842:37): avc: denied { map } for pid=6786 comm="syz-fuzzer" path="/root/syzkaller-shm071137632" dev="sda1" ino=16492 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 112.750125] audit: type=1400 audit(1568827645.842:38): avc: denied { map } for pid=6803 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13810 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 113.090848] IPVS: ftp: loaded support on port[0] = 21 [ 114.021485] IPVS: ftp: loaded support on port[0] = 21 [ 114.038893] chnl_net:caif_netlink_parms(): no params data found [ 114.091504] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.097889] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.104833] device bridge_slave_0 entered promiscuous mode [ 114.111819] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.118154] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.125210] device bridge_slave_1 entered promiscuous mode [ 114.142660] IPVS: ftp: loaded support on port[0] = 21 [ 114.142974] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 114.162912] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 114.185800] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 114.192961] team0: Port device team_slave_0 added [ 114.217760] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 114.225647] team0: Port device team_slave_1 added [ 114.232759] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 114.243970] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 114.302860] device hsr_slave_0 entered promiscuous mode [ 114.340301] device hsr_slave_1 entered promiscuous mode [ 114.380443] chnl_net:caif_netlink_parms(): no params data found [ 114.391261] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 114.399784] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 114.446523] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.452941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.459629] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.465991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.475297] IPVS: ftp: loaded support on port[0] = 21 [ 114.508535] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.514922] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.521797] device bridge_slave_0 entered promiscuous mode [ 114.528217] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.534649] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.541429] device bridge_slave_1 entered promiscuous mode [ 114.589556] chnl_net:caif_netlink_parms(): no params data found [ 114.599238] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 114.611355] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 114.629494] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 114.636682] team0: Port device team_slave_0 added [ 114.652260] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 114.659215] team0: Port device team_slave_1 added [ 114.690524] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.696913] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.705133] device bridge_slave_0 entered promiscuous mode [ 114.712273] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 114.712391] IPVS: ftp: loaded support on port[0] = 21 [ 114.719491] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 114.751826] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.758159] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.765149] device bridge_slave_1 entered promiscuous mode [ 114.822922] device hsr_slave_0 entered promiscuous mode [ 114.880246] device hsr_slave_1 entered promiscuous mode [ 114.931414] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 114.940345] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 114.982928] chnl_net:caif_netlink_parms(): no params data found [ 115.014994] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 115.024177] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 115.054084] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.061157] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.070865] 8021q: adding VLAN 0 to HW filter on device bond0 [ 115.079545] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 115.085932] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 115.092977] team0: Port device team_slave_0 added [ 115.110175] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 115.118071] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 115.125586] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 115.133530] team0: Port device team_slave_1 added [ 115.140880] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 115.148647] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.156774] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.163773] device bridge_slave_0 entered promiscuous mode [ 115.169863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 115.177650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 115.189837] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 115.196933] 8021q: adding VLAN 0 to HW filter on device team0 [ 115.203158] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 115.213835] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.220241] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.227114] device bridge_slave_1 entered promiscuous mode [ 115.242930] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 115.250297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 115.257918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 115.265581] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.271920] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.283374] IPVS: ftp: loaded support on port[0] = 21 [ 115.306190] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 115.324120] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 115.363426] device hsr_slave_0 entered promiscuous mode [ 115.410424] device hsr_slave_1 entered promiscuous mode [ 115.460864] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 115.467963] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 115.485310] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 115.492615] team0: Port device team_slave_0 added [ 115.498208] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 115.505437] team0: Port device team_slave_1 added [ 115.513557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 115.521346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 115.528810] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.535223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.552817] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 115.561582] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 115.594509] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 115.608751] 8021q: adding VLAN 0 to HW filter on device bond0 [ 115.616261] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 115.623346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 115.632529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 115.655943] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 115.666091] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 115.679863] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 115.695897] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 115.705114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 115.712895] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 115.720452] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 115.731204] chnl_net:caif_netlink_parms(): no params data found [ 115.739902] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 115.801962] device hsr_slave_0 entered promiscuous mode [ 115.850461] device hsr_slave_1 entered promiscuous mode [ 115.911054] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 115.922172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 115.929726] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 115.937632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 115.944430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 115.953251] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 115.962777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 115.972485] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 115.980122] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 115.987213] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 116.006408] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 116.015739] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 116.022044] 8021q: adding VLAN 0 to HW filter on device team0 [ 116.035986] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 116.044406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 116.052229] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 116.059478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 116.067234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 116.075107] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.081472] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.088712] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 116.148582] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 116.168817] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 116.185602] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 116.194003] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.200918] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.207717] device bridge_slave_0 entered promiscuous mode [ 116.214703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 116.224062] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 116.231896] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.238224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.247520] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 116.260278] 8021q: adding VLAN 0 to HW filter on device bond0 [ 116.267248] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.275740] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.282757] device bridge_slave_1 entered promiscuous mode [ 116.289158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 116.298904] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 116.306372] chnl_net:caif_netlink_parms(): no params data found [ 116.315505] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 116.324735] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 116.351946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 116.361742] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 116.375266] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 116.384375] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 116.392947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 116.401125] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 116.408519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 116.415332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 116.424103] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 116.438130] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 116.445282] 8021q: adding VLAN 0 to HW filter on device team0 [ 116.452148] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 116.468523] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 116.476063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 116.483850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 116.498354] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 116.507207] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 116.519689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 116.527709] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 116.535297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 116.543336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 116.551470] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.557824] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.564861] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 116.574129] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 116.589521] team0: Port device team_slave_0 added 17:27:29 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setreuid(0x0, r1) lsetxattr$system_posix_acl(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280), 0x24, 0x0) [ 116.602316] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 116.609342] team0: Port device team_slave_1 added [ 116.616846] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 116.638596] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready 17:27:29 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7003, 0x0) pread64(r0, &(0x7f0000000040)=""/38, 0x26, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 116.653161] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 116.660822] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 116.669517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 116.683395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 116.698441] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.704830] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.713353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 116.720956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 116.734881] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 116.749957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 116.765991] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.772722] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.779659] device bridge_slave_0 entered promiscuous mode [ 116.792812] 8021q: adding VLAN 0 to HW filter on device bond0 17:27:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000500)={0x0, 0x6}) [ 116.800488] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 116.807774] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 116.814841] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.824624] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.831787] device bridge_slave_1 entered promiscuous mode [ 116.838275] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 116.844509] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 17:27:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0x95648bda8f835f45) [ 116.887764] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 116.906422] device hsr_slave_0 entered promiscuous mode [ 116.940491] device hsr_slave_1 entered promiscuous mode [ 116.960955] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 116.968086] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 116.975721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 17:27:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x40, 0x0) r1 = dup(r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='romfs\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000000c0)={0x0, 0x3d, &(0x7f0000000040)={0x0, 0x2c8}}, 0x0) 17:27:30 executing program 0: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x0, 0xa, 0x0, "20c8312a2a7829567192a0c6f93bf380500845b76c97544db9d15e56b5488ea9"}) [ 116.991107] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 117.000742] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 117.009846] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 117.018257] 8021q: adding VLAN 0 to HW filter on device team0 17:27:30 executing program 0: r0 = gettid() shutdown(0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) fcntl$notify(r1, 0x402, 0x0) getcwd(0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000016) [ 117.048315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 117.063347] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 117.074730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 117.083498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 117.093962] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 117.105899] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 117.115666] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 117.126235] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 117.141305] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 117.157678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 117.167783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 117.175978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 117.183743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 117.191720] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.198053] bridge0: port 1(bridge_slave_0) entered forwarding state [ 117.205250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 117.214078] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 117.221708] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 117.228952] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 117.243615] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 117.251324] team0: Port device team_slave_0 added [ 117.256465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 117.264452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 117.273129] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.279464] bridge0: port 2(bridge_slave_1) entered forwarding state [ 117.287607] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 117.299389] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 117.307235] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 117.316499] team0: Port device team_slave_1 added [ 117.321992] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 117.329390] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 117.337623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 117.345245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 117.353200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 117.373457] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 117.390841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 117.402995] 8021q: adding VLAN 0 to HW filter on device bond0 [ 117.409616] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 117.417331] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 117.425796] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 117.436557] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 117.443053] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 117.450968] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 117.493368] device hsr_slave_0 entered promiscuous mode [ 117.550361] device hsr_slave_1 entered promiscuous mode [ 117.590416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 117.598003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 117.605671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 117.613046] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 117.622317] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 117.630793] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 117.638556] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 117.645988] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 117.654057] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 117.661506] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 117.668373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 117.675924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 117.682701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 117.690600] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 117.702260] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 117.708313] 8021q: adding VLAN 0 to HW filter on device team0 [ 117.720272] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 117.734530] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 117.742402] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 117.751120] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 117.757816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 117.768214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 117.776317] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.782709] bridge0: port 1(bridge_slave_0) entered forwarding state [ 117.789717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 117.797388] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 117.807804] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 117.828545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 117.838242] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 17:27:31 executing program 1: perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 117.863941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 117.873443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 117.888285] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.894666] bridge0: port 2(bridge_slave_1) entered forwarding state [ 117.906320] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 117.915964] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 117.927431] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 117.933560] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 117.942373] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 117.950454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 117.958029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 117.969768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 117.987823] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 117.997800] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 118.007290] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 118.015384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 118.023127] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 118.033117] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 118.040915] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 118.055868] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 118.067625] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 118.076783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 118.084326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 118.092171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 118.099488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 118.116595] 8021q: adding VLAN 0 to HW filter on device bond0 [ 118.125034] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 118.138285] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 118.148913] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 118.176929] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 118.189961] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 118.204490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 118.212417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 118.219820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 118.227415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 118.238719] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 118.248721] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 118.255493] 8021q: adding VLAN 0 to HW filter on device team0 [ 118.263878] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 118.274337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 118.282281] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 118.289721] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.296075] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.303434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 118.315580] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 118.328855] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 118.338018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 118.350805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 118.358551] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.364913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 118.375494] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 118.383380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 118.398081] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 118.407221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 118.418198] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 118.425308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 118.433319] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 118.441636] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 118.451611] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 118.460693] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 118.467416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 118.475656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 118.483442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 118.491376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 118.506339] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 118.513202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 118.521024] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 118.536541] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 118.546546] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 118.562429] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 118.573605] 8021q: adding VLAN 0 to HW filter on device batadv0 17:27:32 executing program 5: syz_open_dev$vbi(0x0, 0x2, 0x2) write(0xffffffffffffffff, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, &(0x7f0000048000), 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000500)={0xd, 0x6}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:27:32 executing program 0: open(&(0x7f00000001c0)='./file0\x00', 0x143042, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0xffffffffffffff50) r0 = gettid() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='./file0\x00') setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) chdir(&(0x7f0000000040)='.\x00') tkill(r0, 0x1000000000016) [ 118.938096] hrtimer: interrupt took 36497 ns 17:27:33 executing program 3: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) openat(r0, &(0x7f00000003c0)='./file0\x00', 0x172482, 0x0) utime(&(0x7f00000000c0)='./file0/file0\x00', 0x0) 17:27:33 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:33 executing program 4: r0 = memfd_create(&(0x7f0000000200)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x01\x00@\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00H3\xba1o\xad\xf0\xbc\x9d6\xe16\xb71\x88\x05\xbc\xf8-\xbf\xe7{&\x02\xb5\xb1\tB>\xb3\xa1\xdc(\x93\xe8\xb6\xfa\xd3\xcc>\x1a\x9e\xdc\x97j\xe0\xaa\x9c\xa8}NX\x95\xf9q(\x8ay\xd2\xac\xef\xfe\x9b\x14\xb4\x11/mk&\x00\xb2\xdcA\xc8\xbcg\b\xc6\x93\x88\x01\x94aj\xdd\xf6sz\xd0rmX\x85\x8e\x82\x99\xf3\xd8\x17R[t\xd1\xaa\xe2\t\xf7\xc3!\xc8l4\xde\x9c\xcf:\x1c\xaf\xa2\xcdxc', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x41) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r2, &(0x7f0000000000)=[{0x23, 0x0, 0x0, 0x0, @time, {}, {}, @control}], 0xff97) 17:27:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha512-ssse3)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) 17:27:33 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x911, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:27:33 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) 17:27:33 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) 17:27:33 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(0xffffffffffffffff, &(0x7f0000000080), 0x4b, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, 0x0) lstat(0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = open(0x0, 0x141042, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) syz_open_procfs(0x0, 0x0) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x8d3b, 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, 0x0) open(0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x0) 17:27:33 executing program 4: sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fstat(0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0xffffffffffffffff, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) [ 120.523199] audit: type=1400 audit(1568827653.672:39): avc: denied { map } for pid=6932 comm="syz-executor.5" path="/dev/snd/pcmC0D0c" dev="devtmpfs" ino=15418 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 17:27:33 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x6c, 0x480000) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000180)={&(0x7f0000ffb000/0x4000)=nil, 0x7, 0x0, 0x87, &(0x7f0000ffd000/0x1000)=nil, 0x4}) r2 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x481, 0xa) ioctl$PPPIOCSMRU1(r3, 0x40047452, &(0x7f0000000300)) perf_event_open(&(0x7f0000001000)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0xc1105517, &(0x7f0000001000)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') preadv(r4, &(0x7f0000000c00)=[{&(0x7f0000000880)=""/169}, {&(0x7f0000000300)=""/13}, {&(0x7f0000000940)=""/220}, {&(0x7f00000004c0)=""/52}, {&(0x7f0000000a40)=""/244}, {&(0x7f0000000640)=""/55}, {&(0x7f0000000b40)=""/151}], 0x100000000000025d, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x402}, 0xc, &(0x7f0000000540)={&(0x7f0000001080)=ANY=[@ANYBLOB="0002000069dad8176227a84018807ca05d3bfe50c95984c23fddfe1839ed34030100f078dd54cb47f5d23f4c7ed71ad83592ebdf75568ef082912fb39e59f3d2ddc39fa3df186a09bf52ba4238ebfbde975cd741ee631ad88e8bade31662d66fe5ab4b0c007ceb2559af3a627c4e43d32de4e5a7163d242a339796c4ff49238a2a7fd618e63ec754fab69ed87d3a726c8e8ff3ab2b10ed4e4851837020041a2e2e1f780a6aeb008a8305d4af554a4c955572fde1191d70f4c1404b959a4bb7066f5ffa885b2767b0444e84339fe0809eab3268853a13468bc2507084340187d6569f26371b3dc5c83bacab9fb64801fe53e293", @ANYRES16=r5, @ANYBLOB="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"], 0x200}, 0x1, 0x0, 0x0, 0x24000001}, 0x84) r6 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r6, &(0x7f0000000000)={0x18, 0x0, {0x5, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r6, &(0x7f000000d180), 0x33b, 0x0) r7 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f00000000c0)={0xc, 0x0, 0x3800000000000000, 0x80000, r7}) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r7, 0x0, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, 0x0) msgget$private(0x0, 0x0) msgget(0x0, 0x400) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={0x0}, 0x10) ioprio_get$pid(0x1, 0x0) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) 17:27:33 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) 17:27:33 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:33 executing program 0: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x6c, 0x480000) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000180)={&(0x7f0000ffb000/0x4000)=nil, 0x7, 0x0, 0x87, &(0x7f0000ffd000/0x1000)=nil, 0x4}) r2 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x481, 0xa) ioctl$PPPIOCSMRU1(r3, 0x40047452, &(0x7f0000000300)) perf_event_open(&(0x7f0000001000)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0xc1105517, &(0x7f0000001000)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') preadv(r4, &(0x7f0000000c00)=[{&(0x7f0000000880)=""/169}, {&(0x7f0000000300)=""/13}, {&(0x7f0000000940)=""/220}, {&(0x7f00000004c0)=""/52}, {&(0x7f0000000a40)=""/244}, {&(0x7f0000000640)=""/55}, {&(0x7f0000000b40)=""/151}], 0x100000000000025d, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x402}, 0xc, &(0x7f0000000540)={&(0x7f0000001080)=ANY=[@ANYBLOB="0002000069dad8176227a84018807ca05d3bfe50c95984c23fddfe1839ed34030100f078dd54cb47f5d23f4c7ed71ad83592ebdf75568ef082912fb39e59f3d2ddc39fa3df186a09bf52ba4238ebfbde975cd741ee631ad88e8bade31662d66fe5ab4b0c007ceb2559af3a627c4e43d32de4e5a7163d242a339796c4ff49238a2a7fd618e63ec754fab69ed87d3a726c8e8ff3ab2b10ed4e4851837020041a2e2e1f780a6aeb008a8305d4af554a4c955572fde1191d70f4c1404b959a4bb7066f5ffa885b2767b0444e84339fe0809eab3268853a13468bc2507084340187d6569f26371b3dc5c83bacab9fb64801fe53e293", @ANYRES16=r5, @ANYBLOB="00022dbd7000fddbdf251100000028000500080001007564700014000200080003000000008008000200080000000800010075647000540007000c000400080000000000000008000100060000000c0004007f0000000000000008000100ff7f0000080002005cadffff0c000300152e00000000000008000200200000000c00040004000000000000001400060004000200040002eea558b0429233f09d636c94e34a3b7a0008000100fdffffff100006000800010000000000040002004c000900080001000000008008000100040000000800010000000000080001000600000008000200c90d00000800010005000000080001008000000008000200e00000000800020004000000580007000c00030003000000000000000c000300129900000000000008000200010000000c00030003000000000000000c000300080000000000000008000100080000000c00030006000000000000000800010008000000a80004001c0007000800040000000100080002000700000008000200000000000c00010073797a31000000000c00010073797a30000000004c0007000800010001000000080001001b0000000800030008000000080001000f000000080004000400000008000200000b000008000400010000800800030000feffff08000100010000000c00010073797a31000000000c00010073797a31cf6f3bac660ead52fc2ef7c57f8c44bf450d38af2b8619f8a159651c705b555733ed609a6ba3561b55e9673fc375524630f0f1cd7da235c527c09e689f3e9fcde344ba9071e956468ac1dcfb51fbd856bb3fd907b845874aea827ac0bf2d958e77919187793e26e6b88ac89c9cce862a363a20d8238dba0d88247899ad09b10e60caf6c4107f220e2312a8f48085976f965391861d357445531d75c13b8b2c70a444b55b75ab3f5e80f072c4b08f854b490cc6411f26123a78c0244c41360e4eaf7032e552c3904b8d3e1cd033897787a53ea95057fcdf5b7819c27cfad1ec37490252f4c04dfbcf15f4f9cad332b729cf94d55fdd67928d156f15b5d89023c219b64f18e1773dda60e1b6a07aeabf56731e756bff4cd0"], 0x200}, 0x1, 0x0, 0x0, 0x24000001}, 0x84) r6 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r6, &(0x7f0000000000)={0x18, 0x0, {0x5, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r6, &(0x7f000000d180), 0x33b, 0x0) r7 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f00000000c0)={0xc, 0x0, 0x3800000000000000, 0x80000, r7}) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r7, 0x0, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, 0x0) msgget$private(0x0, 0x0) msgget(0x0, 0x400) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={0x0}, 0x10) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) [ 120.643986] rdma_op ffff88806512d1d8 conn xmit_rdma (null) 17:27:33 executing program 3: clock_adjtime(0xc, &(0x7f0000000040)) [ 120.699991] audit: type=1400 audit(1568827653.842:40): avc: denied { create } for pid=6964 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 17:27:33 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) 17:27:33 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:27:33 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000040)="a30200001e005f0214fffffffffffff8070000000d00000000000000870209002d020000", 0x2a3) 17:27:34 executing program 5: mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 17:27:34 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) [ 120.921386] audit: type=1400 audit(1568827653.842:41): avc: denied { write } for pid=6964 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 120.924415] netlink: 83 bytes leftover after parsing attributes in process `syz-executor.3'. 17:27:34 executing program 5: mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) [ 121.097759] audit: type=1400 audit(1568827653.882:42): avc: denied { read } for pid=6964 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 121.188827] netlink: 83 bytes leftover after parsing attributes in process `syz-executor.3'. 17:27:34 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x6c, 0x480000) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000180)={&(0x7f0000ffb000/0x4000)=nil, 0x7, 0x0, 0x87, &(0x7f0000ffd000/0x1000)=nil, 0x4}) r2 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x481, 0xa) ioctl$PPPIOCSMRU1(r3, 0x40047452, &(0x7f0000000300)) perf_event_open(&(0x7f0000001000)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0xc1105517, &(0x7f0000001000)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') preadv(r4, &(0x7f0000000c00)=[{&(0x7f0000000880)=""/169}, {&(0x7f0000000300)=""/13}, {&(0x7f0000000940)=""/220}, {&(0x7f00000004c0)=""/52}, {&(0x7f0000000a40)=""/244}, {&(0x7f0000000640)=""/55}, {&(0x7f0000000b40)=""/151}], 0x100000000000025d, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x402}, 0xc, &(0x7f0000000540)={&(0x7f0000001080)=ANY=[@ANYBLOB="0002000069dad8176227a84018807ca05d3bfe50c95984c23fddfe1839ed34030100f078dd54cb47f5d23f4c7ed71ad83592ebdf75568ef082912fb39e59f3d2ddc39fa3df186a09bf52ba4238ebfbde975cd741ee631ad88e8bade31662d66fe5ab4b0c007ceb2559af3a627c4e43d32de4e5a7163d242a339796c4ff49238a2a7fd618e63ec754fab69ed87d3a726c8e8ff3ab2b10ed4e4851837020041a2e2e1f780a6aeb008a8305d4af554a4c955572fde1191d70f4c1404b959a4bb7066f5ffa885b2767b0444e84339fe0809eab3268853a13468bc2507084340187d6569f26371b3dc5c83bacab9fb64801fe53e293", @ANYRES16=r5, @ANYBLOB="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"], 0x200}, 0x1, 0x0, 0x0, 0x24000001}, 0x84) r6 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r6, &(0x7f0000000000)={0x18, 0x0, {0x5, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r6, &(0x7f000000d180), 0x33b, 0x0) r7 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f00000000c0)={0xc, 0x0, 0x3800000000000000, 0x80000, r7}) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r7, 0x0, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, 0x0) msgget$private(0x0, 0x0) msgget(0x0, 0x400) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={0x0}, 0x10) ioprio_get$pid(0x1, 0x0) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) 17:27:34 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:34 executing program 5: mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 17:27:34 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) 17:27:34 executing program 0: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x6c, 0x480000) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000180)={&(0x7f0000ffb000/0x4000)=nil, 0x7, 0x0, 0x87, &(0x7f0000ffd000/0x1000)=nil, 0x4}) r2 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x481, 0xa) ioctl$PPPIOCSMRU1(r3, 0x40047452, &(0x7f0000000300)) perf_event_open(&(0x7f0000001000)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0xc1105517, &(0x7f0000001000)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') preadv(r4, &(0x7f0000000c00)=[{&(0x7f0000000880)=""/169}, {&(0x7f0000000300)=""/13}, {&(0x7f0000000940)=""/220}, {&(0x7f00000004c0)=""/52}, {&(0x7f0000000a40)=""/244}, {&(0x7f0000000640)=""/55}, {&(0x7f0000000b40)=""/151}], 0x100000000000025d, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x402}, 0xc, &(0x7f0000000540)={&(0x7f0000001080)=ANY=[@ANYBLOB="0002000069dad8176227a84018807ca05d3bfe50c95984c23fddfe1839ed34030100f078dd54cb47f5d23f4c7ed71ad83592ebdf75568ef082912fb39e59f3d2ddc39fa3df186a09bf52ba4238ebfbde975cd741ee631ad88e8bade31662d66fe5ab4b0c007ceb2559af3a627c4e43d32de4e5a7163d242a339796c4ff49238a2a7fd618e63ec754fab69ed87d3a726c8e8ff3ab2b10ed4e4851837020041a2e2e1f780a6aeb008a8305d4af554a4c955572fde1191d70f4c1404b959a4bb7066f5ffa885b2767b0444e84339fe0809eab3268853a13468bc2507084340187d6569f26371b3dc5c83bacab9fb64801fe53e293", @ANYRES16=r5, @ANYBLOB="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"], 0x200}, 0x1, 0x0, 0x0, 0x24000001}, 0x84) r6 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r6, &(0x7f0000000000)={0x18, 0x0, {0x5, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r6, &(0x7f000000d180), 0x33b, 0x0) r7 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f00000000c0)={0xc, 0x0, 0x3800000000000000, 0x80000, r7}) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r7, 0x0, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, 0x0) msgget$private(0x0, 0x0) msgget(0x0, 0x400) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={0x0}, 0x10) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) 17:27:34 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:27:34 executing program 5: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) 17:27:34 executing program 5: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) 17:27:34 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) [ 121.635598] rdma_op ffff8880658dd298 conn xmit_rdma (null) 17:27:34 executing program 1: connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:35 executing program 5: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) 17:27:35 executing program 1: connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:35 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x6c, 0x480000) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000180)={&(0x7f0000ffb000/0x4000)=nil, 0x7, 0x0, 0x87, &(0x7f0000ffd000/0x1000)=nil, 0x4}) r2 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x481, 0xa) ioctl$PPPIOCSMRU1(r3, 0x40047452, &(0x7f0000000300)) perf_event_open(&(0x7f0000001000)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0xc1105517, &(0x7f0000001000)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') preadv(r4, &(0x7f0000000c00)=[{&(0x7f0000000880)=""/169}, {&(0x7f0000000300)=""/13}, {&(0x7f0000000940)=""/220}, {&(0x7f00000004c0)=""/52}, {&(0x7f0000000a40)=""/244}, {&(0x7f0000000640)=""/55}, {&(0x7f0000000b40)=""/151}], 0x100000000000025d, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x402}, 0xc, &(0x7f0000000540)={&(0x7f0000001080)=ANY=[@ANYBLOB="0002000069dad8176227a84018807ca05d3bfe50c95984c23fddfe1839ed34030100f078dd54cb47f5d23f4c7ed71ad83592ebdf75568ef082912fb39e59f3d2ddc39fa3df186a09bf52ba4238ebfbde975cd741ee631ad88e8bade31662d66fe5ab4b0c007ceb2559af3a627c4e43d32de4e5a7163d242a339796c4ff49238a2a7fd618e63ec754fab69ed87d3a726c8e8ff3ab2b10ed4e4851837020041a2e2e1f780a6aeb008a8305d4af554a4c955572fde1191d70f4c1404b959a4bb7066f5ffa885b2767b0444e84339fe0809eab3268853a13468bc2507084340187d6569f26371b3dc5c83bacab9fb64801fe53e293", @ANYRES16=r5, @ANYBLOB="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"], 0x200}, 0x1, 0x0, 0x0, 0x24000001}, 0x84) r6 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r6, &(0x7f0000000000)={0x18, 0x0, {0x5, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r6, &(0x7f000000d180), 0x33b, 0x0) r7 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f00000000c0)={0xc, 0x0, 0x3800000000000000, 0x80000, r7}) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r7, 0x0, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, 0x0) msgget$private(0x0, 0x0) msgget(0x0, 0x400) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={0x0}, 0x10) ioprio_get$pid(0x1, 0x0) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) 17:27:35 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) 17:27:35 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 17:27:35 executing program 1: connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:35 executing program 0: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x6c, 0x480000) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000180)={&(0x7f0000ffb000/0x4000)=nil, 0x7, 0x0, 0x87, &(0x7f0000ffd000/0x1000)=nil, 0x4}) r2 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x481, 0xa) ioctl$PPPIOCSMRU1(r3, 0x40047452, &(0x7f0000000300)) perf_event_open(&(0x7f0000001000)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0xc1105517, &(0x7f0000001000)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') preadv(r4, &(0x7f0000000c00)=[{&(0x7f0000000880)=""/169}, {&(0x7f0000000300)=""/13}, {&(0x7f0000000940)=""/220}, {&(0x7f00000004c0)=""/52}, {&(0x7f0000000a40)=""/244}, {&(0x7f0000000640)=""/55}, {&(0x7f0000000b40)=""/151}], 0x100000000000025d, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x402}, 0xc, &(0x7f0000000540)={&(0x7f0000001080)=ANY=[@ANYBLOB="0002000069dad8176227a84018807ca05d3bfe50c95984c23fddfe1839ed34030100f078dd54cb47f5d23f4c7ed71ad83592ebdf75568ef082912fb39e59f3d2ddc39fa3df186a09bf52ba4238ebfbde975cd741ee631ad88e8bade31662d66fe5ab4b0c007ceb2559af3a627c4e43d32de4e5a7163d242a339796c4ff49238a2a7fd618e63ec754fab69ed87d3a726c8e8ff3ab2b10ed4e4851837020041a2e2e1f780a6aeb008a8305d4af554a4c955572fde1191d70f4c1404b959a4bb7066f5ffa885b2767b0444e84339fe0809eab3268853a13468bc2507084340187d6569f26371b3dc5c83bacab9fb64801fe53e293", @ANYRES16=r5, @ANYBLOB="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"], 0x200}, 0x1, 0x0, 0x0, 0x24000001}, 0x84) r6 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r6, &(0x7f0000000000)={0x18, 0x0, {0x5, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r6, &(0x7f000000d180), 0x33b, 0x0) r7 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f00000000c0)={0xc, 0x0, 0x3800000000000000, 0x80000, r7}) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r7, 0x0, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, 0x0) msgget$private(0x0, 0x0) msgget(0x0, 0x400) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={0x0}, 0x10) ioprio_get$pid(0x1, 0x0) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) [ 122.241944] rdma_op ffff888063f91398 conn xmit_rdma (null) 17:27:35 executing program 4: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x6c, 0x480000) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000180)={&(0x7f0000ffb000/0x4000)=nil, 0x7, 0x0, 0x87, &(0x7f0000ffd000/0x1000)=nil, 0x4}) r2 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x481, 0xa) ioctl$PPPIOCSMRU1(r3, 0x40047452, &(0x7f0000000300)) perf_event_open(&(0x7f0000001000)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0xc1105517, &(0x7f0000001000)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') preadv(r4, &(0x7f0000000c00)=[{&(0x7f0000000880)=""/169}, {&(0x7f0000000300)=""/13}, {&(0x7f0000000940)=""/220}, {&(0x7f00000004c0)=""/52}, {&(0x7f0000000a40)=""/244}, {&(0x7f0000000640)=""/55}, {&(0x7f0000000b40)=""/151}], 0x100000000000025d, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x402}, 0xc, &(0x7f0000000540)={&(0x7f0000001080)=ANY=[@ANYBLOB="0002000069dad8176227a84018807ca05d3bfe50c95984c23fddfe1839ed34030100f078dd54cb47f5d23f4c7ed71ad83592ebdf75568ef082912fb39e59f3d2ddc39fa3df186a09bf52ba4238ebfbde975cd741ee631ad88e8bade31662d66fe5ab4b0c007ceb2559af3a627c4e43d32de4e5a7163d242a339796c4ff49238a2a7fd618e63ec754fab69ed87d3a726c8e8ff3ab2b10ed4e4851837020041a2e2e1f780a6aeb008a8305d4af554a4c955572fde1191d70f4c1404b959a4bb7066f5ffa885b2767b0444e84339fe0809eab3268853a13468bc2507084340187d6569f26371b3dc5c83bacab9fb64801fe53e293", @ANYRES16=r5, @ANYBLOB="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"], 0x200}, 0x1, 0x0, 0x0, 0x24000001}, 0x84) r6 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r6, &(0x7f0000000000)={0x18, 0x0, {0x5, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r6, &(0x7f000000d180), 0x33b, 0x0) r7 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f00000000c0)={0xc, 0x0, 0x3800000000000000, 0x80000, r7}) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r7, 0x0, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, 0x0) msgget$private(0x0, 0x0) msgget(0x0, 0x400) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={0x0}, 0x10) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) 17:27:35 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 17:27:35 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:35 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:27:35 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 17:27:35 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:35 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x6c, 0x480000) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000180)={&(0x7f0000ffb000/0x4000)=nil, 0x7, 0x0, 0x87, &(0x7f0000ffd000/0x1000)=nil, 0x4}) r2 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x481, 0xa) ioctl$PPPIOCSMRU1(r3, 0x40047452, &(0x7f0000000300)) perf_event_open(&(0x7f0000001000)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0xc1105517, &(0x7f0000001000)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') preadv(r4, &(0x7f0000000c00)=[{&(0x7f0000000880)=""/169}, {&(0x7f0000000300)=""/13}, {&(0x7f0000000940)=""/220}, {&(0x7f00000004c0)=""/52}, {&(0x7f0000000a40)=""/244}, {&(0x7f0000000640)=""/55}, {&(0x7f0000000b40)=""/151}], 0x100000000000025d, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x402}, 0xc, &(0x7f0000000540)={&(0x7f0000001080)=ANY=[@ANYBLOB="0002000069dad8176227a84018807ca05d3bfe50c95984c23fddfe1839ed34030100f078dd54cb47f5d23f4c7ed71ad83592ebdf75568ef082912fb39e59f3d2ddc39fa3df186a09bf52ba4238ebfbde975cd741ee631ad88e8bade31662d66fe5ab4b0c007ceb2559af3a627c4e43d32de4e5a7163d242a339796c4ff49238a2a7fd618e63ec754fab69ed87d3a726c8e8ff3ab2b10ed4e4851837020041a2e2e1f780a6aeb008a8305d4af554a4c955572fde1191d70f4c1404b959a4bb7066f5ffa885b2767b0444e84339fe0809eab3268853a13468bc2507084340187d6569f26371b3dc5c83bacab9fb64801fe53e293", @ANYRES16=r5, @ANYBLOB="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"], 0x200}, 0x1, 0x0, 0x0, 0x24000001}, 0x84) r6 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r6, &(0x7f0000000000)={0x18, 0x0, {0x5, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r6, &(0x7f000000d180), 0x33b, 0x0) r7 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f00000000c0)={0xc, 0x0, 0x3800000000000000, 0x80000, r7}) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r7, 0x0, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, 0x0) msgget$private(0x0, 0x0) msgget(0x0, 0x400) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={0x0}, 0x10) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) 17:27:36 executing program 0: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fanotify_init(0x4, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x840000000002, 0x3, 0xff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x04\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) 17:27:36 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x6c, 0x480000) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000180)={&(0x7f0000ffb000/0x4000)=nil, 0x7, 0x0, 0x87, &(0x7f0000ffd000/0x1000)=nil, 0x4}) r2 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x481, 0xa) ioctl$PPPIOCSMRU1(r3, 0x40047452, &(0x7f0000000300)) perf_event_open(&(0x7f0000001000)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0xc1105517, &(0x7f0000001000)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') preadv(r4, &(0x7f0000000c00)=[{&(0x7f0000000880)=""/169}, {&(0x7f0000000300)=""/13}, {&(0x7f0000000940)=""/220}, {&(0x7f00000004c0)=""/52}, {&(0x7f0000000a40)=""/244}, {&(0x7f0000000640)=""/55}, {&(0x7f0000000b40)=""/151}], 0x100000000000025d, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x402}, 0xc, &(0x7f0000000540)={&(0x7f0000001080)=ANY=[@ANYBLOB="0002000069dad8176227a84018807ca05d3bfe50c95984c23fddfe1839ed34030100f078dd54cb47f5d23f4c7ed71ad83592ebdf75568ef082912fb39e59f3d2ddc39fa3df186a09bf52ba4238ebfbde975cd741ee631ad88e8bade31662d66fe5ab4b0c007ceb2559af3a627c4e43d32de4e5a7163d242a339796c4ff49238a2a7fd618e63ec754fab69ed87d3a726c8e8ff3ab2b10ed4e4851837020041a2e2e1f780a6aeb008a8305d4af554a4c955572fde1191d70f4c1404b959a4bb7066f5ffa885b2767b0444e84339fe0809eab3268853a13468bc2507084340187d6569f26371b3dc5c83bacab9fb64801fe53e293", @ANYRES16=r5, @ANYBLOB="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"], 0x200}, 0x1, 0x0, 0x0, 0x24000001}, 0x84) r6 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r6, &(0x7f0000000000)={0x18, 0x0, {0x5, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r6, &(0x7f000000d180), 0x33b, 0x0) r7 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f00000000c0)={0xc, 0x0, 0x3800000000000000, 0x80000, r7}) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r7, 0x0, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, 0x0) msgget$private(0x0, 0x0) msgget(0x0, 0x400) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={0x0}, 0x10) ioprio_get$pid(0x1, 0x0) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) 17:27:36 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) [ 122.963447] audit: type=1400 audit(1568827656.102:43): avc: denied { create } for pid=7099 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 123.028861] bond0: Releasing backup interface bond_slave_1 [ 123.086529] audit: type=1400 audit(1568827656.152:44): avc: denied { ioctl } for pid=7099 comm="syz-executor.0" path="socket:[26350]" dev="sockfs" ino=26350 ioctlcmd=0x8991 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 17:27:36 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x4d, 0x0, 0x0) 17:27:36 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x04\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 17:27:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) 17:27:36 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x6c, 0x480000) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000180)={&(0x7f0000ffb000/0x4000)=nil, 0x7, 0x0, 0x87, &(0x7f0000ffd000/0x1000)=nil, 0x4}) r2 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x481, 0xa) ioctl$PPPIOCSMRU1(r3, 0x40047452, &(0x7f0000000300)) perf_event_open(&(0x7f0000001000)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0xc1105517, &(0x7f0000001000)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') preadv(r4, &(0x7f0000000c00)=[{&(0x7f0000000880)=""/169}, {&(0x7f0000000300)=""/13}, {&(0x7f0000000940)=""/220}, {&(0x7f00000004c0)=""/52}, {&(0x7f0000000a40)=""/244}, {&(0x7f0000000640)=""/55}, {&(0x7f0000000b40)=""/151}], 0x100000000000025d, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x402}, 0xc, &(0x7f0000000540)={&(0x7f0000001080)=ANY=[@ANYBLOB="0002000069dad8176227a84018807ca05d3bfe50c95984c23fddfe1839ed34030100f078dd54cb47f5d23f4c7ed71ad83592ebdf75568ef082912fb39e59f3d2ddc39fa3df186a09bf52ba4238ebfbde975cd741ee631ad88e8bade31662d66fe5ab4b0c007ceb2559af3a627c4e43d32de4e5a7163d242a339796c4ff49238a2a7fd618e63ec754fab69ed87d3a726c8e8ff3ab2b10ed4e4851837020041a2e2e1f780a6aeb008a8305d4af554a4c955572fde1191d70f4c1404b959a4bb7066f5ffa885b2767b0444e84339fe0809eab3268853a13468bc2507084340187d6569f26371b3dc5c83bacab9fb64801fe53e293", @ANYRES16=r5, @ANYBLOB="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"], 0x200}, 0x1, 0x0, 0x0, 0x24000001}, 0x84) r6 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r6, &(0x7f0000000000)={0x18, 0x0, {0x5, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r6, &(0x7f000000d180), 0x33b, 0x0) r7 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f00000000c0)={0xc, 0x0, 0x3800000000000000, 0x80000, r7}) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r7, 0x0, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, 0x0) msgget$private(0x0, 0x0) msgget(0x0, 0x400) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={0x0}, 0x10) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) [ 123.504704] syz-executor.4 (7131) used greatest stack depth: 24096 bytes left 17:27:36 executing program 3: 17:27:36 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:36 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1f3) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) 17:27:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0xffffff15) socket(0x840000000002, 0x3, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x04\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 17:27:36 executing program 2: unshare(0x24000400) r0 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) 17:27:36 executing program 2: 17:27:36 executing program 3: [ 123.649366] bond0: Releasing backup interface bond_slave_1 17:27:36 executing program 3: 17:27:36 executing program 2: 17:27:36 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) [ 123.703594] audit: type=1400 audit(1568827656.852:45): avc: denied { map } for pid=7138 comm="syz-executor.0" path="socket:[27078]" dev="sockfs" ino=27078 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=packet_socket permissive=1 17:27:36 executing program 2: r0 = memfd_create(&(0x7f0000000200)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x01\x00@\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00H3\xba1o\xad\xf0\xbc\x9d6\xe16\xb71\x88\x05\xbc\xf8-\xbf\xe7{&\x02\xb5\xb1\tB>\xb3\xa1\xdc(\x93\xe8\xb6\xfa\xd3\xcc>\x1a\x9e\xdc\x97j\xe0\xaa\x9c\xa8}NX\x95\xf9q(\x8ay\xd2\xac\xef\xfe\x9b\x14\xb4\x11/mk&\x00\xb2\xdcA\xc8\xbcg\b\xc6\x93\x88\x01\x94aj\xdd\xf6sz\xd0rmX\x85\x8e\x82\x99\xf3\xd8\x17R[t\xd1\xaa\xe2\t\xf7\xc3!\xc8l4\xde\x9c\xcf:\x1c\xaf\xa2\xcdxc', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x41) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r2, &(0x7f0000000000)=[{0x21, 0x0, 0x0, 0x0, @time, {}, {}, @control}], 0xff97) 17:27:37 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x6c, 0x480000) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000180)={&(0x7f0000ffb000/0x4000)=nil, 0x7, 0x0, 0x87, &(0x7f0000ffd000/0x1000)=nil, 0x4}) r2 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x481, 0xa) ioctl$PPPIOCSMRU1(r3, 0x40047452, &(0x7f0000000300)) perf_event_open(&(0x7f0000001000)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0xc1105517, &(0x7f0000001000)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') preadv(r4, &(0x7f0000000c00)=[{&(0x7f0000000880)=""/169}, {&(0x7f0000000300)=""/13}, {&(0x7f0000000940)=""/220}, {&(0x7f00000004c0)=""/52}, {&(0x7f0000000a40)=""/244}, {&(0x7f0000000640)=""/55}, {&(0x7f0000000b40)=""/151}], 0x100000000000025d, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x402}, 0xc, &(0x7f0000000540)={&(0x7f0000001080)=ANY=[@ANYBLOB="0002000069dad8176227a84018807ca05d3bfe50c95984c23fddfe1839ed34030100f078dd54cb47f5d23f4c7ed71ad83592ebdf75568ef082912fb39e59f3d2ddc39fa3df186a09bf52ba4238ebfbde975cd741ee631ad88e8bade31662d66fe5ab4b0c007ceb2559af3a627c4e43d32de4e5a7163d242a339796c4ff49238a2a7fd618e63ec754fab69ed87d3a726c8e8ff3ab2b10ed4e4851837020041a2e2e1f780a6aeb008a8305d4af554a4c955572fde1191d70f4c1404b959a4bb7066f5ffa885b2767b0444e84339fe0809eab3268853a13468bc2507084340187d6569f26371b3dc5c83bacab9fb64801fe53e293", @ANYRES16=r5, @ANYBLOB="00022dbd7000fddbdf251100000028000500080001007564700014000200080003000000008008000200080000000800010075647000540007000c000400080000000000000008000100060000000c0004007f0000000000000008000100ff7f0000080002005cadffff0c000300152e00000000000008000200200000000c00040004000000000000001400060004000200040002eea558b0429233f09d636c94e34a3b7a0008000100fdffffff100006000800010000000000040002004c000900080001000000008008000100040000000800010000000000080001000600000008000200c90d00000800010005000000080001008000000008000200e00000000800020004000000580007000c00030003000000000000000c000300129900000000000008000200010000000c00030003000000000000000c000300080000000000000008000100080000000c00030006000000000000000800010008000000a80004001c0007000800040000000100080002000700000008000200000000000c00010073797a31000000000c00010073797a30000000004c0007000800010001000000080001001b0000000800030008000000080001000f000000080004000400000008000200000b000008000400010000800800030000feffff08000100010000000c00010073797a31000000000c00010073797a31cf6f3bac660ead52fc2ef7c57f8c44bf450d38af2b8619f8a159651c705b555733ed609a6ba3561b55e9673fc375524630f0f1cd7da235c527c09e689f3e9fcde344ba9071e956468ac1dcfb51fbd856bb3fd907b845874aea827ac0bf2d958e77919187793e26e6b88ac89c9cce862a363a20d8238dba0d88247899ad09b10e60caf6c4107f220e2312a8f48085976f965391861d357445531d75c13b8b2c70a444b55b75ab3f5e80f072c4b08f854b490cc6411f26123a78c0244c41360e4eaf7032e552c3904b8d3e1cd033897787a53ea95057fcdf5b7819c27cfad1ec37490252f4c04dfbcf15f4f9cad332b729cf94d55fdd67928d156f15b5d89023c219b64f18e1773dda60e1b6a07aeabf56731e756bff4cd0"], 0x200}, 0x1, 0x0, 0x0, 0x24000001}, 0x84) r6 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r6, &(0x7f0000000000)={0x18, 0x0, {0x5, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r6, &(0x7f000000d180), 0x33b, 0x0) r7 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f00000000c0)={0xc, 0x0, 0x3800000000000000, 0x80000, r7}) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r7, 0x0, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, 0x0) msgget$private(0x0, 0x0) msgget(0x0, 0x400) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={0x0}, 0x10) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) 17:27:37 executing program 3: 17:27:37 executing program 2: 17:27:37 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:37 executing program 4: 17:27:37 executing program 0: 17:27:37 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r0, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000c00)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="500000002e00014700a490d3f85d460400000000", @ANYRES32=r2, @ANYBLOB="0000000000000000060000000800010075333200240002000c000600080004000000000014000500000000000000000000000000fffffffb"], 0x50}}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x4924924924924f0, 0x0) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 17:27:37 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getegid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1f}) 17:27:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000400)="11dc25055e62cfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a0662bc45ff810500000000000058000b480400945f64009400050028925ac9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 17:27:37 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:37 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffa, 0x0) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, 0x0) utimes(0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = gettid() fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000080)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x800, 0x0) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000240)='security.ima\x00', &(0x7f0000000280)=@sha1={0x1, "26352c449b716c772d24dd49854ec047efa138c1"}, 0x15, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) tkill(r1, 0x1000000000016) 17:27:37 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) [ 124.178845] rdma_op ffff8880620715d8 conn xmit_rdma (null) [ 124.247022] rdma_op ffff88806223d618 conn xmit_rdma (null) 17:27:37 executing program 5: 17:27:37 executing program 0: 17:27:37 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:37 executing program 2: 17:27:37 executing program 3: 17:27:37 executing program 4: 17:27:37 executing program 4: 17:27:37 executing program 2: 17:27:37 executing program 3: 17:27:37 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:37 executing program 0: 17:27:37 executing program 5: 17:27:37 executing program 2: 17:27:37 executing program 3: 17:27:37 executing program 4: 17:27:37 executing program 0: 17:27:37 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:37 executing program 5: 17:27:37 executing program 2: 17:27:37 executing program 3: 17:27:37 executing program 4: 17:27:37 executing program 0: 17:27:37 executing program 5: 17:27:37 executing program 3: 17:27:37 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:37 executing program 4: 17:27:37 executing program 2: 17:27:37 executing program 5: 17:27:37 executing program 0: 17:27:37 executing program 4: 17:27:38 executing program 3: 17:27:38 executing program 0: 17:27:38 executing program 2: 17:27:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:38 executing program 5: 17:27:38 executing program 4: 17:27:38 executing program 3: 17:27:38 executing program 2: 17:27:38 executing program 0: 17:27:38 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000001340)='/dev/loop#\x00', 0x0, 0x0) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f0000000000)) pipe(0x0) open(0x0, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000140)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 17:27:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)="11dc25055e62cfe47bf070") r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a0662bc45ff810500000000000058000b480400945f64009400050028925ac9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 17:27:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0x138, 0x1a, 0x301, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev, 0x0, 0x3c}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x138}}, 0x0) 17:27:38 executing program 3: r0 = open(&(0x7f0000000240)='./file0\x00', 0x20141042, 0x0) write$selinux_attr(r0, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) 17:27:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) 17:27:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0x138, 0x1a, 0x301, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev, 0x0, 0x3c}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x138}}, 0x0) 17:27:38 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x6000802102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udp(0x2, 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$poke(0x7, r0, 0x0, 0x40) 17:27:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0x138, 0x1a, 0x301, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev, 0x0, 0x3c}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x138}}, 0x0) 17:27:38 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r5, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r6, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x10}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r6, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000ac0)=""/146) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000640)={0x7fffffff, 0x8, 0x4, 0x4, 0x4, 0x4}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x1b, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000680)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r7 = getpid() sched_setscheduler(r7, 0x8, &(0x7f0000000080)=0x20) fcntl$addseals(0xffffffffffffffff, 0x409, 0x80080) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f00000003c0)={0x20000002}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000280)=[@increfs_done], 0xfffffe61, 0x0, 0x0}) 17:27:38 executing program 3: keyctl$update(0x2, 0x0, 0x0, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net\x00', 0x200002, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x8000, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, 0x0, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r2, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x4) 17:27:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 17:27:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) 17:27:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0x138, 0x1a, 0x301, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev, 0x0, 0x3c}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x138}}, 0x0) [ 125.269628] audit: type=1400 audit(1568827658.412:46): avc: denied { map } for pid=7326 comm="syz-executor.0" path="/dev/binder0" dev="devtmpfs" ino=15379 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 125.275235] binder: 7326:7334 ioctl c018620b 0 returned -14 17:27:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) mq_notify(r0, 0x0) 17:27:38 executing program 2: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0x138, 0x1a, 0x301, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev, 0x0, 0x3c}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x138}}, 0x0) 17:27:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)={'syz1', "8aa89822f3f461a8"}, 0x3) [ 125.345651] binder: 7326:7342 unknown command -549428468 [ 125.373176] binder: 7326:7342 ioctl c0306201 20000140 returned -22 17:27:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@dev}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'cbc(aes)\x00'}}}]}, 0x138}}, 0x0) [ 125.389754] audit: type=1400 audit(1568827658.532:47): avc: denied { set_context_mgr } for pid=7326 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 125.422643] binder: 7326:7342 ioctl c0306201 200002c0 returned -14 17:27:38 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r5, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r6, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x10}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r6, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000ac0)=""/146) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000640)={0x7fffffff, 0x8, 0x4, 0x4, 0x4, 0x4}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x1b, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000680)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r7 = getpid() sched_setscheduler(r7, 0x8, &(0x7f0000000080)=0x20) fcntl$addseals(0xffffffffffffffff, 0x409, 0x80080) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f00000003c0)={0x20000002}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000280)=[@increfs_done], 0xfffffe61, 0x0, 0x0}) [ 125.517810] audit: type=1326 audit(1568827658.662:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7353 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c72a code=0xffff0000 [ 125.526725] binder: 7367:7369 ioctl c018620b 0 returned -14 [ 125.576081] binder: 7367:7369 unknown command -549428468 [ 125.582902] binder: 7367:7369 ioctl c0306201 20000140 returned -22 [ 125.592725] binder: BINDER_SET_CONTEXT_MGR already set [ 125.598226] binder: 7367:7369 ioctl 40046207 0 returned -16 [ 125.609276] audit: type=1400 audit(1568827658.752:49): avc: denied { call } for pid=7367 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 125.622775] binder: 7367:7369 ioctl c0306201 200002c0 returned -14 [ 125.631746] audit: type=1400 audit(1568827658.752:50): avc: denied { transfer } for pid=7367 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 126.240853] audit: type=1326 audit(1568827659.392:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7353 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c72a code=0xffff0000 17:27:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, 0x0, 0x0) 17:27:41 executing program 2: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0x138, 0x1a, 0x301, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev, 0x0, 0x3c}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x138}}, 0x0) 17:27:41 executing program 4: syz_open_dev$vbi(0x0, 0x2, 0x2) sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:27:41 executing program 5: syz_emit_ethernet(0x1b2, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:41 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r5, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r6, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x10}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r6, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000ac0)=""/146) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000640)={0x7fffffff, 0x8, 0x4, 0x4, 0x4, 0x4}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x1b, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000680)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r7 = getpid() sched_setscheduler(r7, 0x8, &(0x7f0000000080)=0x20) fcntl$addseals(0xffffffffffffffff, 0x409, 0x80080) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f00000003c0)={0x20000002}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000280)=[@increfs_done], 0xfffffe61, 0x0, 0x0}) 17:27:41 executing program 3: syz_open_dev$mice(0x0, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) 17:27:41 executing program 2: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0x138, 0x1a, 0x301, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev, 0x0, 0x3c}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x138}}, 0x0) 17:27:41 executing program 5: syz_emit_ethernet(0x1b2, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb978d0ee0ff568247a1e595410dedde618f31089400e07a13d04ba73386183d0641a561a9d6bb07d47b9795c6e6fe5a2076839bcddf90239a4addd55a33cddfef06b8277e36933841cd05268e9b9b0f3147388ff40f4351d858b94108738a7e39a3f54cdcb43e06aa4091c19524c8f0277e9030ae25f8958dec3e51c44d00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, 0x0, 0x0) [ 128.203245] rdma_op ffff88808d4957d8 conn xmit_rdma (null) [ 128.234431] binder: 7387:7394 ioctl c018620b 0 returned -14 17:27:41 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0x138, 0x1a, 0x301, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev, 0x0, 0x3c}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x138}}, 0x0) 17:27:41 executing program 5: syz_emit_ethernet(0x1b2, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb978d0ee0ff568247a1e595410dedde618f31089400e07a13d04ba73386183d0641a561a9d6bb07d47b9795c6e6fe5a2076839bcddf90239a4addd55a33cddfef06b8277e36933841cd05268e9b9b0f3147388ff40f4351d858b94108738a7e39a3f54cdcb43e06aa4091c19524c8f0277e9030ae25f8958dec3e51c44d00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5080000090780000bb8abd88199b6fea523c82cb56fc427fbb2e0dc731cb1112e2d2e9392cd27af305bc97cfe739752000f3f74142cacffd94d36ee4aa353c5ef3b7272a38877464774b2984254e798d9d7e94069b55f547133abc06cfeff6e6d41f24cba8ebdbceb432b4b6484e80320296816694c382c02a61e732682cc6d344c1fa8738056cc06ca7ce836cc81f890aeb9998ef5ad91fcd0781aa2100ad692cec302abfa8dd8587977667692c70d8a05ce4ee1811dcb006e38e1b2b4a3d42958aee3db1faef60e3553335f4383d16e33e492d6874a03b0f9bc863f423b07ae97c70d2bc3e73947e5df5c3a27295ed4e13dfceace5ea91a3f837ed26236d97bd58c49c67321ed4d084c26abd64846a681306947cc18c44453845d9239670f52d112a4741d071bd173d7719d626969e49b64b638c4bf99d2ad5f868a5b4164dbea58a061bf7a46167067628619b4cc2ed56ebbb3875bc44"], 0x0) 17:27:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f0000003300)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0, 0x0, 0x0, 0x0, 0x0, 0x9effffff]}, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe904]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2578}}}, 0xb8}}, 0x0) 17:27:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, 0x0, 0x0) [ 128.258148] binder: 7387:7394 unknown command -549428468 [ 128.285637] binder: 7387:7394 ioctl c0306201 20000140 returned -22 17:27:41 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0x138, 0x1a, 0x301, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev, 0x0, 0x3c}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x138}}, 0x0) [ 128.349468] binder: BINDER_SET_CONTEXT_MGR already set [ 128.355885] binder: 7387:7394 ioctl 40046207 0 returned -16 [ 128.407742] binder: 7387:7394 ioctl c0306201 200002c0 returned -14 17:27:41 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0xffffffff80000001) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='vcan0\x00', 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000440)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x2e}, 0x98) 17:27:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1'}, 0x4) 17:27:41 executing program 5: syz_emit_ethernet(0x1b2, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:41 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x1d2, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xcd}, {&(0x7f00000000c0)=""/85, 0x6d6}, {&(0x7f00000024c0)=""/4096, 0xc01}, {&(0x7f00000006c0)=""/120, 0xfffffffb}, {&(0x7f0000000000)=""/60, 0xc6}, {&(0x7f0000000400)=""/77, 0xffffffdc}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xffffffffffffff40}], 0x3, &(0x7f0000000600)=""/191, 0xffffffffffffff32}}], 0x4000000000002a8, 0x6, &(0x7f0000003700)={0x77359400}) 17:27:41 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r5, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r6, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x10}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r6, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000ac0)=""/146) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000640)={0x7fffffff, 0x8, 0x4, 0x4, 0x4, 0x4}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x1b, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000680)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r7 = getpid() sched_setscheduler(r7, 0x8, &(0x7f0000000080)=0x20) fcntl$addseals(0xffffffffffffffff, 0x409, 0x80080) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f00000003c0)={0x20000002}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000280)=[@increfs_done], 0xfffffe61, 0x0, 0x0}) 17:27:41 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0x138, 0x1a, 0x301, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev, 0x0, 0x3c}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x138}}, 0x0) 17:27:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1'}, 0x4) 17:27:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 17:27:41 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) [ 128.528993] binder: 7437:7443 ioctl c018620b 0 returned -14 [ 128.565210] binder: 7437:7443 unknown command -549428468 17:27:41 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) 17:27:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1'}, 0x4) 17:27:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) [ 128.602684] binder: 7437:7443 ioctl c0306201 20000140 returned -22 [ 128.620161] binder: BINDER_SET_CONTEXT_MGR already set [ 128.629449] binder: 7437:7459 ioctl 40046207 0 returned -16 [ 128.673683] binder: 7437:7443 ioctl c0306201 200002c0 returned -14 17:27:41 executing program 4: 17:27:41 executing program 3: semop(0x0, 0x0, 0x3b) 17:27:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 17:27:41 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) 17:27:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822"}, 0x8) 17:27:41 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r5, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r6, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x10}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r6, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000ac0)=""/146) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000640)={0x7fffffff, 0x8, 0x4, 0x4, 0x4, 0x4}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x1b, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000680)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r7 = getpid() sched_setscheduler(r7, 0x8, &(0x7f0000000080)=0x20) fcntl$addseals(0xffffffffffffffff, 0x409, 0x80080) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f00000003c0)={0x20000002}) 17:27:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822"}, 0x8) 17:27:41 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344], 0x0) 17:27:42 executing program 4: 17:27:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 17:27:42 executing program 3: 17:27:42 executing program 4: [ 128.855782] binder: 7482:7487 ioctl c018620b 0 returned -14 [ 128.886281] binder: 7482:7487 unknown command -549428468 17:27:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822"}, 0x8) 17:27:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 17:27:42 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344], 0x0) 17:27:42 executing program 3: 17:27:42 executing program 4: [ 128.933655] binder: 7482:7487 ioctl c0306201 20000140 returned -22 [ 128.989187] binder: BINDER_SET_CONTEXT_MGR already set 17:27:42 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb978d0ee0ff568247a1e595410dedde618f31089400e07a13d04ba73386183d0641a561a9d6bb07d47b9795c6e6fe5a2076839bcddf90239a4addd55a33cddfef06b8277e36933841cd05268e9b9b0f3147388ff40f4351d858b94108738a7e39a3f54cdcb43e06aa4091c19524c8f0277e9030ae25f8958dec3e51c44d00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344], 0x0) 17:27:42 executing program 3: 17:27:42 executing program 4: 17:27:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 17:27:42 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r5, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r6, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x10}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r6, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000ac0)=""/146) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000640)={0x7fffffff, 0x8, 0x4, 0x4, 0x4, 0x4}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x1b, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000680)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r7 = getpid() sched_setscheduler(r7, 0x8, &(0x7f0000000080)=0x20) fcntl$addseals(0xffffffffffffffff, 0x409, 0x80080) 17:27:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f4"}, 0xa) [ 129.012791] binder: 7482:7487 ioctl 40046207 0 returned -16 [ 129.043148] binder: unexpected work type, 4, not freed 17:27:42 executing program 4: 17:27:42 executing program 3: 17:27:42 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB], 0x0) 17:27:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) 17:27:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f4"}, 0xa) [ 129.184507] binder: 7526:7531 ioctl c018620b 0 returned -14 [ 129.219648] binder: 7526:7531 unknown command -549428468 17:27:42 executing program 3: 17:27:42 executing program 4: 17:27:42 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB], 0x0) 17:27:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) [ 129.243330] binder: 7526:7531 ioctl c0306201 20000140 returned -22 [ 129.273871] binder: BINDER_SET_CONTEXT_MGR already set 17:27:42 executing program 4: [ 129.305726] binder: 7526:7546 ioctl 40046207 0 returned -16 [ 129.337561] binder: unexpected work type, 4, not freed 17:27:42 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r5, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r6, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x10}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r6, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000ac0)=""/146) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000640)={0x7fffffff, 0x8, 0x4, 0x4, 0x4, 0x4}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x1b, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000680)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r7 = getpid() sched_setscheduler(r7, 0x8, &(0x7f0000000080)=0x20) 17:27:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f4"}, 0xa) 17:27:42 executing program 3: 17:27:42 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB], 0x0) 17:27:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) 17:27:42 executing program 4: 17:27:42 executing program 4: 17:27:42 executing program 3: [ 129.455402] binder: 7571:7573 ioctl c018620b 0 returned -14 [ 129.471920] binder: 7571:7573 unknown command -549428468 17:27:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461"}, 0xb) 17:27:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0x138, 0x1a, 0x0, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev, 0x0, 0x3c}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x138}}, 0x0) 17:27:42 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5080000090780000bb8abd88199b6fea523c82cb56fc427fbb2e0dc731cb1112e2d2e9392cd27af305bc97cfe739752000f3f74142cacffd94d36ee4aa353c5ef3b7272a38877464774b2984254e798d9d7e94069b55f547133abc06cfeff6e6d41f24cba8ebdbceb432b4b6484e80320296816694c382c02a61e732682cc6d344c1fa8738056cc06ca7ce836cc81f890aeb9998ef5ad91fcd0781aa2100ad692cec302abfa8dd8587977667"], 0x0) 17:27:42 executing program 4: [ 129.497618] binder: 7571:7573 ioctl c0306201 20000140 returned -22 [ 129.539113] binder: BINDER_SET_CONTEXT_MGR already set [ 129.568871] binder: 7571:7582 ioctl 40046207 0 returned -16 17:27:42 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r5, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r6, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x10}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r6, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000ac0)=""/146) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000640)={0x7fffffff, 0x8, 0x4, 0x4, 0x4, 0x4}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x1b, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000680)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() 17:27:42 executing program 4: 17:27:42 executing program 3: 17:27:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461"}, 0xb) 17:27:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0x138, 0x1a, 0x0, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev, 0x0, 0x3c}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x138}}, 0x0) 17:27:42 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5080000090780000bb8abd88199b6fea523c82cb56fc427fbb2e0dc731cb1112e2d2e9392cd27af305bc97cfe739752000f3f74142cacffd94d36ee4aa353c5ef3b7272a38877464774b2984254e798d9d7e94069b55f547133abc06cfeff6e6d41f24cba8ebdbceb432b4b6484e80320296816694c382c02a61e732682cc6d344c1fa8738056cc06ca7ce836cc81f890aeb9998ef5ad91fcd0781aa2100ad692cec302abfa8dd8587977667"], 0x0) [ 129.620688] binder: unexpected work type, 4, not freed 17:27:42 executing program 4: 17:27:42 executing program 3: 17:27:42 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5080000090780000bb8abd88199b6fea523c82cb56fc427fbb2e0dc731cb1112e2d2e9392cd27af305bc97cfe739752000f3f74142cacffd94d36ee4aa353c5ef3b7272a38877464774b2984254e798d9d7e94069b55f547133abc06cfeff6e6d41f24cba8ebdbceb432b4b6484e80320296816694c382c02a61e732682cc6d344c1fa8738056cc06ca7ce836cc81f890aeb9998ef5ad91fcd0781aa2100ad692cec302abfa8dd8587977667"], 0x0) 17:27:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "8aa89822f3f461"}, 0xb) 17:27:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0x138, 0x1a, 0x0, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev, 0x0, 0x3c}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x138}}, 0x0) 17:27:42 executing program 4: [ 129.727268] binder: 7604:7608 ioctl c018620b 0 returned -14 [ 129.764519] binder: 7604:7608 unknown command -549428468 [ 129.808894] binder: 7604:7608 ioctl c0306201 20000140 returned -22 [ 129.847634] binder: BINDER_SET_CONTEXT_MGR already set 17:27:43 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r5, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r6, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x10}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r6, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000ac0)=""/146) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000640)={0x7fffffff, 0x8, 0x4, 0x4, 0x4, 0x4}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x1b, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000680)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 17:27:43 executing program 3: 17:27:43 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:43 executing program 1: 17:27:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0x138, 0x1a, 0x301, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x138}}, 0x0) 17:27:43 executing program 4: 17:27:43 executing program 3: [ 129.861555] binder: 7604:7608 ioctl 40046207 0 returned -16 17:27:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0x138, 0x1a, 0x301, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x138}}, 0x0) 17:27:43 executing program 4: 17:27:43 executing program 1: [ 129.918316] binder: unexpected work type, 4, not freed [ 129.924007] binder: 7631:7634 ioctl c018620b 0 returned -14 17:27:43 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:43 executing program 3: [ 129.985551] binder: 7631:7634 unknown command -549428468 [ 130.037347] binder: 7631:7634 ioctl c0306201 20000140 returned -22 [ 130.059932] binder: BINDER_SET_CONTEXT_MGR already set 17:27:43 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r5, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r6, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x10}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r6, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000ac0)=""/146) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000640)={0x7fffffff, 0x8, 0x4, 0x4, 0x4, 0x4}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x1b, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000680)) 17:27:43 executing program 4: 17:27:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0x138, 0x1a, 0x301, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x138}}, 0x0) 17:27:43 executing program 3: 17:27:43 executing program 1: 17:27:43 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 130.089766] binder: 7631:7650 ioctl 40046207 0 returned -16 [ 130.128310] binder: unexpected work type, 4, not freed 17:27:43 executing program 3: 17:27:43 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:43 executing program 4: 17:27:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0x138, 0x1a, 0x301, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev, 0x0, 0x3c}, @in6=@empty}, [@algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x138}}, 0x0) 17:27:43 executing program 1: [ 130.154388] binder: 7656:7663 ioctl c018620b 0 returned -14 17:27:43 executing program 3: [ 130.236132] binder: 7656:7663 unknown command -549428468 [ 130.282852] binder: BINDER_SET_CONTEXT_MGR already set [ 130.288199] binder: 7656:7667 ioctl 40046207 0 returned -16 [ 130.294028] binder: 7656:7663 ioctl c0306201 20000140 returned -22 17:27:43 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r5, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r6, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x10}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r6, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000ac0)=""/146) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000640)={0x7fffffff, 0x8, 0x4, 0x4, 0x4, 0x4}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x1b, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) 17:27:43 executing program 4: 17:27:43 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0x138, 0x1a, 0x301, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev, 0x0, 0x3c}, @in6=@empty}, [@algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x138}}, 0x0) 17:27:43 executing program 1: 17:27:43 executing program 3: [ 130.345250] binder: unexpected work type, 4, not freed 17:27:43 executing program 4: 17:27:43 executing program 1: 17:27:43 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb978d0ee0ff568247a1e595410dedde618f31089400e07a13d04ba73386183d0641a561a9d6bb07d47b9795c6e6fe5a2076839bcddf90239a4addd55a33cddfef06b8277e36933841cd05268e9b9b0f3147388ff40f4351d858b94108738a7e39a3f54cdcb43e06aa4091c19524c8f0277e9030ae25f8958dec3e51c44d00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5080000090780000bb8abd88199b6fea523c82cb56fc427fbb2e0dc731cb1112e2d2e9392cd27af305bc97cfe739752000f3f74142cacffd94d36ee4aa353c5ef3b7272a38877464774b2984254e798d9d7e94069b55f547133abc06cfeff6e6d41f24cba8ebdbceb432b4b6484e80320296816694c382c02a61e732682cc6d344c1fa8738056cc06ca7ce836cc81f890aeb9998ef5ad91fcd0781aa2100ad692cec302abfa8dd8587977667692c70d8a05ce4ee1811dcb006e38e1b2b4a3d42958aee3db1faef60e3553335f4383d16e33e492d6874a03b0f9bc863f423b07ae97c70d2bc3e73947e5df5c3a27295ed4e13dfceace5ea91a3f837ed26236d97bd58c49c67321ed4d084c26abd64846a681306947cc18c44453845d9239670f52d112a4741d071bd173d7719d6"], 0x0) 17:27:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0x138, 0x1a, 0x301, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev, 0x0, 0x3c}, @in6=@empty}, [@algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x138}}, 0x0) 17:27:43 executing program 3: 17:27:43 executing program 1: [ 130.455969] binder: 7691:7693 ioctl c018620b 0 returned -14 17:27:43 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r5, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r6, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x10}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r6, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000ac0)=""/146) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000640)={0x7fffffff, 0x8, 0x4, 0x4, 0x4, 0x4}) 17:27:43 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5080000090780000bb8abd88199b6fea523c82cb56fc427fbb2e0dc731cb1112e2d2e9392cd27af305bc97cfe739752000f3f74142cacffd94d36ee4aa353c5ef3b7272a38877464774b2984254e798d9d7e94069b55f547133abc06cfeff6e6d41f24cba8ebdbceb432b4b6484e80320296816694c382c02a61e732682cc6d344c1fa8738056cc06ca7ce836cc81f890aeb9998ef5ad91fcd0781aa2100ad692cec302abfa8dd8587977667692c70d8a05ce4ee1811dcb006e38e1b2b4a3d42958aee3db1faef60e3553335f4383d16e33e492d6874a03b0f9bc863f423b07ae97c70d2bc3e73947e5df5c3a27295ed4e13dfceace5ea91a3f837ed26236d97bd58c49c67321ed4d084c26abd64846a681306947cc18c44453845d9239670f52d112a4741d071bd173d7719d626969e49b64b638c4bf99d2ad5f868a5b4164dbea58a"], 0x0) 17:27:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0xf0, 0x1a, 0x301, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev, 0x0, 0x3c}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 17:27:43 executing program 4: 17:27:43 executing program 3: 17:27:43 executing program 1: [ 130.518784] binder: 7691:7693 unknown command -549428468 [ 130.538725] binder: 7691:7693 ioctl c0306201 20000140 returned -22 [ 130.559286] binder: unexpected work type, 4, not freed 17:27:43 executing program 3: 17:27:43 executing program 4: 17:27:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0xf0, 0x1a, 0x301, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev, 0x0, 0x3c}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 17:27:43 executing program 1: 17:27:43 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 130.644301] binder: 7718:7721 ioctl c018620b 0 returned -14 [ 130.672564] binder: 7718:7721 unknown command -549428468 17:27:43 executing program 4: [ 130.717133] binder: 7718:7721 ioctl c0306201 20000140 returned -22 [ 130.741524] binder: BINDER_SET_CONTEXT_MGR already set 17:27:43 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r5, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r6, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x10}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r6, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000ac0)=""/146) 17:27:43 executing program 3: 17:27:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=@updsa={0xf0, 0x1a, 0x301, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}, {@in6=@dev, 0x0, 0x3c}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 17:27:43 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:43 executing program 1: 17:27:43 executing program 4: [ 130.787470] binder: 7718:7734 ioctl 40046207 0 returned -16 17:27:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) set_mempolicy(0x0, &(0x7f0000000100), 0x0) 17:27:44 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @ipv4, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 17:27:44 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5080000090780000bb8abd88199b6fea523c82cb56fc427fbb2e0dc731cb1112e2d2e9392cd27af305bc97cfe739752000f3f74142cacffd94d36ee4aa353c5ef3b7272a38877464774b2984254e798d9d7e94069b55f547133abc06cfeff6e6d41f24cba8ebdbceb432b4b6484e80320296816694c382c02a61e732682cc6d344c1fa8738056cc06ca7ce836cc81f890aeb9998ef5ad91fcd0781aa2100ad692cec302abfa8dd8587977667692c70d8a05ce4ee1811dcb006e38e1b2b4a3d42958aee3db1faef60e3553335f4383d16e33e492d6874a03b0f9bc863f423b07ae97c70d2bc3e73947e5df5c3a27295ed4e13dfceace5ea91a3f837ed26236d97bd58c49c67321ed4d084c26abd64846a681306947cc18c44453845d9239670f52d112a4741d071bd173d7719d626969e49b64b638c4bf99d2ad5f868a5b4164dbea58a061bf7a46167067628619b"], 0x0) 17:27:44 executing program 4: 17:27:44 executing program 2: [ 130.906233] binder: 7748:7751 ioctl c018620b 0 returned -14 [ 130.942297] binder: 7748:7751 unknown command -549428468 17:27:44 executing program 2: [ 130.968041] binder: 7748:7751 ioctl c0306201 20000140 returned -22 [ 130.988447] syz-executor.1 (7761) used greatest stack depth: 23856 bytes left [ 131.001747] binder: BINDER_SET_CONTEXT_MGR already set 17:27:44 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r5, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r6, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x10}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r6, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) 17:27:44 executing program 1: 17:27:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x20032600) 17:27:44 executing program 3: r0 = memfd_create(&(0x7f0000000000)='b\n\x00\x00\x00', 0x5) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x45011, r0, 0x0) 17:27:44 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb978d0ee0ff568247a1e595410dedde618f31089400e07a13d04ba73386183d0641a561a9d6bb07d47b9795c6e6fe5a2076839bcddf90239a4addd55a33cddfef06b8277e36933841cd05268e9b9b0f3147388ff40f4351d858b94108738a7e39a3f54cdcb43e06aa4091c19524c8f0277e9030ae25f8958dec3e51c44d00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 131.019798] binder: 7748:7751 ioctl 40046207 0 returned -16 17:27:44 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000001001000301000000434b1a0ecccf80a7"], 0x18}}], 0x1, 0x0) 17:27:44 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:44 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:27:44 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 17:27:44 executing program 1: socket$inet(0x2, 0x3, 0x7) socket$inet(0x2, 0x3, 0x7) memfd_create(&(0x7f0000000300)='\b\xe1m1#+\x00\x03ks\x1bJ\xf1QX\xd2\xe9\xca\x8fh\xe4\x85\x8f\xea\xe0\x8d\xa1\x84\xc2\x0eJ\'\xbc\xf414\xbff\xcb0\x8d\xc5\x8f\x15\x11\xb13?UNI\xb2\x91\xcff\xe1e\xb1\xbe\x95\x9d_\xc6\xa6\xaf^a[\xd6\xea\x15K\xf5*\xc3\xa8k\x8d\x19V\xcc\x9d\xef\x9c\xc8\x1a\bMA\x97\x01\x81`\x8eK\x9e\xe1\x8a\xbe', 0x4) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() pipe(&(0x7f0000000400)={0xffffffffffffffff}) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') [ 131.102340] audit: type=1400 audit(1568827664.252:52): avc: denied { map } for pid=7774 comm="syz-executor.3" path=2F6D656D66643A620A202864656C6574656429 dev="hugetlbfs" ino=29363 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 17:27:44 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 131.188142] binder: 7781:7788 ioctl c018620b 0 returned -14 [ 131.217538] binder: 7781:7788 unknown command -549428468 [ 131.223388] binder: 7781:7788 ioctl c0306201 20000140 returned -22 [ 131.232609] binder: BINDER_SET_CONTEXT_MGR already set 17:27:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x100000000004}, 0x1c) connect(r0, &(0x7f00000001c0)=@in={0x2, 0x0, @local}, 0x80) [ 131.247539] binder: 7781:7788 ioctl 40046207 0 returned -16 17:27:44 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r5, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r6, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x10}], 0x1, 0x0, 0x100}, 0x0) 17:27:44 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 131.317667] binder: 7807:7809 ioctl c018620b 0 returned -14 [ 131.332417] binder: 7807:7809 unknown command -549428468 17:27:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x28}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 17:27:44 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x3) 17:27:44 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:44 executing program 4: clone(0x4211ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 131.411127] binder: 7807:7809 ioctl c0306201 20000140 returned -22 [ 131.438087] binder: BINDER_SET_CONTEXT_MGR already set [ 131.448597] binder: 7807:7809 ioctl 40046207 0 returned -16 17:27:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43111, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0xffffffffffff0001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:27:44 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r5, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r6, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) 17:27:44 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 131.642138] binder: 7833:7838 ioctl c018620b 0 returned -14 [ 131.685359] binder: 7833:7838 unknown command -549428468 [ 131.694313] binder: 7833:7838 ioctl c0306201 20000140 returned -22 [ 131.702067] binder: BINDER_SET_CONTEXT_MGR already set [ 131.707408] binder: 7833:7838 ioctl 40046207 0 returned -16 17:27:45 executing program 1: socket$inet(0x2, 0x3, 0x7) socket$inet(0x2, 0x3, 0x7) memfd_create(&(0x7f0000000300)='\b\xe1m1#+\x00\x03ks\x1bJ\xf1QX\xd2\xe9\xca\x8fh\xe4\x85\x8f\xea\xe0\x8d\xa1\x84\xc2\x0eJ\'\xbc\xf414\xbff\xcb0\x8d\xc5\x8f\x15\x11\xb13?UNI\xb2\x91\xcff\xe1e\xb1\xbe\x95\x9d_\xc6\xa6\xaf^a[\xd6\xea\x15K\xf5*\xc3\xa8k\x8d\x19V\xcc\x9d\xef\x9c\xc8\x1a\bMA\x97\x01\x81`\x8eK\x9e\xe1\x8a\xbe', 0x4) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() pipe(&(0x7f0000000400)={0xffffffffffffffff}) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:27:45 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fstat(r0, &(0x7f00000003c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) 17:27:45 executing program 2: clone(0x8000100000201, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) execve(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) mknod$loop(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) accept$unix(r2, 0x0, 0x0) 17:27:45 executing program 3: clone(0x8000100000203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) mknod(&(0x7f0000000000)='./file1\x00', 0xc808, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) execve(&(0x7f00000001c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) close(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f00000000c0)='./file0\x00', 0x841, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, 0x0) 17:27:45 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:45 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r5, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r6, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) 17:27:45 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb978d0ee0ff568247a1e595410dedde618f31089400e07a13d04ba73386183d0641a561a9d6bb07d47b9795c6e6fe5a2076839bcddf90239a4addd55a33cddfef06b8277e36933841cd05268e9b9b0f3147388ff40f4351d858b94108738a7e39a3f54cdcb43e06aa4091c19524c8f0277e9030ae25f8958dec3e51c44d00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5080000090780000bb8abd88199b6fea523c82cb56fc427fbb2e0dc731cb1112e2d2e9392cd27af305bc97cfe739752000f3f74142cacffd94d36ee4aa353c5ef3b7272a38877464774b2984254e798d9d7e94069b55f547133abc06cfeff6e6d41f24cba8ebdbceb432b4b6484e80320296816694c382c02a61e732682cc6d344c1fa8738056cc06ca7ce836cc81f890aeb9998ef5ad91fcd0781aa2100ad692cec302abfa8dd8587977667692c70d8a05ce4ee1811dcb006e38e1b2b4a3d42958aee3db1faef60e3553335f4383d16e33e492d6874a03b0f9bc863f423b07ae97c70d2bc3e73947e5df5c3a27295ed4e13dfceace5ea91a3f837ed26236d97bd58c49c67321ed4d084c26abd64846a681306947cc18c44453845d9239670f52d112a4741d071bd173d7719d626969e49b64b638c4bf99d2ad5f868a5b4164dbea58a061bf7a46167067628619b4cc2ed56ebbb3875"], 0x0) [ 132.071948] binder: 7849:7853 ioctl c018620b 0 returned -14 [ 132.104466] binder: 7849:7853 unknown command -549428468 17:27:45 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 132.118030] binder: 7849:7853 ioctl c0306201 20000140 returned -22 [ 132.128037] binder: BINDER_SET_CONTEXT_MGR already set [ 132.149776] binder: 7849:7853 ioctl 40046207 0 returned -16 17:27:45 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r5, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x2, 0x2200000088) 17:27:45 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:45 executing program 4: socket$inet(0x2, 0x3, 0x7) socket$inet(0x2, 0x3, 0x7) memfd_create(&(0x7f0000000300)='\b\xe1m1#+\x00\x03ks\x1bJ\xf1QX\xd2\xe9\xca\x8fh\xe4\x85\x8f\xea\xe0\x8d\xa1\x84\xc2\x0eJ\'\xbc\xf414\xbff\xcb0\x8d\xc5\x8f\x15\x11\xb13?UNI\xb2\x91\xcff\xe1e\xb1\xbe\x95\x9d_\xc6\xa6\xaf^a[\xd6\xea\x15K\xf5*\xc3\xa8k\x8d\x19V\xcc\x9d\xef\x9c\xc8\x1a\bMA\x97\x01\x81`\x8eK\x9e\xe1\x8a\xbe', 0x4) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() pipe(&(0x7f0000000400)={0xffffffffffffffff}) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:27:45 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb978d0ee0ff568247a1e595410dedde618f31089400e07a13d04ba73386183d0641a561a9d6bb07d47b9795c6e6fe5a2076839bcddf90239a4addd55a33cddfef06b8277e36933841cd05268e9b9b0f3147388ff40f4351d858b94108738a7e39a3f54cdcb43e06aa4091c19524c8f0277e9030ae25f8958dec3e51c44d00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5080000090780000bb8abd88199b6fea523c82cb56fc427fbb2e0dc731cb1112e2d2e9392cd27af305bc97cfe739752000f3f74142cacffd94d36ee4aa353c5ef3b7272a38877464774b2984254e798d9d7e94069b55f547133abc06cfeff6e6d41f24cba8ebdbceb432b4b6484e80320296816694c382c02a61e732682cc6d344c1fa8738056cc06ca7ce836cc81f890aeb9998ef5ad91fcd0781aa2100ad692cec302abfa8dd8587977667692c70d8a05ce4ee1811dcb006e38e1b2b4a3d42958aee3db1faef60e3553335f4383d16e33e492d6874a03b0f9bc863f423b07ae97c70d2bc3e73947e5df5c3a27295ed4e13dfceace5ea91a3f837ed26236d97bd58c49c67321ed4d084c26abd64846a681306947cc18c44453845d9239670f52d112a4741d071bd173d7719d626969e49b64b638c4bf99d2ad5f868a5b4164dbea58a061bf7a46167067628619b4cc2ed56ebbb3875bc"], 0x0) 17:27:46 executing program 1: socket$inet(0x2, 0x3, 0x7) socket$inet(0x2, 0x3, 0x7) memfd_create(&(0x7f0000000300)='\b\xe1m1#+\x00\x03ks\x1bJ\xf1QX\xd2\xe9\xca\x8fh\xe4\x85\x8f\xea\xe0\x8d\xa1\x84\xc2\x0eJ\'\xbc\xf414\xbff\xcb0\x8d\xc5\x8f\x15\x11\xb13?UNI\xb2\x91\xcff\xe1e\xb1\xbe\x95\x9d_\xc6\xa6\xaf^a[\xd6\xea\x15K\xf5*\xc3\xa8k\x8d\x19V\xcc\x9d\xef\x9c\xc8\x1a\bMA\x97\x01\x81`\x8eK\x9e\xe1\x8a\xbe', 0x4) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() pipe(&(0x7f0000000400)={0xffffffffffffffff}) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:27:46 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) sendto$inet(r5, &(0x7f0000000040)="ca", 0x1, 0x0, 0x0, 0x0) 17:27:46 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:46 executing program 2: clone(0x8000100000201, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) execve(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) mknod$loop(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) accept$unix(r2, 0x0, 0x0) 17:27:46 executing program 3: clone(0x8000100000203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) mknod(&(0x7f0000000000)='./file1\x00', 0xc808, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) execve(&(0x7f00000001c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) close(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f00000000c0)='./file0\x00', 0x841, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, 0x0) 17:27:46 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 132.927980] binder: 7902:7910 ioctl c018620b 0 returned -14 [ 132.942064] binder: 7902:7910 unknown command -549428468 [ 132.947951] binder: 7902:7910 ioctl c0306201 20000140 returned -22 [ 132.956494] binder: BINDER_SET_CONTEXT_MGR already set [ 132.962000] binder: 7902:7910 ioctl 40046207 0 returned -16 17:27:46 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvmsg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0xfffffffffffffffe, 0x21}], 0x1, 0x0, 0x100}, 0x0) 17:27:46 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 133.057613] binder: 7924:7928 ioctl c018620b 0 returned -14 [ 133.082561] binder: 7924:7928 unknown command -549428468 [ 133.088558] binder: 7924:7928 ioctl c0306201 20000140 returned -22 17:27:46 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 133.152140] binder: BINDER_SET_CONTEXT_MGR already set [ 133.181644] binder: 7924:7928 ioctl 40046207 0 returned -16 17:27:46 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) 17:27:46 executing program 4: clone(0x8000100000201, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) execve(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) accept$unix(r2, 0x0, 0x0) 17:27:46 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 133.359479] binder: 7942:7945 ioctl c018620b 0 returned -14 [ 133.369103] binder: 7942:7945 unknown command -549428468 [ 133.375726] binder: 7942:7945 ioctl c0306201 20000140 returned -22 [ 133.423073] binder: BINDER_SET_CONTEXT_MGR already set [ 133.442983] binder: 7942:7945 ioctl 40046207 0 returned -16 17:27:46 executing program 1: 17:27:46 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:46 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) r5 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) 17:27:46 executing program 3: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x2, 0xa, 0x0, 0x0) r0 = eventfd(0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 17:27:46 executing program 2: clone(0x800083102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x0, 0x7530}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) clone(0x1ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) setxattr$security_evm(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)='security.evm\x00', 0x0, 0x0, 0x0) 17:27:46 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000001040)=ANY=[@ANYBLOB="7f454c460000000000000000ffffff8400"/26], 0x1a) 17:27:46 executing program 1: 17:27:46 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000640)=ANY=[@ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5080000090780000bb8abd88199b6fea523c82cb56fc427fbb2e0dc731cb1112e2d2e9392cd27af305bc97cfe739752000f3f74142cacffd94d36ee4aa353c5ef3b7272a38877464774b2984254e798d9d7e94069b55f547133abc06cfeff6e6d41f24cba8ebdbceb432b4b6484e80320296816694c382c02a61e732682cc6d344c1fa8738056cc06ca7ce836cc81f890aeb9998ef5ad91fcd0781aa2100ad692cec302abfa8dd8587977667692c70d8a05ce4ee1811dcb006e38e1b2b4a3d42958aee3db1faef60e3553335f4383d16e33e492d6874a03b0f9bc863f423b07ae97c70d2bc3e73947e5df5c3a27295ed4e13dfceace5ea91a3f837ed26236d97bd58c49c67321ed4d084c26abd64846a681306947cc18c44453845d9239670f52d112a4741d071bd173d7719d626969e49b64b638c4bf99d2ad5f868a5b4164dbea58a061bf7a46167067628619b4cc2ed56ebbb3875bc44"], 0x0) [ 133.745149] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) [ 133.772889] binder: 7968:7978 ioctl c018620b 0 returned -14 17:27:46 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x10110) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8000000000006000, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r0, r1, 0x0, 0x10000) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000080)={'veth0_to_bridge\x00', 0x3ff, 0x5}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) socket$kcm(0x2, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) 17:27:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$assume_authority(0x10, r0) [ 133.801391] binder: 7968:7978 unknown command -549428468 [ 133.827640] binder: 7968:7978 ioctl c0306201 20000140 returned -22 [ 133.855947] binder: BINDER_SET_CONTEXT_MGR already set 17:27:47 executing program 3: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x2, 0xa, 0x0, 0x0) r0 = eventfd(0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 17:27:47 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000640)=ANY=[@ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 133.880317] audit: type=1804 audit(1568827667.022:53): pid=7999 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir175493439/syzkaller.HfuhiW/62/file0" dev="sda1" ino=16659 res=1 [ 133.889690] binder: 7968:7978 ioctl 40046207 0 returned -16 17:27:47 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000640)=ANY=[@ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) r1 = open(&(0x7f0000000000)='./file0\x00', 0x42, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB='-\x00'], 0x2) ftruncate(r1, 0x0) sendfile(r0, r1, 0x0, 0xffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4138ae84, 0x0) dup2(r2, r5) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x12020}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0xd4, 0x38, 0x0, 0x70bd29, 0x0, {0xf}, [@generic="afe7c5becb486a530433cf59991fd8b170eac087e7980b3cef597b3f19b775a5c3a708649f5055c4b014f2908bd008fb3271bdd197e1fbed2abea3e6388d3fd36d9b2c95826fa72b5f778c4c28984875384348b6e59115e29cc7882103f9774600b793d3cc55f13bc6a9f1e66b1200e30f3ec0711f49153a289d149f3f39d679a32e7a29a4e6279ca6a0ea7b5ed1ee68627a9758aedb3cf693d4aa288074f7bb07c60b54b63fd11131d3aa7f3f92e769765cd70789927a4e0fc8aa3bd7ff2d", @generic]}, 0xd4}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 134.011547] audit: type=1800 audit(1568827667.032:54): pid=7999 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16659 res=0 17:27:47 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) socket$inet(0x2, 0x2, 0x2200000088) 17:27:47 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000181, 0x0) [ 134.162161] binder: 8026:8029 ioctl c018620b 0 returned -14 [ 134.221714] binder: 8026:8029 unknown command -549428468 [ 134.257923] binder: 8026:8029 ioctl c0306201 20000140 returned -22 [ 134.279451] binder: BINDER_SET_CONTEXT_MGR already set [ 134.288395] binder: 8026:8029 ioctl 40046207 0 returned -16 [ 134.328705] audit: type=1800 audit(1568827667.472:55): pid=8008 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16659 res=0 17:27:47 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x10110) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8000000000006000, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000080)={'veth0_to_bridge\x00', 0x3ff, 0x5}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) socket$kcm(0x2, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) 17:27:47 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:47 executing program 3: msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) shmget(0x3, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) 17:27:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) r1 = open(&(0x7f0000000000)='./file0\x00', 0x42, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB='-\x00'], 0x2) ftruncate(r1, 0x0) sendfile(r0, r1, 0x0, 0xffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4138ae84, 0x0) dup2(r2, r5) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x12020}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0xd4, 0x38, 0x0, 0x70bd29, 0x0, {0xf}, [@generic="afe7c5becb486a530433cf59991fd8b170eac087e7980b3cef597b3f19b775a5c3a708649f5055c4b014f2908bd008fb3271bdd197e1fbed2abea3e6388d3fd36d9b2c95826fa72b5f778c4c28984875384348b6e59115e29cc7882103f9774600b793d3cc55f13bc6a9f1e66b1200e30f3ec0711f49153a289d149f3f39d679a32e7a29a4e6279ca6a0ea7b5ed1ee68627a9758aedb3cf693d4aa288074f7bb07c60b54b63fd11131d3aa7f3f92e769765cd70789927a4e0fc8aa3bd7ff2d", @generic]}, 0xd4}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 17:27:47 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getpgid(0x0) 17:27:47 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x10110) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8000000000006000, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000080)={'veth0_to_bridge\x00', 0x3ff, 0x5}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) socket$kcm(0x2, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) [ 134.489751] binder: 8041:8053 ioctl c018620b 0 returned -14 [ 134.503962] audit: type=1804 audit(1568827667.642:56): pid=8047 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir175493439/syzkaller.HfuhiW/63/file0" dev="sda1" ino=16661 res=1 17:27:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) r1 = open(&(0x7f0000000000)='./file0\x00', 0x42, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB='-\x00'], 0x2) ftruncate(r1, 0x0) sendfile(r0, r1, 0x0, 0xffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4138ae84, 0x0) dup2(r2, r5) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x12020}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0xd4, 0x38, 0x0, 0x70bd29, 0x0, {0xf}, [@generic="afe7c5becb486a530433cf59991fd8b170eac087e7980b3cef597b3f19b775a5c3a708649f5055c4b014f2908bd008fb3271bdd197e1fbed2abea3e6388d3fd36d9b2c95826fa72b5f778c4c28984875384348b6e59115e29cc7882103f9774600b793d3cc55f13bc6a9f1e66b1200e30f3ec0711f49153a289d149f3f39d679a32e7a29a4e6279ca6a0ea7b5ed1ee68627a9758aedb3cf693d4aa288074f7bb07c60b54b63fd11131d3aa7f3f92e769765cd70789927a4e0fc8aa3bd7ff2d", @generic]}, 0xd4}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 134.537016] audit: type=1800 audit(1568827667.652:57): pid=8047 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16661 res=0 17:27:47 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 134.575331] audit: type=1804 audit(1568827667.682:58): pid=8051 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir531131591/syzkaller.c3uYgW/59/file0" dev="sda1" ino=16662 res=1 [ 134.611251] binder: 8041:8053 unknown command -549428468 [ 134.655402] binder: 8041:8053 ioctl c0306201 20000140 returned -22 [ 134.662092] binder: BINDER_SET_CONTEXT_MGR already set [ 134.667426] binder: 8041:8054 ioctl 40046207 0 returned -16 17:27:47 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:47 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) 17:27:48 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5080000090780000bb8abd88199b6fea523c82cb56fc427fbb2e0dc731cb1112e2d2e9392cd27af305bc97cfe739752000f3f74142cacffd94d36ee4aa353c5ef3b7272a38877464774b2984254e798d9d7e94069b55f547133abc06cfeff6e6d41f24cba8ebdbceb432b4b6484e80320296816694c382c02a61e732682cc6d344c1fa8738056cc06ca7ce836cc81f890aeb9998ef5ad91fcd0781aa2100ad692cec302abfa8dd8587977667692c70d8a05ce4ee1811dcb006e38e1b2b4a3d42958aee3db1faef60e3553335f4383d16e33e492d6874a03b0f9bc863f423b07ae97c70d2bc3e73947e5df5c3a27295ed4e13dfceace5ea91a3f837ed26236d97bd58c49c67321ed4d084c26abd64846a681306947cc18c44453845d9239670f52d112a4741d071bd173d7719d626969e49b64b638c4bf99d2ad5f868a5b4164dbea58a061bf7a46167067628619b4cc2ed56ebbb3875bc44"], 0x0) [ 134.847443] binder: 8078:8081 ioctl c018620b 0 returned -14 [ 134.861437] audit: type=1800 audit(1568827667.732:59): pid=8051 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16662 res=0 [ 134.909597] binder: 8078:8081 unknown command -549428468 17:27:48 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 134.955201] binder: BINDER_SET_CONTEXT_MGR already set [ 134.960735] binder: 8078:8083 ioctl 40046207 0 returned -16 [ 134.991403] binder: 8078:8081 ioctl c0306201 20000140 returned -22 17:27:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) getresuid(0x0, 0x0, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 17:27:48 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) r1 = dup(r0) bind$unix(0xffffffffffffffff, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x1b1) 17:27:48 executing program 1: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) restart_syscall() write$P9_RCLUNK(r0, 0x0, 0x0) 17:27:48 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000540)='/proc/self/net/pfkey\x00') 17:27:48 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:48 executing program 3: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) restart_syscall() write$P9_RREAD(r0, 0x0, 0xffffffffffffffb5) 17:27:48 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb978d0ee0ff568247a1e595410dedde618f31089400e07a13d04ba73386183d0641a561a9d6bb07d47b9795c6e6fe5a2076839bcddf90239a4addd55a33cddfef06", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='veth1\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000000), 0x4) sendmmsg(r0, &(0x7f0000004c40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000004900)=[{0x10, 0x29, 0x34}], 0x10}}], 0x2, 0x0) [ 135.211599] binder: 8098:8108 ioctl c018620b 0 returned -14 17:27:48 executing program 4: socket$unix(0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = gettid() ptrace$getsig(0x4202, 0x0, 0x0, 0x0) getpgid(r0) 17:27:48 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) r1 = dup(r0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x1b1) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000200)={0x0, @local, 0x0, 0x0, 'dh\x00'}, 0x2c) 17:27:48 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb978d0ee0ff568247a1e595410dedde618f31089400e07a13d04ba73386183d0641a561a9d6bb07d47b9795c6e6fe5a2076839bcddf90239a4addd55a33cddfef06", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:48 executing program 4: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$netlink(0x10, 0x3, 0x8) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x8000, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x6000, 0x2, &(0x7f0000000340)) r1 = getpid() kcmp(r1, 0x0, 0x4, 0xffffffffffffffff, r0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x4, 0x0, 0x1, 0x2}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) lseek(r2, 0x0, 0x0) write$P9_RGETATTR(r2, 0x0, 0x0) r3 = socket(0x8000000000000010, 0x2, 0x0) write(r3, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea080001001c7a6cb4", 0x24) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r5, 0x0) mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) [ 135.252810] binder: 8098:8108 unknown command -549428468 [ 135.284889] binder: 8098:8108 ioctl c0306201 20000140 returned -22 17:27:48 executing program 2: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) restart_syscall() write$P9_RREAD(r0, 0x0, 0xa1) 17:27:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x1]}) 17:27:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x2}) 17:27:48 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0c6340df3f16297097086f0040"], 0x0, 0x0, 0x0}) 17:27:48 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb978d0ee0ff568247a1e595410dedde618f31089400e07a13d04ba73386183d0641a561a9d6bb07d47b9795c6e6fe5a2076839bcddf90239a4addd55a33cddfef06", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 135.393637] audit: type=1400 audit(1568827668.542:60): avc: denied { create } for pid=8131 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1 17:27:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x2}) 17:27:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x1]}) 17:27:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x2}) [ 135.461164] binder: 8140:8145 ioctl c018620b 0 returned -14 [ 135.497150] binder: 8140:8145 unknown command -549428468 17:27:48 executing program 4: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$netlink(0x10, 0x3, 0x8) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x8000, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x6000, 0x2, &(0x7f0000000340)) r1 = getpid() kcmp(r1, 0x0, 0x4, 0xffffffffffffffff, r0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x4, 0x0, 0x1, 0x2}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) lseek(r2, 0x0, 0x0) write$P9_RGETATTR(r2, 0x0, 0x0) r3 = socket(0x8000000000000010, 0x2, 0x0) write(r3, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea080001001c7a6cb4", 0x24) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r5, 0x0) mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 17:27:48 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb978d0ee0ff568247a1e595410dedde618f31089400e07a13d04ba73386183d0641a561a9d6bb07d47b9795c6e6fe5a2076839bcddf90239a4addd55a33cddfef06b8277e36933841cd05268e9b9b0f3147388ff40f4351d858b94108738a7e39a3", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 135.539063] binder: 8140:8145 ioctl c0306201 20000140 returned -22 17:27:48 executing program 1: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$netlink(0x10, 0x3, 0x8) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x8000, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x6000, 0x2, &(0x7f0000000340)) r1 = getpid() kcmp(r1, 0x0, 0x4, 0xffffffffffffffff, r0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x4, 0x0, 0x1, 0x2}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) lseek(r2, 0x0, 0x0) write$P9_RGETATTR(r2, 0x0, 0x0) r3 = socket(0x8000000000000010, 0x2, 0x0) write(r3, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea080001001c7a6cb4", 0x24) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r5, 0x0) mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 17:27:48 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb978d0ee0ff568247a1e595410dedde618f31089400e07a13d04ba73386183d0641a561a9d6bb07d47b9795c6e6fe5a2076839bcddf90239a4addd55a33cddfef06b8277e36933841cd05268e9b9b0f3147388ff40f4351d858b94108738a7e39a3", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5080000090780000bb8abd88199b6fea523c82cb56fc427fbb2e0dc731cb1112e2d2e9392cd27af305bc97cfe739752000f3f74142cacffd94d36ee4aa353c5ef3b7272a38877464774b2984254e798d9d7e94069b55f547133abc06cfeff6e6d41f24cba8ebdbceb432b4b6484e80320296816694c382c02a61e732682cc6d344c1fa8738056cc06ca7ce836cc81f890aeb9998ef5ad91fcd0781aa2100ad692cec302abfa8dd8587977667692c70d8a05ce4ee1811dcb006e38e1b2b4a3d42958aee3db1faef60e3553335f4383d16e33e492d6874a03b0f9bc863f423b07ae97c70d2bc3e73947e5df5c3a27295ed4e13dfceace5ea91a3f837ed26236d97bd58c49c67321ed4d084c26abd64846a681306947cc18c44453845d9239670f52d112a4741d071bd173d7719d626969e49b64b638c4bf99d2ad5f868a5b4164dbea58a061bf7a46167067628619b4cc2ed56ebbb3875bc44"], 0x0) 17:27:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x2}) 17:27:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x1]}) 17:27:48 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000500)={0x3a, 0x18, 0xc, 0x10, 0x1, 0x10000, 0x4, 0xf4, 0xffffffffffffffff}) 17:27:48 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb978d0ee0ff568247a1e595410dedde618f31089400e07a13d04ba73386183d0641a561a9d6bb07d47b9795c6e6fe5a2076839bcddf90239a4addd55a33cddfef06b8277e36933841cd05268e9b9b0f3147388ff40f4351d858b94108738a7e39a3", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5080000090780000bb8abd88199b6fea523c82cb56fc427fbb2e0dc731cb1112e2d2e9392cd27af305bc97cfe739752000f3f74142cacffd94d36ee4aa353c5ef3b7272a38877464774b2984254e798d9d7e94069b55f547133abc06cfeff6e6d41f24cba8ebdbceb432b4b6484e80320296816694c382c02a61e732682cc6d344c1fa8738056cc06ca7ce836cc81f890aeb9998ef5ad91fcd0781aa2100ad692cec302abfa8dd8587977667692c70d8a05ce4ee1811dcb006e38e1b2b4a3d42958aee3db1faef60e3553335f4383d16e33e492d6874a03b0f9bc863f423b07ae97c70d2bc3e73947e5df5c3a27295ed4e13dfceace5ea91a3f837ed26236d97bd58c49c67321ed4d084c26abd64846a681306947cc18c44453845d9239670f52d112a4741d071bd173d7719d626969e49b64b638c4bf99d2ad5f868a5b4164dbea58a061bf7a46167067628619b4cc2ed56ebbb3875bc44"], 0x0) 17:27:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1e) write$uinput_user_dev(r0, &(0x7f00000005c0)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 17:27:48 executing program 4: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$netlink(0x10, 0x3, 0x8) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x8000, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x6000, 0x2, &(0x7f0000000340)) r1 = getpid() kcmp(r1, 0x0, 0x4, 0xffffffffffffffff, r0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x4, 0x0, 0x1, 0x2}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) lseek(r2, 0x0, 0x0) write$P9_RGETATTR(r2, 0x0, 0x0) r3 = socket(0x8000000000000010, 0x2, 0x0) write(r3, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea080001001c7a6cb4", 0x24) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r5, 0x0) mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 17:27:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f00000005c0)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x0) 17:27:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x1]}) [ 135.769661] input: syz1 as /devices/virtual/input/input5 [ 135.783855] binder: 8185:8191 ioctl c018620b 0 returned -14 17:27:49 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb978d0ee0ff568247a1e595410dedde618f31089400e07a13d04ba73386183d0641a561a9d6bb07d47b9795c6e6fe5a2076839bcddf90239a4addd55a33cddfef06b8277e36933841cd05268e9b9b0f3147388ff40f4351d858b94108738a7e39a3f54cdcb43e06aa4091c19524c8f0277e", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:49 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000600)) [ 135.878520] input: syz1 as /devices/virtual/input/input7 17:27:49 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x1]}) 17:27:49 executing program 4: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$netlink(0x10, 0x3, 0x8) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x8000, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x6000, 0x2, &(0x7f0000000340)) r1 = getpid() kcmp(r1, 0x0, 0x4, 0xffffffffffffffff, r0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x4, 0x0, 0x1, 0x2}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) lseek(r2, 0x0, 0x0) write$P9_RGETATTR(r2, 0x0, 0x0) r3 = socket(0x8000000000000010, 0x2, 0x0) write(r3, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea080001001c7a6cb4", 0x24) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r5, 0x0) mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 17:27:49 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:49 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x40100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 17:27:49 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb978d0ee0ff568247a1e595410dedde618f31089400e07a13d04ba73386183d0641a561a9d6bb07d47b9795c6e6fe5a2076839bcddf90239a4addd55a33cddfef06b8277e36933841cd05268e9b9b0f3147388ff40f4351d858b94108738a7e39a3f54cdcb43e06aa4091c19524c8f0277e", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:49 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:49 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x1]}) [ 136.008604] binder: 8210:8221 ioctl c018620b 0 returned -14 17:27:49 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb978d0ee0ff568247a1e595410dedde618f31089400e07a13d04ba73386183d0641a561a9d6bb07d47b9795c6e6fe5a2076839bcddf90239a4addd55a33cddfef06b8277e36933841cd05268e9b9b0f3147388ff40f4351d858b94108738a7e39a3f54cdcb43e06aa4091c19524c8f0277e", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5080000090780000bb8abd88199b6fea523c82cb56fc427fbb2e0dc731cb1112e2d2e9392cd27af305bc97cfe739752000f3f74142cacffd94d36ee4aa353c5ef3b7272a38877464774b2984254e798d9d7e94069b55f547133abc06cfeff6e6d41f24cba8ebdbceb432b4b6484e80320296816694c382c02a61e732682cc6d344c1fa8738056cc06ca7ce836cc81f890aeb9998ef5ad91fcd0781aa2100ad692cec302abfa8dd8587977667692c70d8a05ce4ee1811dcb006e38e1b2b4a3d42958aee3db1faef60e3553335f4383d16e33e492d6874a03b0f9bc863f423b07ae97c70d2bc3e73947e5df5c3a27295ed4e13dfceace5ea91a3f837ed26236d97bd58c49c67321ed4d084c26abd64846a681306947cc18c44453845d9239670f52d112a4741d071bd173d7719d626969e49b64b638c4bf99d2ad5f868a5b4164dbea58a061bf7a46167067628619b4cc2ed56ebbb3875bc44"], 0x0) 17:27:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f00000005c0)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x0) 17:27:49 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f00000005c0)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x0) 17:27:49 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) write$P9_RLOPEN(r2, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x96, 0x1, 0x1}, 0x5}}, 0x18) 17:27:49 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:49 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x1]}) 17:27:49 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb978d0ee0ff568247a1e595410dedde618f31089400e07a13d04ba73386183d0641a561a9d6bb07d47b9795c6e6fe5a2076839bcddf90239a4addd55a33cddfef06b8277e36933841cd05268e9b9b0f3147388ff40f4351d858b94108738a7e39a3f54cdcb43e06aa4091c19524c8f0277e9030ae25f8958dec", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 136.177623] binder: 8241:8246 ioctl c018620b 0 returned -14 [ 136.187501] input: syz1 as /devices/virtual/input/input9 [ 136.203659] input: syz1 as /devices/virtual/input/input10 17:27:49 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') [ 136.254929] input: syz1 as /devices/virtual/input/input11 17:27:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) read$eventfd(r0, &(0x7f00000001c0), 0x8) 17:27:49 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000200)=""/34, 0x56) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f0000000180)={'veth1_to_hsr\x00', @ifru_map={0x7f, 0x6e64, 0x8, 0x8, 0x0, 0x81}}}) 17:27:49 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:49 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:49 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x1]}) 17:27:49 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000400)="020115ffffff01000008ff07000000000013259a45e8d9230017132564caeef5df2b9dc72e578c00750e00000000000000887700720030ba829237c300000000000080000055aad88273a3b490561a2aa5b93992c35094d3fa99c8dcb7c9481ef10063348e2b11851e35496d75b40e6d8d8bfddc1029b7f51bf1014359a93db3197cbfd48837576067e66422e3db953bfa300337fc9ef12827c43feb3c7485b0a757dc6ee5eb6d248151d2f26e3bff243d37c6e8b182614b7896a236aa01e9f77f05f1c9f93da4", 0xc7}]) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x18d, 0x0) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 17:27:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'ip_vti0\x00', 0x201f}) dup2(r0, r1) 17:27:49 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 136.396060] binder: 8273:8276 ioctl c018620b 0 returned -14 17:27:49 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:49 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x1]}) 17:27:49 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents64(r2, &(0x7f0000000200)=""/34, 0x56) 17:27:49 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 136.487486] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=8296 comm=syz-executor.1 17:27:49 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000400)="020115ffffff01000008ff07000000000013259a45e8d9230017132564caeef5df2b9dc72e578c00750e00000000000000887700720030ba829237c300000000000080000055aad88273a3b490561a2aa5b93992c35094d3fa99c8dcb7c9481ef10063348e2b11851e35496d75b40e6d8d8bfddc1029b7f51bf1014359a93db3197cbfd48837576067e66422e3db953bfa300337fc", 0x95}]) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x18d, 0x0) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 17:27:49 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x1]}) 17:27:49 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') [ 136.564231] binder: 8305:8307 ioctl c018620b 0 returned -14 17:27:49 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:49 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000004c0)) getdents64(r2, &(0x7f0000000200)=""/34, 0x56) [ 136.606833] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=8296 comm=syz-executor.1 17:27:49 executing program 1: sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2ab500000800000000000000000000000000000000000000070000000000000000dcb2290ad9e3"], 0x1}}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:27:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x1]}) 17:27:49 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:49 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 136.698262] binder: 8328:8330 ioctl c018620b 0 returned -14 [ 136.706373] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=8318 comm=syz-executor.4 17:27:49 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:49 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r2, &(0x7f0000000200)=""/34, 0x56) [ 136.772989] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=8341 comm=syz-executor.4 17:27:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x1]}) [ 136.863676] binder: 8353:8359 ioctl c018620b 0 returned -14 17:27:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000140)=""/8, &(0x7f0000000180)=0x8) 17:27:52 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:52 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x1]}) 17:27:52 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) getdents64(r2, &(0x7f0000000200)=""/34, 0x56) 17:27:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f00000005c0)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) 17:27:52 executing program 2: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:52 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x1]}) 17:27:52 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 139.613117] input: syz1 as /devices/virtual/input/input13 [ 139.627609] binder: 8372:8378 ioctl c018620b 0 returned -14 17:27:52 executing program 4: pipe(&(0x7f0000000540)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @empty}, 0x4d) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf3, 0x21fc}, 0x14) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000047f) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000100)=0x2, 0x4) splice(r0, 0x0, r1, 0x0, 0x10003, 0x0) 17:27:52 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) getdents64(r2, &(0x7f0000000200)=""/34, 0x56) 17:27:52 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x1]}) 17:27:52 executing program 2: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f00000003c0)='$.\x00') [ 139.725391] input: syz1 as /devices/virtual/input/input14 17:27:52 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:52 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) getdents64(r2, &(0x7f0000000200)=""/34, 0x56) 17:27:52 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='dax\x00', 0x0, 0x0) [ 139.776428] binder: 8395:8399 ioctl c018620b 0 returned -14 17:27:52 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x1]}) 17:27:53 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb978d0ee0ff568247a1e595410dedde618f31089400e07a13d04ba73386183d0641a561a9d6bb07d47b9795c6e6fe5a2076839bcddf90239a4addd55a33cddfef06b8277e36933841cd05268e9b9b0f3147388ff40f4351d858b94108738a7e39a3f54cdcb43e06aa4091c19524c8f0277e9030ae25f8958dec3e51c44d000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5080000090780000bb8abd88199b6fea523c82cb56fc427fbb2e0dc731cb1112e2d2e9392cd27af305bc97cfe739752000f3f74142cacffd94d36ee4aa353c5ef3b7272a38877464774b2984254e798d9d7e94069b55f547133abc06cfeff6e6d41f24cba8ebdbceb432b4b6484e80320296816694c382c02a61e732682cc6d344c1fa8738056cc06ca7ce836cc81f890aeb9998ef5ad91fcd0781aa2100ad692cec302abfa8dd8587977667692c70d8a05ce4ee1811dcb006e38e1b2b4a3d42958aee3db1faef60e3553335f4383d16e33e492d6874a03b0f9bc863f423b07ae97c70d2bc3e73947e5df5c3a27295ed4e13dfceace5ea91a3f837ed26236d97bd58c49c67321ed4d084c26abd64846a681306947cc18c44453845d9239670f52d112a4741d071bd173d7719d626969e49b64b638c4bf99d2ad5f868a5b4164dbea58a061bf7a46167067628619b4cc2ed56ebbb3875bc44"], 0x0) 17:27:53 executing program 2: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x1]}) [ 139.888407] binder: 8409:8417 ioctl c018620b 0 returned -14 17:27:53 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b017c8800fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000040000207200621700000000000005b615c002a7a35048803668d46af618b9dde6bdbdf15cb645409dc6524270166456a3a918f8f9962530e8dd2faf61b28ebdc2c6c07c5ec2030edb978d0ee0ff568247a1e595410dedde618f31089400e07a13d04ba73386183d0641a561a9d6bb07d47b9795c6e6fe5a2076839bcddf90239a4addd55a33cddfef06b8277e36933841cd05268e9b9b0f3147388ff40f4351d858b94108738a7e39a3f54cdcb43e06aa4091c19524c8f0277e9030ae25f8958dec3e51c44d000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:53 executing program 4: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="6d6183676c65000000000000000000000000000000000000000000000000000005000000000000000000100000000000000000000000000000000000000000000000000000000001002000000000000000000000000000001000000000000000c4ad0589d623e9000000000000000000000000000000000000003400000000e3c0632000000000000000cd7cf6014c4ff8d47c79b1ed4fd4497d01083d925b962d26a98052021276bacf4b7e0dc4065c7e70617d8056dbfe0708b9f0ffbb"], 0x78) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') lseek(r1, 0x3, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, 0x0) dup(0xffffffffffffffff) setfsuid(0xee00) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f00000018c0)={0x2, 0x800000000004e20, @local}, 0x10) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000200), 0x4) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) recvmsg(r3, &(0x7f0000001680)={0x0, 0xfffffde8, &(0x7f0000001600)=[{&(0x7f0000000600)=""/4096, 0xfffffcb6}], 0x1}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 17:27:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x1]}) 17:27:53 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:53 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/34, 0x56) 17:27:53 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 17:27:53 executing program 1: clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9017700268c1a709d580000000000011b2300000503000018030000cc000029210000000000000000003b816f5f5ea3d5a70000f34f8dfac0dc1695c4f8000ae7b8bba16bab1004000013040006d32b79b85c2dd510e5ea855f5846d81751c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd05005d0f4d6715ba085900323e0000067000c0d1c7cfd3f37bbfac96385f55b911f545b74eaed22de04c36"], 0x1) 17:27:53 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x1]}) [ 140.588116] binder: 8443:8446 ioctl c018620b 0 returned -14 17:27:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') sendfile(r0, r1, 0x0, 0x20000000003) 17:27:53 executing program 1: clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9017700268c1a709d580000000000011b2300000503000018030000cc000029210000000000000000003b816f5f5ea3d5a70000f34f8dfac0dc1695c4f8000ae7b8bba16bab1004000013040006d32b79b85c2dd510e5ea855f5846d81751c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd05005d0f4d6715ba085900323e0000067000c0d1c7cfd3f37bbfac96385f55b911f545b74eaed22de04c36"], 0x1) 17:27:53 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:53 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/34, 0x56) [ 140.795285] binder: 8477:8478 ioctl c018620b 0 returned -14 17:27:54 executing program 4: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="6d6183676c65000000000000000000000000000000000000000000000000000005000000000000000000100000000000000000000000000000000000000000000000000000000001002000000000000000000000000000001000000000000000c4ad0589d623e9000000000000000000000000000000000000003400000000e3c0632000000000000000cd7cf6014c4ff8d47c79b1ed4fd4497d01083d925b962d26a98052021276bacf4b7e0dc4065c7e70617d8056dbfe0708b9f0ffbb"], 0x78) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') lseek(r1, 0x3, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, 0x0) dup(0xffffffffffffffff) setfsuid(0xee00) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f00000018c0)={0x2, 0x800000000004e20, @local}, 0x10) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000200), 0x4) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) recvmsg(r3, &(0x7f0000001680)={0x0, 0xfffffde8, &(0x7f0000001600)=[{&(0x7f0000000600)=""/4096, 0xfffffcb6}], 0x1}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 17:27:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, 0x0) 17:27:54 executing program 1: clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9017700268c1a709d580000000000011b2300000503000018030000cc000029210000000000000000003b816f5f5ea3d5a70000f34f8dfac0dc1695c4f8000ae7b8bba16bab1004000013040006d32b79b85c2dd510e5ea855f5846d81751c2f2d3c00f3f72e211777424c9814f1f852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd05005d0f4d6715ba085900323e0000067000c0d1c7cfd3f37bbfac96385f55b911f545b74eaed22de04c36"], 0x1) 17:27:54 executing program 5: 17:27:54 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:54 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/34, 0x56) 17:27:54 executing program 1: 17:27:54 executing program 5: 17:27:54 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:54 executing program 1: 17:27:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, 0x0) 17:27:54 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) r2 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r2, &(0x7f0000000200)=""/34, 0x56) 17:27:54 executing program 4: 17:27:54 executing program 1: 17:27:54 executing program 5: 17:27:54 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, 0x0) 17:27:54 executing program 5: 17:27:54 executing program 4: 17:27:54 executing program 1: [ 141.631400] binder: 8513:8519 ioctl c018620b 0 returned -14 17:27:54 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:54 executing program 5: 17:27:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)={0x0, 0x0, [0x1]}) 17:27:54 executing program 1: 17:27:54 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) r2 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r2, &(0x7f0000000200)=""/34, 0x56) 17:27:54 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x53]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000080)="a674867a8ffc0ecb8a7c3bc472c0af38f6ed35dc9812e35d", 0x18}], 0x112) 17:27:54 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:55 executing program 1: 17:27:55 executing program 5: 17:27:55 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)={0x0, 0x0, [0x1]}) [ 141.846393] input: syz1 as /devices/virtual/input/input15 [ 141.873807] binder: 8548:8554 ioctl c018620b 0 returned -14 17:27:55 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) r2 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r2, &(0x7f0000000200)=""/34, 0x56) 17:27:55 executing program 1: 17:27:55 executing program 5: 17:27:55 executing program 4: 17:27:55 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') [ 141.983119] binder: 8564:8567 ioctl c018620b 0 returned -14 17:27:55 executing program 1: 17:27:55 executing program 4: 17:27:55 executing program 5: 17:27:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)={0x0, 0x0, [0x1]}) 17:27:55 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r2, &(0x7f0000000200)=""/34, 0x56) 17:27:55 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:55 executing program 4: 17:27:55 executing program 1: 17:27:55 executing program 5: 17:27:55 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') [ 142.148986] binder: 8584:8589 ioctl c018620b 0 returned -14 17:27:55 executing program 1: 17:27:55 executing program 5: 17:27:55 executing program 4: 17:27:55 executing program 0: syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r1, &(0x7f0000000200)=""/34, 0x56) 17:27:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)={0x81}) 17:27:55 executing program 1: 17:27:55 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:55 executing program 4: 17:27:55 executing program 5: 17:27:55 executing program 0: syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) 17:27:55 executing program 1: 17:27:55 executing program 4: 17:27:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)={0x81}) 17:27:55 executing program 5: 17:27:55 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:55 executing program 0: syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) 17:27:55 executing program 1: 17:27:55 executing program 5: 17:27:55 executing program 4: 17:27:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)={0x81}) 17:27:55 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:55 executing program 1: 17:27:55 executing program 5: 17:27:55 executing program 4: 17:27:55 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) 17:27:55 executing program 1: 17:27:55 executing program 5: 17:27:55 executing program 4: 17:27:55 executing program 3: 17:27:55 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:55 executing program 0: mkdir(0x0, 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) 17:27:55 executing program 3: 17:27:55 executing program 5: 17:27:55 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:55 executing program 4: 17:27:55 executing program 1: 17:27:56 executing program 5: 17:27:56 executing program 0: mkdir(0x0, 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) 17:27:56 executing program 3: 17:27:56 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f00000003c0)='$.\x00') 17:27:56 executing program 1: 17:27:56 executing program 4: 17:27:56 executing program 5: 17:27:56 executing program 3: 17:27:56 executing program 1: 17:27:56 executing program 0: mkdir(0x0, 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) 17:27:56 executing program 4: 17:27:56 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, 0x0) 17:27:56 executing program 3: 17:27:56 executing program 5: 17:27:56 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(0x0, 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) 17:27:56 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, 0x0) 17:27:56 executing program 4: 17:27:56 executing program 1: 17:27:56 executing program 3: 17:27:56 executing program 5: 17:27:56 executing program 4: 17:27:56 executing program 1: 17:27:56 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000002) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, 0x0) 17:27:56 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(0x0, 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) 17:27:56 executing program 5: 17:27:56 executing program 3: 17:27:56 executing program 1: 17:27:56 executing program 4: 17:27:56 executing program 5: 17:27:56 executing program 2: 17:27:56 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(0x0, 0x0, 0x4) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) 17:27:56 executing program 3: 17:27:56 executing program 5: 17:27:56 executing program 4: 17:27:56 executing program 1: 17:27:56 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x10110) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8000000000006000, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r0, r1, 0x0, 0x10000) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000080)={'veth0_to_bridge\x00', 0x3ff, 0x5}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) socket$kcm(0x2, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) 17:27:56 executing program 5: 17:27:56 executing program 1: 17:27:56 executing program 3: 17:27:56 executing program 4: 17:27:56 executing program 1: 17:27:56 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) 17:27:56 executing program 3: 17:27:56 executing program 4: [ 143.574300] audit: type=1804 audit(1568827676.712:61): pid=8762 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir531131591/syzkaller.c3uYgW/100/file0" dev="sda1" ino=16673 res=1 17:27:56 executing program 5: 17:27:56 executing program 4: 17:27:56 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(0x0, &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) [ 143.777211] audit: type=1800 audit(1568827676.752:62): pid=8762 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16673 res=0 17:27:57 executing program 3: 17:27:57 executing program 1: 17:27:57 executing program 5: 17:27:57 executing program 4: 17:27:57 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x10110) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8000000000006000, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000080)={'veth0_to_bridge\x00', 0x3ff, 0x5}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) socket$kcm(0x2, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) 17:27:57 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(0x0, &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) [ 143.968159] audit: type=1800 audit(1568827677.112:63): pid=8770 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16673 res=0 17:27:57 executing program 1: 17:27:57 executing program 4: 17:27:57 executing program 3: 17:27:57 executing program 5: [ 144.062373] audit: type=1804 audit(1568827677.202:64): pid=8806 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir531131591/syzkaller.c3uYgW/101/file0" dev="sda1" ino=16740 res=1 17:27:57 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(0x0, &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) 17:27:57 executing program 3: 17:27:57 executing program 5: 17:27:57 executing program 1: 17:27:57 executing program 4: 17:27:57 executing program 5: [ 144.298188] audit: type=1800 audit(1568827677.202:65): pid=8806 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16740 res=0 17:27:57 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x10110) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8000000000006000, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000080)={'veth0_to_bridge\x00', 0x3ff, 0x5}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) socket$kcm(0x2, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) 17:27:57 executing program 3: 17:27:57 executing program 1: 17:27:57 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) 17:27:57 executing program 4: 17:27:57 executing program 5: 17:27:57 executing program 4: 17:27:57 executing program 1: 17:27:57 executing program 3: 17:27:57 executing program 5: 17:27:57 executing program 3: 17:27:57 executing program 4: [ 144.576318] audit: type=1804 audit(1568827677.722:66): pid=8847 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir531131591/syzkaller.c3uYgW/102/file0" dev="sda1" ino=16697 res=1 [ 144.728593] audit: type=1800 audit(1568827677.762:67): pid=8847 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16697 res=0 17:27:58 executing program 2: 17:27:58 executing program 1: 17:27:58 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) 17:27:58 executing program 5: 17:27:58 executing program 3: 17:27:58 executing program 4: 17:27:58 executing program 1: 17:27:58 executing program 4: 17:27:58 executing program 2: 17:27:58 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) 17:27:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0x551}], 0x1) 17:27:58 executing program 3: creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3ff) lseek(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bind$isdn(0xffffffffffffffff, &(0x7f0000000280), 0x6) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) unshare(0x24020400) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x40521, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getgid() sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @multicast2}, 0xfd30) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x364) 17:27:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x3c) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0x3c, &(0x7f0000000100)={0x1}, 0x116) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r1, &(0x7f0000002780)=[{{0x0, 0x363, &(0x7f0000000200)=[{&(0x7f0000000140), 0x304}], 0x8}, 0x2}], 0x13, 0x24000004) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000a40), 0x0) 17:27:58 executing program 2: r0 = socket(0x11, 0x80a, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4f, 0x5d}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 17:27:58 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x60}, 0x0) 17:27:58 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) 17:27:58 executing program 5: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='numa_maps\x00') mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0) [ 145.118596] audit: type=1400 audit(1568827678.262:68): avc: denied { mac_admin } for pid=8901 comm="syz-executor.0" capability=33 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 17:27:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r1, 0x1, 0x3c, &(0x7f0000000100)={0x1}, 0x116) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r1, &(0x7f0000002780)=[{{0x0, 0x363, &(0x7f0000000200)=[{&(0x7f0000000140), 0x304}], 0x8}, 0x2}], 0x13, 0x24000004) 17:27:58 executing program 5: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='numa_maps\x00') mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0) 17:27:58 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) 17:27:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) recvmmsg(0xffffffffffffffff, &(0x7f0000004e00), 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) 17:27:58 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$setperm(0x5, r1, 0x1000000200200103) keyctl$revoke(0x3, r1) 17:27:58 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000500)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000340)={0x100000001}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:27:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c0000002300290800000000000000000600000008000a0001000100"], 0x1c}}, 0x0) 17:27:58 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) 17:27:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x300) 17:27:58 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x7fff) r1 = dup(r0) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) mlockall(0x1) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='numa_maps\x00') preadv(r2, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0) 17:27:58 executing program 5: 17:27:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) recvmmsg(0xffffffffffffffff, &(0x7f0000004e00), 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) 17:27:58 executing program 4: 17:27:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x300) 17:27:58 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x84) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f00000000c0)=0x1e) 17:27:58 executing program 4: 17:27:58 executing program 2: r0 = creat(0x0, 0x0) fallocate(r0, 0x3, 0x0, 0x3ff) writev(r0, &(0x7f0000000380), 0x0) lseek(r0, 0x400000, 0x0) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000000)=""/24, &(0x7f0000000400)=0x18) bind$isdn(0xffffffffffffffff, &(0x7f0000000280), 0x6) r1 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) r3 = memfd_create(0x0, 0x0) r4 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) r5 = dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0x28e) unshare(0x24020400) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x40521, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getgid() sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @multicast2}, 0xfd30) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x364) 17:27:58 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/34, 0x56) 17:27:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x300) 17:27:58 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x1000002d6) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x8, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}}}}, 0x7e) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) 17:27:58 executing program 5: socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) [ 145.781590] audit: type=1804 audit(1568827678.922:69): pid=8989 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir133573896/syzkaller.5SjrdZ/138/file0" dev="sda1" ino=16739 res=1 17:27:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) unshare(0x600) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:27:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x300) 17:27:59 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000500)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000340)) 17:27:59 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/34, 0x56) 17:27:59 executing program 5: syz_read_part_table(0xfffffffffffffff9, 0x0, 0x0) 17:27:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 17:27:59 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/34, 0x56) 17:27:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60f8, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r0, r1, 0x0, 0x10000) 17:27:59 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x300) 17:27:59 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) socket$kcm(0x2, 0x0, 0x0) 17:27:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x2000203a, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000007c0)=""/246) write$ppp(r0, 0x0, 0x0) 17:27:59 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r0, 0x0, 0x0) [ 146.117541] audit: type=1804 audit(1568827679.262:70): pid=9022 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir629453457/syzkaller.Xx6x11/107/file0" dev="sda1" ino=16754 res=1 17:27:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) unshare(0x600) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:27:59 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x300) 17:27:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x42, 0x0) ftruncate(r0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4138ae84, &(0x7f0000000080)) 17:27:59 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r0, 0x0, 0x0) 17:27:59 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x300) 17:27:59 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x300) 17:27:59 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) getdents64(r0, 0x0, 0x0) 17:27:59 executing program 3: mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) ptrace$getenv(0x4201, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x4, 0x100082) socket$vsock_stream(0x28, 0x1, 0x0) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000100)={@remote, 0x2c}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f00000002c0)=0xc) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f0000000240)={0x8001007, 0x1, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe101}, [@IFLA_LINKINFO={0x20, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8}], @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}]}, 0x40}}, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r4, 0x800000c0045006, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) migrate_pages(0x0, 0x3f, &(0x7f00000001c0)=0x100000000, &(0x7f0000000200)) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000080)={@remote, @multicast1}, 0xc) 17:27:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x42, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4138ae84, &(0x7f0000000080)) 17:27:59 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x300) 17:27:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1840}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 17:27:59 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$assume_authority(0x10, r0) 17:27:59 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x300) 17:27:59 executing program 2: mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) ptrace$getenv(0x4201, r0, 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x4, 0x100082) socket$vsock_stream(0x28, 0x1, 0x0) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000100)={@remote, 0x2c}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f00000002c0)=0xc) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f0000000240)={0x8001007, 0x1, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe101}, [@IFLA_LINKINFO={0x20, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8}], @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}]}, 0x40}}, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r4, 0x800000c0045006, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) migrate_pages(0x0, 0x3f, &(0x7f00000001c0)=0x100000000, &(0x7f0000000200)) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000080)={@remote, @multicast1}, 0xc) 17:27:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x42, 0x0) ftruncate(r0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4138ae84, &(0x7f0000000080)) 17:27:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x42, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4138ae84, &(0x7f0000000080)) 17:27:59 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x300) 17:27:59 executing program 0: mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) ptrace$getenv(0x4201, r0, 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x4, 0x100082) socket$vsock_stream(0x28, 0x1, 0x0) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) sendfile(r1, r2, 0x0, 0x20000102000007) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000100)={@remote, 0x2c}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f00000002c0)=0xc) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f0000000240)={0x8001007, 0x1, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe101}, [@IFLA_LINKINFO={0x20, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8}], @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}]}, 0x40}}, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r4, 0x800000c0045006, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) migrate_pages(0x0, 0x3f, &(0x7f00000001c0)=0x100000000, &(0x7f0000000200)) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000080)={@remote, @multicast1}, 0xc) 17:27:59 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x300) 17:28:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='numa_maps\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x300) 17:28:00 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x300) 17:28:00 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000180)='\x00\x00\x00\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') r1 = socket(0x10, 0x80002, 0x0) dup2(r1, r0) 17:28:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x42, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4138ae84, &(0x7f0000000080)) 17:28:00 executing program 0: mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) ptrace$getenv(0x4201, r0, 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x4, 0x100082) socket$vsock_stream(0x28, 0x1, 0x0) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) sendfile(r1, r2, 0x0, 0x20000102000007) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000100)={@remote, 0x2c}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f00000002c0)=0xc) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f0000000240)={0x8001007, 0x1, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe101}, [@IFLA_LINKINFO={0x20, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8}], @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}]}, 0x40}}, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r4, 0x800000c0045006, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) migrate_pages(0x0, 0x3f, &(0x7f00000001c0)=0x100000000, &(0x7f0000000200)) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000080)={@remote, @multicast1}, 0xc) 17:28:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x42, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4138ae84, &(0x7f0000000080)) 17:28:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, 0x0, 0x0, 0x300) 17:28:00 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000180)='\x00\x00\x00\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') r1 = socket(0x10, 0x80002, 0x0) dup2(r1, r0) 17:28:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYRES32], 0x1}}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f0000000040)="0f20e06635000001000f22e0660f71d300dadec4c3c5cf600b010500002e660f388209677d00640f1a070f01df65670fc79b00580000", 0x36}], 0x1, 0x0, 0x0, 0xffffffffffffff15) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000180)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:28:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, 0x0, 0x0, 0x300) 17:28:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='numa_maps\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x300) 17:28:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, 0x0, 0x0, 0x300) 17:28:00 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000819000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffe000/0x2000)=nil) 17:28:00 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) sched_setattr(r1, &(0x7f0000000280)={0x30, 0x3, 0x0, 0x8000, 0x0, 0x6, 0x0, 0x3f}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 17:28:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000001400), 0x0, 0x300) 17:28:00 executing program 3: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x30, 0x3, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3f}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 147.633826] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 147.674504] syz-executor.3 (9178) used greatest stack depth: 22832 bytes left 17:28:00 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000001380)=0x7) 17:28:00 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfec0000000000000], [], @local}}, @in={0x2, 0x0, @remote}], 0x2c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e22, @remote}], 0x10) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000100), 0xa8) 17:28:00 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000007c0)=""/246) ioctl$EVIOCGREP(r0, 0x80047456, &(0x7f0000000240)=""/174) 17:28:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000001400), 0x0, 0x300) 17:28:00 executing program 3: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x30, 0x3, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3f}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 17:28:00 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)='b\n\x00\x00\x00', 0x5) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x45011, r0, 0x0) 17:28:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000001400), 0x0, 0x300) 17:28:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xb, 0x7, &(0x7f0000000180)=@framed={{}, [@generic, @alu, @jmp, @generic]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:28:01 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x405bf1f040ece520) 17:28:01 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) connect$l2tp(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x4, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x32) 17:28:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000001400)=[{0x0}], 0x1, 0x300) [ 147.877427] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 17:28:01 executing program 3: unshare(0x2040400) r0 = socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_smack_entry(r0, 0x0, 0x0, 0x0, 0x0) 17:28:01 executing program 5: r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d0000768606681d012f620000000008d5febf524a024afb78ec03a10c48d4050b0b0a2f858ad2", 0x28}], 0x1}, 0x0) 17:28:01 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000007c0)=""/246) ioctl$EVIOCGREP(r0, 0x80047456, &(0x7f0000000240)=""/174) 17:28:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 17:28:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000001400)=[{0x0}], 0x1, 0x300) 17:28:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000004c0)) r1 = socket$inet6(0xa, 0x2000000080803, 0x1) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000440)={0x2, 0x20000000200000, 0xfffffffffffffffa, 0xfd8, 0x9, 0x7, 0x9, 0x10001, 0x1, 0x0, 0x3ff, 0x3}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x4d2, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r3 = openat$cgroup_ro(r2, &(0x7f0000000b00)='cpuacct.stat\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xdf, 0x3) r4 = getuid() getgroups(0x4, &(0x7f0000000b40)=[0xee00, 0x0, 0xee01, 0xee01]) r6 = geteuid() write$P9_RSTATu(r3, &(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6], 0x75) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @empty, 0x7ff}, 0x1c) 17:28:01 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x7a, &(0x7f0000000080), &(0x7f0000000140)=0x18) 17:28:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000001400)=[{0x0}], 0x1, 0x300) 17:28:01 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="6d6183676c65000000000000000000000000000000000000000000000000000005000000000000000000100000000000000000000000000000000000000000000000000000000001002000000000000000000000000000001000000000000000c4ad0589d623e9000000000000000000000000000000000000003400000000e3c0632000000000000000cd7cf6014c4ff8d47c79b1ed4fd4497d01083d925b962d26a98052021276bacf4b7e0dc4065c7e70617d8056dbfe0708b9f0ffbb"], 0x78) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') lseek(r1, 0x3, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, 0x0) dup(0xffffffffffffffff) setfsuid(0xee00) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f00000018c0)={0x2, 0x800000000004e20, @local}, 0x10) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000200), 0x4) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) recvmsg(r3, &(0x7f0000001680)={0x0, 0xfffffde8, &(0x7f0000001600)=[{&(0x7f0000000600)=""/4096, 0xfffffcb6}], 0x1}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 17:28:01 executing program 5: sendmsg(0xffffffffffffffff, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) 17:28:01 executing program 2: msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) 17:28:01 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getcwd(0x0, 0xfffffffffffffe6d) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) 17:28:01 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r3, 0x7fff) sendfile(r1, r3, 0x0, 0x8000ffffbffe) [ 153.562171] kauditd_printk_skb: 1 callbacks suppressed [ 153.562179] audit: type=1400 audit(1568827686.712:72): avc: denied { map } for pid=9314 comm="syz-executor.2" path=2F6D656D66643A2F6465762F6E65742F74756E202864656C6574656429 dev="tmpfs" ino=35509 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 17:28:06 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x110162, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x401802, 0x2) 17:28:06 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @ipv4, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 153.663992] kasan: CONFIG_KASAN_INLINE enabled [ 153.680071] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 153.716387] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 153.722648] Modules linked in: [ 153.725851] CPU: 0 PID: 9329 Comm: syz-executor.1 Not tainted 4.14.144 #0 [ 153.732779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.742138] task: ffff88806097e600 task.stack: ffff888061208000 [ 153.748229] RIP: 0010:do_tcp_sendpages+0x33d/0x18f0 [ 153.753240] RSP: 0018:ffff88806120f6b0 EFLAGS: 00010202 [ 153.758606] RAX: 0000000000000010 RBX: 0000000000000000 RCX: ffffc90007659000 [ 153.765874] RDX: 000000000000160e RSI: ffffffff8523f03b RDI: 0000000000000080 [ 153.773145] RBP: ffff88806120f7d8 R08: ffff88806097e600 R09: 0000000000000001 [ 153.780418] R10: 0000000000000000 R11: ffff88806097e600 R12: 0000000000000075 [ 153.787811] R13: 0000000000000000 R14: dffffc0000000000 R15: ffff888083914040 [ 153.795082] FS: 00007f2cf6bce700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 153.800741] kobject: 'loop2' (ffff8880a49f20a0): kobject_uevent_env [ 153.803306] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 153.809721] kobject: 'loop2' (ffff8880a49f20a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 153.815574] CR2: 0000000000960004 CR3: 0000000099e0a000 CR4: 00000000001406f0 [ 153.815581] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 153.815586] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 153.815588] Call Trace: [ 153.815604] ? lock_sock_nested+0x9e/0x110 [ 153.815618] ? sk_stream_alloc_skb+0x780/0x780 [ 153.815627] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 153.815637] tcp_sendpage_locked+0x88/0x140 [ 153.867703] tcp_sendpage+0x3f/0x60 [ 153.871334] inet_sendpage+0x157/0x580 [ 153.875221] ? tcp_sendpage_locked+0x140/0x140 [ 153.879831] kernel_sendpage+0x92/0xf0 [ 153.883722] ? inet_sendmsg+0x500/0x500 [ 153.887698] sock_sendpage+0x8b/0xc0 [ 153.891414] ? kernel_sendpage+0xf0/0xf0 [ 153.895471] pipe_to_sendpage+0x242/0x340 [ 153.899619] ? direct_splice_actor+0x190/0x190 [ 153.904203] __splice_from_pipe+0x348/0x780 [ 153.908528] ? direct_splice_actor+0x190/0x190 [ 153.913112] ? direct_splice_actor+0x190/0x190 [ 153.917696] splice_from_pipe+0xf0/0x150 [ 153.921776] ? splice_shrink_spd+0xb0/0xb0 [ 153.926018] generic_splice_sendpage+0x3c/0x50 [ 153.930604] ? splice_from_pipe+0x150/0x150 [ 153.934927] direct_splice_actor+0x123/0x190 [ 153.939336] splice_direct_to_actor+0x29e/0x7b0 [ 153.944011] ? generic_pipe_buf_nosteal+0x10/0x10 [ 153.948918] ? do_splice_to+0x170/0x170 [ 153.952897] ? rw_verify_area+0xea/0x2b0 [ 153.955426] kobject: 'loop0' (ffff8880a4969760): kobject_uevent_env [ 153.956957] do_splice_direct+0x18d/0x230 [ 153.956967] ? splice_direct_to_actor+0x7b0/0x7b0 [ 153.972335] ? rw_verify_area+0xea/0x2b0 [ 153.973009] kobject: 'loop0' (ffff8880a4969760): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 153.976396] do_sendfile+0x4db/0xbd0 [ 153.976410] ? do_compat_pwritev64+0x140/0x140 [ 153.976420] ? put_timespec64+0xb4/0x100 [ 153.998260] ? nsecs_to_jiffies+0x30/0x30 [ 154.002412] SyS_sendfile64+0x102/0x110 [ 154.006385] ? SyS_sendfile+0x130/0x130 [ 154.010364] ? do_syscall_64+0x53/0x640 [ 154.014345] ? SyS_sendfile+0x130/0x130 [ 154.018334] do_syscall_64+0x1e8/0x640 [ 154.022228] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 154.027080] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 154.032358] RIP: 0033:0x4598e9 [ 154.035547] RSP: 002b:00007f2cf6bcdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 154.043255] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004598e9 [ 154.050525] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 154.057792] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 17:28:07 executing program 0: unshare(0x6c060000) socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r3 = accept(r2, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)="fe5bcc15add63afde2b786576521c17489e9e86ab36b92e56ab041dff7bbd6f40fce9dfb71fc53766789a72a7cbe4f2c30beb17888d1c728e6414b9eac4634e53b0f06360d4033d904000000149b61a9588b3d8f524cd980fbb82f5f6e8600ddb4a3d437fcc989bcf1ec74c5c01cc44ff494e780e2722000", 0xfffffef8}], 0x1}], 0x1, 0x0) recvmsg(r3, &(0x7f000000b680)={0x0, 0x0, 0x0}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xff4d) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x12) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x25dfdbfd, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8, 0x1, 'htb\x00'}, {0x4}}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettfilter={0x24, 0x11, 0x1}, 0x24}}, 0x0) connect$can_bcm(r1, &(0x7f0000000140), 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca50d5e0bcfe47ff070") r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f00000000c0)={'sit0\x00', 0x40000000004001}) 17:28:07 executing program 2: socket$inet(0x2, 0x3, 0x7) socket$inet(0x2, 0x3, 0x7) memfd_create(0x0, 0x4) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() read(0xffffffffffffffff, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') [ 154.065063] R10: 00008000ffffbffe R11: 0000000000000246 R12: 00007f2cf6bce6d4 [ 154.072344] R13: 00000000004c709e R14: 00000000004dc750 R15: 00000000ffffffff [ 154.079618] Code: ff ff 48 0f 44 d8 e8 c3 f2 38 fc 4d 85 e4 0f 84 9b 03 00 00 e8 b5 f2 38 fc 48 8d bb 80 00 00 00 44 8b 65 a8 48 89 f8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 74 08 3c 03 0f 8e 85 11 00 00 44 2b a3 80 [ 154.098815] RIP: do_tcp_sendpages+0x33d/0x18f0 RSP: ffff88806120f6b0 17:28:07 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @ipv4, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 17:28:07 executing program 5: 17:28:07 executing program 5: [ 154.114272] kobject: 'loop5' (ffff8880a4b03320): kobject_uevent_env [ 154.128052] kobject: 'loop5' (ffff8880a4b03320): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 154.145462] ---[ end trace f76f24aca21e3991 ]--- [ 154.155566] Kernel panic - not syncing: Fatal exception [ 154.162431] Kernel Offset: disabled [ 154.166055] Rebooting in 86400 seconds..