Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok [39;[ 38.820825] audit: type=1800 audit(1573917922.863:33): pid=7465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 49m8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 44.138149] kauditd_printk_skb: 1 callbacks suppressed [ 44.138164] audit: type=1400 audit(1573917928.173:35): avc: denied { map } for pid=7641 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.10.19' (ECDSA) to the list of known hosts. 2019/11/16 15:25:34 fuzzer started [ 50.815425] audit: type=1400 audit(1573917934.853:36): avc: denied { map } for pid=7650 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/11/16 15:25:35 dialing manager at 10.128.0.105:46261 2019/11/16 15:25:36 syscalls: 2545 2019/11/16 15:25:36 code coverage: enabled 2019/11/16 15:25:36 comparison tracing: enabled 2019/11/16 15:25:36 extra coverage: extra coverage is not supported by the kernel 2019/11/16 15:25:36 setuid sandbox: enabled 2019/11/16 15:25:36 namespace sandbox: enabled 2019/11/16 15:25:36 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/16 15:25:36 fault injection: enabled 2019/11/16 15:25:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/16 15:25:36 net packet injection: enabled 2019/11/16 15:25:36 net device setup: enabled 2019/11/16 15:25:36 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/16 15:25:36 devlink PCI setup: PCI device 0000:00:10.0 is not available 15:29:26 executing program 0: [ 282.278218] audit: type=1400 audit(1573918166.313:37): avc: denied { map } for pid=7667 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14675 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 282.382571] IPVS: ftp: loaded support on port[0] = 21 15:29:26 executing program 1: [ 282.498198] chnl_net:caif_netlink_parms(): no params data found [ 282.599182] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.618894] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.627022] device bridge_slave_0 entered promiscuous mode [ 282.636762] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.643355] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.650843] device bridge_slave_1 entered promiscuous mode [ 282.673803] IPVS: ftp: loaded support on port[0] = 21 [ 282.681189] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 282.691311] bond0: Enslaving bond_slave_1 as an active interface with an up link 15:29:26 executing program 2: [ 282.742426] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 282.750577] team0: Port device team_slave_0 added [ 282.763560] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 282.771506] team0: Port device team_slave_1 added [ 282.787352] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 282.819588] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 15:29:27 executing program 3: [ 282.911935] device hsr_slave_0 entered promiscuous mode [ 282.948901] device hsr_slave_1 entered promiscuous mode [ 283.019240] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 283.026803] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 283.040782] IPVS: ftp: loaded support on port[0] = 21 [ 283.051173] audit: type=1400 audit(1573918167.093:38): avc: denied { create } for pid=7668 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 283.118549] audit: type=1400 audit(1573918167.113:39): avc: denied { write } for pid=7668 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 283.124968] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.149345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.156407] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.162865] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.169940] audit: type=1400 audit(1573918167.113:40): avc: denied { read } for pid=7668 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 283.195826] chnl_net:caif_netlink_parms(): no params data found [ 283.230052] IPVS: ftp: loaded support on port[0] = 21 15:29:27 executing program 4: [ 283.391946] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 283.398202] 8021q: adding VLAN 0 to HW filter on device bond0 [ 283.475939] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.486871] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.511161] device bridge_slave_0 entered promiscuous mode [ 283.519751] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 283.537155] chnl_net:caif_netlink_parms(): no params data found [ 283.547705] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.557379] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.567172] device bridge_slave_1 entered promiscuous mode [ 283.597847] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 283.605575] 8021q: adding VLAN 0 to HW filter on device team0 [ 283.620953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 15:29:27 executing program 5: [ 283.652527] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.672024] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.682049] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 283.704966] IPVS: ftp: loaded support on port[0] = 21 [ 283.727182] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 283.747646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.761701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.769837] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.776573] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.792245] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 283.817465] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 283.847952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.856295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.864380] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.870804] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.880318] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 283.914771] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.921294] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.929101] device bridge_slave_0 entered promiscuous mode [ 283.949538] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 283.953132] IPVS: ftp: loaded support on port[0] = 21 [ 283.959466] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 283.973261] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.980334] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.987496] device bridge_slave_1 entered promiscuous mode [ 284.004231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 284.012968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 284.022024] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 284.030592] team0: Port device team_slave_0 added [ 284.042568] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 284.055091] chnl_net:caif_netlink_parms(): no params data found [ 284.074112] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 284.082692] team0: Port device team_slave_1 added [ 284.092726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 284.100872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 284.117683] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 284.129101] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 284.140333] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 284.152257] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 284.169799] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 284.177228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 284.185312] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 284.200147] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 284.216214] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 284.236246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 284.244067] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 284.262102] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 284.271666] team0: Port device team_slave_0 added [ 284.288577] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 284.302399] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 284.310005] team0: Port device team_slave_1 added [ 284.323795] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.331318] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.342312] device bridge_slave_0 entered promiscuous mode [ 284.350526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 284.361143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 284.374033] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 284.380792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 284.432923] device hsr_slave_0 entered promiscuous mode [ 284.489752] device hsr_slave_1 entered promiscuous mode [ 284.539097] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 284.546996] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 284.556608] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 284.563733] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.572403] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.579737] device bridge_slave_1 entered promiscuous mode [ 284.601544] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 284.614290] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 284.690802] device hsr_slave_0 entered promiscuous mode [ 284.738891] device hsr_slave_1 entered promiscuous mode [ 284.789589] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 284.817243] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 284.838883] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 284.847122] team0: Port device team_slave_0 added [ 284.855862] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 284.863423] team0: Port device team_slave_1 added [ 284.870001] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 284.892520] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 284.901301] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 284.912199] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 284.946604] chnl_net:caif_netlink_parms(): no params data found [ 284.962129] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 285.010360] device hsr_slave_0 entered promiscuous mode [ 285.048769] device hsr_slave_1 entered promiscuous mode [ 285.109413] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 285.117996] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 285.127375] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 285.135565] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 285.190382] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 285.197418] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 285.229805] chnl_net:caif_netlink_parms(): no params data found [ 285.244036] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 285.256267] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.263666] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.272671] device bridge_slave_0 entered promiscuous mode [ 285.291967] audit: type=1400 audit(1573918169.333:41): avc: denied { associate } for pid=7668 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 285.311934] 8021q: adding VLAN 0 to HW filter on device bond0 [ 285.334903] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 285.349117] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 285.356103] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.363543] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.372233] device bridge_slave_1 entered promiscuous mode 15:29:29 executing program 0: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x76656f) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 285.444141] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 285.467885] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 285.477722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.494055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.501943] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.514919] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.522808] device bridge_slave_0 entered promiscuous mode [ 285.536724] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.543516] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.551239] device bridge_slave_1 entered promiscuous mode [ 285.565541] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 285.584851] 8021q: adding VLAN 0 to HW filter on device bond0 [ 285.621290] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 285.627759] 8021q: adding VLAN 0 to HW filter on device team0 [ 285.650594] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 285.658267] audit: type=1804 audit(1573918169.693:42): pid=7694 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir917709687/syzkaller.KAS9n4/1/file0" dev="sda1" ino=16519 res=1 [ 285.685773] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 285.697465] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 285.727557] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 285.737707] team0: Port device team_slave_0 added [ 285.749190] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 285.757866] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 285.766528] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 285.775484] team0: Port device team_slave_0 added [ 285.784836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.799192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.806373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 285.815971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.824334] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.830777] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.839521] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 285.847144] team0: Port device team_slave_1 added [ 285.855349] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 285.864313] 8021q: adding VLAN 0 to HW filter on device team0 [ 285.872886] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 285.885263] audit: type=1804 audit(1573918169.913:43): pid=7694 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir917709687/syzkaller.KAS9n4/1/file0" dev="sda1" ino=16519 res=1 [ 285.919486] hrtimer: interrupt took 34907 ns [ 285.922708] team0: Port device team_slave_1 added [ 285.925502] audit: type=1804 audit(1573918169.963:44): pid=7693 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir917709687/syzkaller.KAS9n4/1/file0" dev="sda1" ino=16519 res=1 [ 285.959042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 285.968067] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 15:29:30 executing program 0: [ 285.976027] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 285.986531] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 286.005798] 8021q: adding VLAN 0 to HW filter on device bond0 [ 286.019468] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 15:29:30 executing program 0: [ 286.029217] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 286.037113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 286.053049] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.059522] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.072658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 286.089547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 286.097505] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.103940] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.112878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 15:29:30 executing program 0: [ 286.125050] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 286.135329] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 286.146295] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 286.156067] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 15:29:30 executing program 0: 15:29:30 executing program 0: [ 286.187503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 286.222344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 15:29:30 executing program 0: [ 286.235100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 286.252779] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.259247] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.271109] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 286.295239] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 286.340672] device hsr_slave_0 entered promiscuous mode [ 286.369025] device hsr_slave_1 entered promiscuous mode [ 286.429069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 286.447178] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 286.457929] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 286.466255] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 286.474573] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 286.484891] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 286.494041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 286.502130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 286.509735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 286.516790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 286.524906] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 286.533201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 286.541568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 286.610460] device hsr_slave_0 entered promiscuous mode [ 286.668839] device hsr_slave_1 entered promiscuous mode [ 286.709476] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 286.716830] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 286.726568] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 286.733235] 8021q: adding VLAN 0 to HW filter on device team0 [ 286.743194] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 286.752550] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 286.760399] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 286.767526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 286.776908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 286.786461] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 286.799918] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 286.813196] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 286.824299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 286.832936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 286.840809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 286.848705] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.855153] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.862780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 286.874547] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 286.889847] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 286.899800] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 286.906563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 286.915023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 286.923402] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.930335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.937603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 286.945810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 286.957098] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 286.967333] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 286.976577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 286.984879] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 286.992822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 287.001407] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 287.009411] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 287.019247] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 287.036504] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 287.045804] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 287.053131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 287.064104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 287.073305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 287.081538] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 287.099108] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 287.107056] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 287.118973] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 287.125699] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 287.133687] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 287.145243] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 287.156357] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 287.165378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 287.175007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 287.182816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 287.190783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 287.198811] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 287.208811] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 287.219078] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 287.225155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 287.239626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 287.247604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 287.258656] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 287.268137] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 287.280464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 287.295861] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 287.305250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 15:29:31 executing program 1: [ 287.314278] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 287.334670] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 287.341349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 287.363506] 8021q: adding VLAN 0 to HW filter on device bond0 [ 287.378360] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 287.399028] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 287.410516] 8021q: adding VLAN 0 to HW filter on device bond0 [ 287.424982] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 287.434076] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 287.447590] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 287.454916] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 287.462053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 287.470255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 287.477207] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 287.484172] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 287.494702] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 287.504055] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 287.512282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 287.520461] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 287.527601] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 287.534640] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 287.544098] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 287.551269] 8021q: adding VLAN 0 to HW filter on device team0 [ 287.560674] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 287.566744] 8021q: adding VLAN 0 to HW filter on device team0 [ 287.577593] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 287.586245] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 287.598128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 287.606615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 287.614662] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.621278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 287.631582] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 287.641385] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 287.653597] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 287.663800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 287.675212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 287.683500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 287.691828] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.698312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 287.705953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 287.714841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 287.722936] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.729378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 287.738568] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 287.747848] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 287.759826] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 287.774840] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 287.785955] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 287.801839] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 287.821466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 287.835731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 287.844724] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 287.853315] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.860079] bridge0: port 2(bridge_slave_1) entered forwarding state [ 287.867755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 287.878310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 287.887821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 287.897343] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 287.906363] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 287.917127] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready 15:29:32 executing program 2: 15:29:32 executing program 0: [ 287.931731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 287.941392] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 287.954278] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 287.972304] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 287.987883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 288.007383] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 288.021645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 288.056242] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 288.077835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 288.096722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 288.106963] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 288.118982] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 288.127853] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 288.135700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 288.144116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 288.155002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 288.163571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 288.172290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 288.180854] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 288.190927] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 288.205476] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 288.212749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 288.221439] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 288.232353] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 288.241949] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 288.251979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 288.260050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 288.267787] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 288.275449] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 288.285334] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 288.292263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 288.305411] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 288.341217] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 288.361981] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 288.368360] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 288.381129] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 288.393305] 8021q: adding VLAN 0 to HW filter on device batadv0 15:29:32 executing program 4: 15:29:32 executing program 5: 15:29:32 executing program 1: 15:29:32 executing program 3: 15:29:32 executing program 0: 15:29:32 executing program 2: 15:29:32 executing program 4: 15:29:32 executing program 1: 15:29:32 executing program 0: 15:29:32 executing program 4: 15:29:32 executing program 3: 15:29:32 executing program 2: 15:29:32 executing program 1: 15:29:32 executing program 5: 15:29:32 executing program 4: 15:29:32 executing program 0: 15:29:32 executing program 2: 15:29:32 executing program 3: 15:29:32 executing program 4: 15:29:32 executing program 5: 15:29:33 executing program 0: 15:29:33 executing program 1: 15:29:33 executing program 2: 15:29:33 executing program 5: 15:29:33 executing program 3: 15:29:33 executing program 4: 15:29:33 executing program 1: 15:29:33 executing program 0: 15:29:33 executing program 5: 15:29:33 executing program 2: 15:29:33 executing program 3: 15:29:33 executing program 4: 15:29:33 executing program 1: 15:29:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='scalable\x00', 0x9) write$binfmt_elf64(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f45414600000300b1ef000000000000add2ad015e0d00c42d000004f6ffffff00000020259eb8d19e00004000000000000000000000000800007f000052040008000000007e9f00000000feec06be00770096ff0000008104d759ade57a9715d59ce0e0a835a4d6b9fe56447cb80474f9ed4f0600000026d0ea4dba20c687b44020e148cf81be4fca8acfba6a3af862693840d6d1de3e5b8ee8006559012adeda552401b4cbfb66352cffb6bb9624b482c6413caa253ff7889f0000000000"], 0xc9) recvmmsg(r0, &(0x7f00000085c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) socket(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[], 0xffffffcc) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, [@tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @remote}]]}}}]}, 0x48}}, 0x0) 15:29:33 executing program 2: 15:29:33 executing program 0: 15:29:33 executing program 4: 15:29:33 executing program 3: 15:29:33 executing program 1: 15:29:33 executing program 4: 15:29:33 executing program 2: 15:29:33 executing program 3: 15:29:33 executing program 0: 15:29:33 executing program 2: 15:29:33 executing program 1: [ 290.122818] audit: type=1800 audit(1573918174.163:45): pid=7807 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="memory.stat" dev="sda1" ino=16554 res=0 15:29:34 executing program 5: 15:29:34 executing program 2: 15:29:34 executing program 3: 15:29:34 executing program 4: 15:29:34 executing program 0: 15:29:34 executing program 1: 15:29:34 executing program 2: 15:29:34 executing program 5: 15:29:34 executing program 1: 15:29:34 executing program 3: 15:29:34 executing program 4: 15:29:34 executing program 0: 15:29:34 executing program 5: 15:29:34 executing program 0: 15:29:34 executing program 2: 15:29:34 executing program 4: 15:29:34 executing program 1: 15:29:34 executing program 3: 15:29:34 executing program 0: 15:29:34 executing program 3: 15:29:34 executing program 4: 15:29:34 executing program 5: 15:29:34 executing program 2: 15:29:34 executing program 1: 15:29:34 executing program 2: 15:29:34 executing program 0: 15:29:34 executing program 3: 15:29:34 executing program 1: 15:29:34 executing program 5: 15:29:34 executing program 4: 15:29:34 executing program 2: 15:29:35 executing program 1: 15:29:35 executing program 0: 15:29:35 executing program 5: 15:29:35 executing program 4: 15:29:35 executing program 3: 15:29:35 executing program 2: 15:29:35 executing program 1: 15:29:35 executing program 0: 15:29:35 executing program 3: 15:29:35 executing program 4: 15:29:35 executing program 5: 15:29:35 executing program 2: 15:29:35 executing program 1: 15:29:35 executing program 5: 15:29:35 executing program 3: 15:29:35 executing program 4: 15:29:35 executing program 0: 15:29:35 executing program 5: 15:29:35 executing program 2: 15:29:35 executing program 3: 15:29:35 executing program 1: 15:29:35 executing program 4: 15:29:35 executing program 0: 15:29:35 executing program 5: 15:29:35 executing program 2: 15:29:35 executing program 3: 15:29:35 executing program 0: 15:29:35 executing program 5: 15:29:35 executing program 4: 15:29:35 executing program 1: 15:29:35 executing program 2: 15:29:35 executing program 3: 15:29:35 executing program 4: 15:29:35 executing program 1: 15:29:36 executing program 5: 15:29:36 executing program 2: 15:29:36 executing program 0: 15:29:36 executing program 3: 15:29:36 executing program 4: 15:29:36 executing program 2: 15:29:36 executing program 0: 15:29:36 executing program 5: 15:29:36 executing program 1: 15:29:36 executing program 4: 15:29:36 executing program 3: 15:29:36 executing program 0: 15:29:36 executing program 2: 15:29:36 executing program 5: 15:29:36 executing program 1: 15:29:36 executing program 4: 15:29:36 executing program 0: 15:29:36 executing program 3: 15:29:36 executing program 2: 15:29:36 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00), 0xc6, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) ftruncate(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) 15:29:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000002180)=""/4087) 15:29:36 executing program 4: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000000)=""/42) 15:29:36 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) close(r0) 15:29:36 executing program 2: 15:29:36 executing program 3: 15:29:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, [@IFLA_GRE_REMOTE={0x8, 0x7, @broadcast}]}}}]}, 0x38}}, 0x0) 15:29:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2101}) io_setup(0x20000000002, &(0x7f0000000240)=0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2101}) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)='\f', 0x1}]) dup3(r0, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x3e}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r5, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 15:29:36 executing program 2: mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000300)='./file0/../file0\x00', 0x0, 0x0) 15:29:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000040)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 15:29:36 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000300), &(0x7f0000000640)=0x4) 15:29:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0xc2822, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) open(&(0x7f00000001c0)='.\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) time(&(0x7f0000000000)) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) fchown(r4, 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0xc2957e1383611f63) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) sendfile(r0, r5, 0x0, 0x80001d00c0d0) 15:29:36 executing program 4: mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) getpgrp(0x0) setpriority(0x0, 0x0, 0xffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) geteuid() getpgid(0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[@ANYRES32], 0x4) sendfile(r0, r1, 0x0, 0x20000102000007) 15:29:37 executing program 0: socket$inet6(0xa, 0x0, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 15:29:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000002c0)="0800a169aa30fab47b1071") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500370000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) 15:29:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x8bf}, &(0x7f0000000080)=0x8) [ 293.090451] audit: type=1400 audit(1573918177.133:46): avc: denied { prog_load } for pid=8032 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 15:29:37 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmsg$nl_netfilter(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5b2585a294ea8e86de62600aab784812aae297ac248fbb25a8c5750ff953d9eb63406174c9460fcbaa91b6381329f07a9d2d64aa7c1819613207d893f02d6d6b06abab98a2b4b130c6b6471808406dc7a408c6c1f0b466f79c09df8b7d4da126f88b09fa48fa2a7a5d6afc9e4deec78e5d3d6c4b1959397f197257fc827058", @ANYRESOCT, @ANYPTR64, @ANYRESDEC, @ANYRESOCT], 0xc9}}, 0x0) sendto$inet(r0, &(0x7f00000012c0)="03", 0x1, 0x11, 0x0, 0x0) [ 293.279236] audit: type=1400 audit(1573918177.323:47): avc: denied { prog_run } for pid=8032 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 15:29:37 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_FD(r0, 0x4c06, r1) 15:29:37 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x73) sendmsg$sock(r0, &(0x7f0000000580)={&(0x7f0000000240)=@caif, 0x80, 0x0}, 0x0) 15:29:38 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setitimer(0x3, 0x0, 0x0) 15:29:38 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000006ac0)=[{{&(0x7f0000001840)=@caif=@rfm, 0x80, &(0x7f0000001a00)=[{&(0x7f00000018c0)=""/101, 0x65}, {&(0x7f0000001940)=""/162, 0xa2}], 0x2}, 0x5}, {{&(0x7f0000001a40)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000002ac0)=[{0x0}], 0x1, &(0x7f0000002b00)=""/232, 0xe8}, 0x8}, {{&(0x7f0000002c00)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f00000031c0)=[{&(0x7f0000002c80)=""/245, 0xf5}, {&(0x7f0000002d80)=""/22, 0x16}, {0x0}, {&(0x7f0000002e80)=""/228, 0xe4}, {&(0x7f0000002f80)=""/148, 0x94}, {&(0x7f0000003040)=""/129, 0x81}, {&(0x7f0000003100)=""/7, 0x7}, {&(0x7f0000003140)=""/125, 0x7d}], 0x8}, 0x1}, {{&(0x7f0000004440)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x80, &(0x7f0000005680)=[{0x0}, {&(0x7f0000004580)=""/4096, 0x1000}, {&(0x7f0000005580)=""/240, 0xf0}], 0x3}, 0x7}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000069c0)=""/254, 0xfe}}], 0x5, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 15:29:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0xc2822, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) open(&(0x7f00000001c0)='.\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) time(&(0x7f0000000000)) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) fchown(r4, 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0xc2957e1383611f63) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r0, r5, 0x0, 0x80001d00c0d0) 15:29:38 executing program 2: mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1400, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) geteuid() accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) getpgid(0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[@ANYRES32], 0x4) sendfile(r0, r1, 0x0, 0x20000102000007) 15:29:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0xc2822, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) open(&(0x7f00000001c0)='.\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) time(&(0x7f0000000000)) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) fchown(r4, 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0xc2957e1383611f63) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) sendfile(r0, r5, 0x0, 0x80001d00c0d0) 15:29:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0xc2822, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) open(&(0x7f00000001c0)='.\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) time(&(0x7f0000000000)) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) fchown(r4, 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0xc2957e1383611f63) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) sendfile(r0, r5, 0x0, 0x80001d00c0d0) [ 294.072891] syz-executor.5 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 15:29:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r4}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:38 executing program 2: clone(0x1ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) link(&(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='./file1\x00') [ 294.500247] syz-executor.5 (8095) used greatest stack depth: 22240 bytes left [ 294.546111] syz-executor.5 (8099) used greatest stack depth: 22208 bytes left 15:29:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r4}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000100)={0x12712, 0x0, &(0x7f0000fff000/0x1000)=nil}) 15:29:38 executing program 3: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000100)=[0xe7fd]) 15:29:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) [ 294.851767] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 15:29:38 executing program 3: timer_create(0x2, 0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000002e000)={{0x0, 0x989680}, {0x0, r0+10000000}}, 0x0) timer_delete(0x0) 15:29:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r4}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) [ 294.894366] audit: type=1800 audit(1573918178.933:48): pid=8105 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16608 res=0 15:29:39 executing program 4: r0 = inotify_init() r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x4000082) write$nbd(r1, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x1) unlink(&(0x7f00000001c0)='./file0\x00') sendfile(r1, r1, &(0x7f0000000200), 0xa198) 15:29:39 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @broadcast}, {0x0, @dev}, 0x5c, {0x2, 0x0, @multicast2}, 'teql0\x00'}) 15:29:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000100)={0x12712, 0x0, &(0x7f0000fff000/0x1000)=nil}) 15:29:39 executing program 1: 15:29:39 executing program 1: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6c, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) 15:29:39 executing program 2: bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 15:29:39 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='{@system/\x00', 0x7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, 0x0) clone(0x8020002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 15:29:39 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendmmsg$inet6(r0, &(0x7f0000007400)=[{{&(0x7f0000003740)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f00000038c0)={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, 0x0}}], 0x2, 0x0) 15:29:39 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 15:29:39 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto$packet(r1, 0x0, 0x0, 0x3ffffff, 0x0, 0x0) 15:29:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r4}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x15, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 15:29:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:40 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000), 0x8) 15:29:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) time(0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fchown(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 15:29:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000002, &(0x7f0000000080)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff7f, 0x8000204087ffd, 0x0, 0x138) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x7c774aac) recvfrom$inet(r0, 0x0, 0xffffffffffffffda, 0x10120, 0x0, 0xffffffffffffff73) 15:29:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000080)=0x4) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r3}]]}}}]}, 0x38}}, 0x0) 15:29:40 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 15:29:40 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) [ 296.056494] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:29:40 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='.\x00\x00\x00.\x80\x00\x00\x00\x00yz1\x00\b\x00\x00\x00', 0x200002, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) renameat(r2, &(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00') 15:29:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = dup2(r0, r0) r2 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r2, &(0x7f00000004c0)="ff", 0x1) sendfile(r1, r2, &(0x7f0000000140), 0xffff) fcntl$addseals(r2, 0x409, 0x8) 15:29:40 executing program 2: creat(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) open(0x0, 0x0, 0x0) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}]}, 0x10) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) [ 296.272910] [ 296.274922] ============================= [ 296.279070] WARNING: suspicious RCU usage [ 296.279152] 4.19.84 #0 Not tainted [ 296.279156] ----------------------------- [ 296.279172] include/linux/radix-tree.h:241 suspicious rcu_dereference_check() usage! [ 296.279177] [ 296.279177] other info that might help us debug this: [ 296.279177] [ 296.279187] [ 296.279187] rcu_scheduler_active = 2, debug_locks = 1 [ 296.279197] 2 locks held by syz-executor.1/8210: [ 296.279202] #0: 000000008c4c9837 (&sb->s_type->i_mutex_key#12){+.+.}, at: memfd_fcntl+0x235/0x1750 [ 296.279368] #1: 00000000756b866e (&(&(&mapping->i_pages)->xa_lock)->rlock){-.-.}, at: memfd_fcntl+0x4bc/0x1750 [ 296.279408] [ 296.279408] stack backtrace: [ 296.279426] CPU: 0 PID: 8210 Comm: syz-executor.1 Not tainted 4.19.84 #0 [ 296.279439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.279444] Call Trace: [ 296.279493] dump_stack+0x197/0x210 [ 296.279564] lockdep_rcu_suspicious+0x153/0x15d [ 296.279585] memfd_fcntl+0xfdf/0x1750 [ 296.291485] ? __fget+0x340/0x540 [ 296.291514] ? find_held_lock+0x35/0x130 [ 296.338672] ? __fget+0x340/0x540 [ 296.338695] ? memfd_file_seals_ptr+0x160/0x160 [ 296.338714] ? lock_downgrade+0x880/0x880 [ 296.338815] ? kasan_check_read+0x11/0x20 [ 296.338860] do_fcntl+0x200/0x1020 [ 296.359557] ? f_getown+0xc0/0xc0 [ 296.359663] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 296.359747] ? selinux_file_fcntl+0x74/0x140 15:29:40 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000006ac0)=[{{&(0x7f0000001840)=@caif=@rfm, 0x0, &(0x7f0000001a00)=[{&(0x7f00000018c0)=""/101}, {&(0x7f0000001940)=""/162}]}, 0x5}, {{&(0x7f0000001a40)=@in={0x2, 0x0, @initdev}, 0x0, &(0x7f0000002ac0)=[{&(0x7f0000001ac0)=""/4096}], 0x0, &(0x7f0000002b00)=""/232}}, {{&(0x7f0000002c00)=@pptp={0x18, 0x2, {0x0, @local}}, 0x0, &(0x7f00000031c0)=[{&(0x7f0000002c80)=""/245}, {&(0x7f0000002d80)=""/22}, {&(0x7f0000002dc0)=""/28}, {&(0x7f0000002e00)=""/118}, {&(0x7f0000002e80)=""/228}, {&(0x7f0000002f80)=""/148}, {&(0x7f0000003040)=""/129}, {&(0x7f0000003100)=""/7}, {&(0x7f0000003140)=""/125}]}}, {{&(0x7f0000003280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x0, &(0x7f00000043c0)=[{&(0x7f0000003300)=""/4096}, {&(0x7f0000004300)=""/14}, {&(0x7f0000004340)=""/92}], 0x0, &(0x7f0000004400)=""/39}}, {{&(0x7f0000004440)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x0, &(0x7f0000005680)=[{&(0x7f00000044c0)=""/171}, {&(0x7f0000004580)=""/4096}, {&(0x7f0000005580)=""/240}], 0x0, &(0x7f00000056c0)=""/4096}}, {{&(0x7f00000066c0)=@ll, 0x0, &(0x7f0000006980)=[{&(0x7f0000006740)=""/72}, {&(0x7f00000067c0)=""/221}, {&(0x7f00000068c0)=""/145}], 0x0, &(0x7f00000069c0)=""/254}}], 0x4000000000000fd, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 296.359768] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.366449] ? security_file_fcntl+0x8d/0xc0 [ 296.366473] __x64_sys_fcntl+0x16d/0x1e0 [ 296.374977] do_syscall_64+0xfd/0x620 [ 296.375000] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.375018] RIP: 0033:0x45a669 [ 296.383060] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.383069] RSP: 002b:00007fa1bdceac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 296.383090] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a669 [ 296.383098] RDX: 0000000000000008 RSI: 0000000000000409 RDI: 0000000000000004 [ 296.383107] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 296.383116] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa1bdceb6d4 [ 296.383124] R13: 00000000004c10a8 R14: 00000000004d3ca0 R15: 00000000ffffffff 15:29:40 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1412c2, 0x0) write$P9_RREADLINK(r0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYRESOCT], 0x29) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0xaf01, 0x0) r3 = eventfd(0x0) read(r3, &(0x7f00000001c0)=""/235, 0xeb) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000180)={0x0, r3}) sendfile(r3, r1, 0x0, 0x8484) [ 296.656861] audit: type=1804 audit(1573918180.693:49): pid=8222 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir575016274/syzkaller.484Z5N/33/bus" dev="sda1" ino=16627 res=1 15:29:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x3ab) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 15:29:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000006ac0)=[{{&(0x7f0000001840)=@caif=@rfm, 0x0, &(0x7f0000001a00)=[{&(0x7f00000018c0)=""/101}, {&(0x7f0000001940)=""/162}]}, 0x5}, {{&(0x7f0000001a40)=@in={0x2, 0x0, @initdev}, 0x0, &(0x7f0000002ac0)=[{&(0x7f0000001ac0)=""/4096}], 0x0, &(0x7f0000002b00)=""/232}, 0x8}, {{&(0x7f0000002c00)=@pptp={0x18, 0x2, {0x0, @local}}, 0x0, &(0x7f00000031c0)=[{&(0x7f0000002c80)=""/245}, {&(0x7f0000002d80)=""/22}, {&(0x7f0000002dc0)=""/28}, {&(0x7f0000002e00)=""/118}, {&(0x7f0000002e80)=""/228}, {&(0x7f0000002f80)=""/148}, {&(0x7f0000003040)=""/129}, {&(0x7f0000003100)=""/7}, {&(0x7f0000003140)=""/125}]}}, {{&(0x7f0000003280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x0, &(0x7f00000043c0)=[{&(0x7f0000003300)=""/4096}, {&(0x7f0000004300)=""/14}, {&(0x7f0000004340)=""/92}], 0x0, &(0x7f0000004400)=""/39}}, {{&(0x7f0000004440)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x0, &(0x7f0000005680)=[{&(0x7f00000044c0)=""/171}, {&(0x7f0000004580)=""/4096}, {&(0x7f0000005580)=""/240}], 0x0, &(0x7f00000056c0)=""/4096}, 0x7}, {{&(0x7f00000066c0)=@ll, 0x0, &(0x7f0000006980)=[{&(0x7f0000006740)=""/72}, {&(0x7f00000067c0)=""/221}, {&(0x7f00000068c0)=""/145}], 0x0, &(0x7f00000069c0)=""/254}}], 0x4000000000000fd, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 15:29:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c4838987e9ba1ce, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 15:29:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000080)=0x4) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r3}]]}}}]}, 0x38}}, 0x0) 15:29:41 executing program 2: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000040)={0x77359400}) 15:29:41 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x3ab) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 15:29:41 executing program 2: r0 = memfd_create(&(0x7f0000000080)='trusted.overlay.redirect\x00', 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0xffffff6c) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) 15:29:41 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bj\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\x00\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xc1\xb8\xde\xf6\x8153\x1a\x11VEG(\x93\x18u\xed\xd1\x1aH\xf8\xb5\x16\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xfb\x92\x99\x0f\x8b\xc8A\xc8\xb4=Y;\xa8\xed6\xf1\x14\'\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mq\xc7\x00\x00\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc0\x8c\xa8^\xb7\x1f\x80\x05\x03\xc2\xd2Ca\xe7\x19\x9f\x16w\xc0\xec\x9c\x94\x92\xbf\x81\xbb\xef9C\xcb(*F\vHFw\x04\x1d\xc7L\xa39C kW\xb2\xe9\xe6\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00\x00\x00\x00U\\\x80!\x00\x00W\x00\x00v\x99\x8f\x86s:\x8a\a\x16je\xedN\x8b|\x9a\x8d\xeb\xf03\xda\x90\xb4\xd33E\xb6\xfa\xcc\xb2M+\x89\x93/\x8a\xad\x89\xd9\x7f\n\x1b^\x99e\xa9\"\aM\x902\x90\xcc*s\x96\x19z.M<\xb9\xa8l\f\xfc\r\x91\x1c\rc\xe40\a\x17,/\x88I\x0f\\F\xc6\x95T\xb9-\xa3%\xe7\x1c\xd2\xd1\xf9X\xfe\x13\b\xd6\xa4\xed\xa7\x9aO\xac\xb4h\xc1\xca\xe2/a\xee\x0f\xe8\n') r4 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r4, r3) [ 297.406205] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8261 comm=syz-executor.1 [ 297.453634] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8261 comm=syz-executor.1 15:29:41 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000006ac0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001a40)=@in={0x2, 0x0, @initdev}, 0x80, 0x0}}], 0x2, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 297.517878] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8261 comm=syz-executor.1 15:29:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000008840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 297.594104] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8261 comm=syz-executor.1 [ 297.610981] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8261 comm=syz-executor.1 [ 297.625097] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8261 comm=syz-executor.1 [ 297.653397] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8261 comm=syz-executor.1 15:29:41 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)={r2, 0x1c, "17d5a2f3ef2d5cb226d556937bd3a53f8e6d597ab3c71c0211b672d0"}, &(0x7f0000001040)=0x24) [ 297.697472] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8261 comm=syz-executor.1 15:29:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:41 executing program 3: r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) [ 297.774330] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8261 comm=syz-executor.1 [ 297.824835] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8261 comm=syz-executor.1 15:29:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="3800000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800120008000100676265000c00020400000000000000ff"], 0x38}}, 0x0) 15:29:42 executing program 0: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) 15:29:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f00000000c0)={0x1, 0x0, [{0x8f6}]}) 15:29:42 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000001e0001cd26ccc5124a060000000000004000070000007adff4f96e6830708880e65174cc63261cdd27075b109df55904dd38f41f90afcc392b166af498a06362fda3d59a8628fc42dbf4a8c12df0c7a2d1120a51b40b7380351ec757f24d05481224d03158759de8da0fdfd2c9823953c7cfce2a5207a871274d6d702acffaf52fb121668632190123f8e61a2969bf", @ANYRES32=0x0, @ANYBLOB="0000000000e6d4fc0900"/20], 0x28}}, 0x0) 15:29:42 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = syz_open_dev$mice(0x0, 0x0, 0x8400) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000000)=0xa2ea) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, 0x0, &(0x7f0000000100)) ioctl$TIOCGISO7816(r1, 0x80285442, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000001580)={0x0, &(0x7f0000000180), 0x1, 0xffffffffffffffff, 0xe2c1a59609f47730}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) lstat(0x0, &(0x7f0000001500)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, 0x0, 0xffffffffffffffff}}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x88888, 0x0) io_setup(0x0, &(0x7f0000000280)) 15:29:42 executing program 4: semop(0x0, &(0x7f0000001900)=[{0x4, 0x80000001}, {0x0, 0x0, 0xb52d7de6e61f1278}, {0x4}], 0x3) [ 298.175201] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 298.253344] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 15:29:42 executing program 1: 15:29:42 executing program 2: 15:29:42 executing program 4: 15:29:42 executing program 3: 15:29:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:42 executing program 2: 15:29:42 executing program 4: 15:29:42 executing program 3: 15:29:42 executing program 0: 15:29:42 executing program 1: 15:29:42 executing program 2: 15:29:42 executing program 0: 15:29:42 executing program 1: 15:29:42 executing program 4: 15:29:42 executing program 3: 15:29:42 executing program 2: 15:29:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:42 executing program 0: 15:29:42 executing program 1: 15:29:42 executing program 4: 15:29:43 executing program 3: 15:29:43 executing program 2: 15:29:43 executing program 4: 15:29:43 executing program 1: 15:29:43 executing program 0: 15:29:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:43 executing program 2: 15:29:43 executing program 3: 15:29:43 executing program 4: 15:29:43 executing program 1: 15:29:43 executing program 2: 15:29:43 executing program 0: 15:29:43 executing program 3: 15:29:43 executing program 4: 15:29:43 executing program 1: 15:29:43 executing program 0: 15:29:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r4}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:43 executing program 4: 15:29:43 executing program 2: 15:29:43 executing program 3: 15:29:43 executing program 1: 15:29:43 executing program 4: 15:29:43 executing program 0: 15:29:43 executing program 3: 15:29:43 executing program 2: 15:29:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r4}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:43 executing program 4: 15:29:43 executing program 1: 15:29:43 executing program 0: 15:29:43 executing program 3: 15:29:43 executing program 2: 15:29:43 executing program 4: 15:29:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r4}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:43 executing program 1: 15:29:44 executing program 0: 15:29:44 executing program 2: 15:29:44 executing program 3: 15:29:44 executing program 4: 15:29:44 executing program 1: 15:29:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket(0xa, 0x1, 0x0) close(r2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r3}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:44 executing program 0: 15:29:44 executing program 3: 15:29:44 executing program 2: 15:29:44 executing program 4: 15:29:44 executing program 1: 15:29:44 executing program 0: 15:29:44 executing program 3: 15:29:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket(0xa, 0x1, 0x0) close(r2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r3}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:44 executing program 4: 15:29:44 executing program 2: 15:29:44 executing program 1: 15:29:44 executing program 0: 15:29:44 executing program 3: 15:29:44 executing program 4: 15:29:44 executing program 2: 15:29:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket(0xa, 0x1, 0x0) close(r2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r3}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:44 executing program 0: 15:29:44 executing program 1: 15:29:44 executing program 3: 15:29:44 executing program 4: 15:29:44 executing program 2: 15:29:44 executing program 0: 15:29:44 executing program 1: 15:29:44 executing program 4: 15:29:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket(0xa, 0x1, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r4}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:44 executing program 1: 15:29:44 executing program 3: 15:29:44 executing program 2: 15:29:45 executing program 0: 15:29:45 executing program 4: 15:29:45 executing program 1: 15:29:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket(0xa, 0x1, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r4}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:45 executing program 2: 15:29:45 executing program 3: 15:29:45 executing program 0: 15:29:45 executing program 4: 15:29:45 executing program 1: 15:29:45 executing program 2: 15:29:45 executing program 0: 15:29:45 executing program 3: 15:29:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket(0xa, 0x1, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r4}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:45 executing program 4: 15:29:45 executing program 2: 15:29:45 executing program 1: 15:29:45 executing program 0: 15:29:45 executing program 3: 15:29:45 executing program 4: 15:29:45 executing program 1: 15:29:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_REMOTE={0x8, 0x5, @dev}]}}}]}, 0x38}}, 0x0) 15:29:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) close(0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r3}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:45 executing program 0: add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) 15:29:45 executing program 3: r0 = epoll_create1(0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r1) 15:29:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x37, 0x0, &(0x7f0000000100)=0x795d307e6212b7e6) 15:29:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8943, &(0x7f00000002c0)={'ip_vti0\x00', @ifru_settings={0x0, 0x0, @fr_pvc=0x0}}) 15:29:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x13, 0x0, 0x0) 15:29:45 executing program 4: futex(&(0x7f0000000140), 0x8b, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 15:29:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001680)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)="423f46ac851ccd2002bf9ebd3c3b807be843bc3d330bc8e03d939f811670a43418f58a3a732560b1882ea3797e", 0x2d}, {&(0x7f0000000200)="16c89898cdf252e39a502e3e967715ae89fe328e0cee7a497bf63d36f9bbe7149108d65e30d479", 0x27}], 0x2}}], 0x1, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:29:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev_mcast\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/248, 0xf8}], 0x1, 0x3) 15:29:45 executing program 4: mlockall(0x3) io_setup(0x9, &(0x7f0000000240)) 15:29:46 executing program 1: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) io_setup(0xb, &(0x7f0000000040)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) io_setup(0xb, &(0x7f0000000040)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) io_setup(0xb, &(0x7f0000000040)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) io_setup(0xb, &(0x7f0000000040)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) io_setup(0xb, &(0x7f0000000040)) 15:29:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, 0x0, 0x0) 15:29:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) close(0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r3}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:46 executing program 2: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r0, &(0x7f0000000100)={'systemH\x92w\xc6T+\x0e\xfe\x91|\xb5t_u:object_r:i5\xb9\x8f\'l\x97`=\x81\xfag\xd6ptables_unit_t:s0', 0x20, 'system_u:object_r:crontab_exec_t:s0', 0x20, 0x0, 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}, 0xa4) 15:29:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x22, 0x0, &(0x7f0000000040)) 15:29:46 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 15:29:46 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000400)={&(0x7f00000000c0)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000540)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@cipso={0x86, 0xa, 0x1800, [{0x0, 0x2}, {0x0, 0x2}]}]}}}], 0x20}, 0x0) 15:29:46 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 15:29:46 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @empty}, 0x4010}, 0x408) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)}, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) [ 302.515570] audit: type=1400 audit(1573918186.553:50): avc: denied { validate_trans } for pid=8601 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 15:29:46 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$uid(0x3, 0x0) 15:29:46 executing program 3: open(&(0x7f0000000000)='./file0\x00', 0xc296c41ef2cc7089, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="14"], 0x1}}, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) socket$inet(0x10, 0x3, 0x0) 15:29:46 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x800000805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) 15:29:46 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev_mcast\x00') sendfile(r0, r1, 0x0, 0x100000001) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xa04c3, 0x0) [ 302.667265] input: syz0 as /devices/virtual/input/input5 15:29:46 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x1) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) [ 302.773631] input: syz0 as /devices/virtual/input/input6 [ 302.824736] audit: type=1400 audit(1573918186.863:51): avc: denied { mac_admin } for pid=8633 comm="syz-executor.4" capability=33 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 302.825063] SELinux: Context 27 bridge_slave_0 1 0 333300000001 [ 302.825063] 27 bridge_slave_0 1 0 01005e000001 [ 302.825063] 27 bridge_slave_0 1 0 3333ff175b03 [ 302.825063] 32 veth1_to_bond 1 0 333300000001 [ 302.825063] 32 veth1_to_bond 1 0 01005e000001 [ 302.825063] 32 veth1_to_bond 1 0 3333ff00001e [ 302.825063] 32 veth1_to_bond 1 0 3333ffaaaa1e [ 302.825063] 23 netdevsim4 1 0 333300000001 [ 302.825063] 23 netdevsim4 1 0 01005e000001 [ 302.825063] 4 gretap0 1 0 333300000001 [ 302.825063] 4 gretap0 1 0 01005e000001 [ 302.825063] 4 gretap0 1 0 3333ff000010 [ 302.825063] 4 gretap0 1 0 3333ffaaaa10 [ 302.825063] 24 veth0 1 0 333300000001 [ 302.825063] 24 veth0 1 0 01005e000001 [ 302.825063] 24 veth0 1 0 3333ff000018 15:29:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) close(0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r3}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f00000002c0)={'sit0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}}) 15:29:47 executing program 3: futex(0x0, 0x8c, 0x1, 0x0, &(0x7f0000007d00), 0x0) 15:29:47 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x8, 0x0, &(0x7f0000000280)=[@decrefs], 0x0, 0x0, 0x0}) 15:29:47 executing program 4: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000006c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_FIOGETOWN(r1, 0x8903, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:29:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000100)) 15:29:47 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendfile(r3, r0, 0x0, 0x80000008000000a) 15:29:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000080)) 15:29:47 executing program 2: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000280), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 15:29:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) getsockopt$sock_int(r0, 0x1, 0x10, 0x0, &(0x7f00000000c0)) 15:29:47 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 15:29:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) 15:29:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r4}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x12) 15:29:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc020660b, 0x400007) 15:29:48 executing program 4: init_module(&(0x7f0000000400)='-&+:*(,-(\x03\x00', 0x409, &(0x7f0000000380)='ramfs\x00\x9f\x01\x04/\x84\xd7\xf1\xdb\xacY]\xff;\x1dRbO5i\xa8\x9e@\x02ko{g\xeb\xa4\xf8\xd5\xf3+\xa78p0B\xf2M\x02\x02\x1eOCJ\x0f\xd1\xd9\xf9Y\xe9\xbc\xfd\x92\x86b\xce\x14QF\x19Z\x03\xa1\x87b\r\x1ewN\x8fE\xa8\xc9\xd31') 15:29:48 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffff2, 0x4002012, r1, 0x0) 15:29:48 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000180)) 15:29:48 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f00000000c0)=0x4, 0x4) [ 304.243329] audit: type=1400 audit(1573918188.283:52): avc: denied { module_load } for pid=8695 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=1 15:29:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x21, &(0x7f00000000c0), 0x170) 15:29:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000400)={&(0x7f00000000c0)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1c000000000000000000000007000000860a00004581275453501800"], 0x1c}, 0x0) 15:29:48 executing program 2: r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) [ 304.359784] audit: type=1804 audit(1573918188.323:53): pid=8697 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir575016274/syzkaller.484Z5N/63/bus" dev="sda1" ino=16701 res=1 15:29:48 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000300)) 15:29:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r4}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) [ 304.546108] binder: 8722:8724 ioctl 4018620d 20000300 returned -22 15:29:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000080001bd3e875b862bf29c001f120200030000001a000000000000000000ef75c3304a432163c2df683e5be7d10e6a8b6390d3553542229b9e356ed326f343c0b93fd5ae46"], 0x48}}, 0x0) 15:29:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x206, 0xffffffffffffffff, 0x6f77}, 0x22) 15:29:48 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) chmod(&(0x7f00000003c0)='./file0\x00', 0x0) 15:29:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r2, @ANYBLOB="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"], 0x48}}, 0x0) [ 304.733530] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 304.798388] audit: type=1804 audit(1573918188.833:54): pid=8708 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir575016274/syzkaller.484Z5N/63/bus" dev="sda1" ino=16701 res=1 15:29:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() ioprio_set$pid(0x3, r2, 0x0) 15:29:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000400)={&(0x7f00000000c0)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_retopts={{0x18, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x1800, [{0x0, 0x2}]}]}}}], 0x30}, 0x0) [ 304.857619] audit: type=1800 audit(1573918188.883:55): pid=8739 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16701 res=0 15:29:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r4}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) [ 304.928412] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 304.941514] audit: type=1400 audit(1573918188.983:56): avc: denied { map_create } for pid=8740 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 15:29:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/create\x00', 0x2, 0x0) write$binfmt_aout(r1, 0x0, 0x0) 15:29:49 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) dup2(r1, r0) [ 305.071967] audit: type=1400 audit(1573918189.013:57): avc: denied { map_create } for pid=8740 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 15:29:49 executing program 1: munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) [ 305.419630] audit: type=1400 audit(1573918189.463:58): avc: denied { map } for pid=8748 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 305.552073] audit: type=1400 audit(1573918189.483:59): avc: denied { map } for pid=8748 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:29:49 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, &(0x7f0000000100)='\x80\xf5\xf4\xa3\n\x99\xb6\x19Z\x9aj\\A\x9f\xc2 \x11\xe3\t:\x8e*\xb0\x80&\x19]D\x97\xf5\x19=\xea{\xc1E\b\xef/\xa9\x94|\xbd\x10}4\xa5 \xcc\xd6\x11\xd9S\xfe\xd1u\xd7%\xa1\x96|') 15:29:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) ioprio_get$uid(0x3, r2) 15:29:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r3}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 15:29:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r2}]]}}}]}, 0x38}}, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 15:29:50 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000300)='\b'}) 15:29:50 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="83", 0x1}], 0x1, 0x6)