[   32.243007] kauditd_printk_skb: 9 callbacks suppressed
[   32.243014] audit: type=1800 audit(1564346311.719:33): pid=6919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0
[   32.269666] audit: type=1800 audit(1564346311.719:34): pid=6919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0

Debian GNU/Linux 7 syzkaller ttyS0

syzkaller login: [   36.463947] random: sshd: uninitialized urandom read (32 bytes read)
[   36.735487] audit: type=1400 audit(1564346316.209:35): avc:  denied  { map } for  pid=7092 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[   36.787168] random: sshd: uninitialized urandom read (32 bytes read)
[   37.434020] random: sshd: uninitialized urandom read (32 bytes read)
Warning: Permanently added '10.128.10.1' (ECDSA) to the list of known hosts.
[   42.970504] random: sshd: uninitialized urandom read (32 bytes read)
2019/07/28 20:38:42 fuzzer started
[   43.179414] audit: type=1400 audit(1564346322.649:36): avc:  denied  { map } for  pid=7101 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
[   45.103776] random: cc1: uninitialized urandom read (8 bytes read)
2019/07/28 20:38:45 dialing manager at 10.128.0.105:45179
2019/07/28 20:38:45 syscalls: 2461
2019/07/28 20:38:45 code coverage: enabled
2019/07/28 20:38:45 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument
2019/07/28 20:38:45 extra coverage: extra coverage is not supported by the kernel
2019/07/28 20:38:45 setuid sandbox: enabled
2019/07/28 20:38:45 namespace sandbox: enabled
2019/07/28 20:38:45 Android sandbox: /sys/fs/selinux/policy does not exist
2019/07/28 20:38:45 fault injection: enabled
2019/07/28 20:38:45 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/07/28 20:38:45 net packet injection: enabled
2019/07/28 20:38:45 net device setup: enabled
[   47.502318] random: crng init done
20:40:56 executing program 5:
shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000)
msync(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4)

20:40:56 executing program 0:
r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0xff, 0x1}, 0x20)
dup3(r0, r1, 0x80000)

[  177.152471] audit: type=1400 audit(1564346456.629:37): avc:  denied  { map } for  pid=7101 comm="syz-fuzzer" path="/root/syzkaller-shm888234199" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1
20:40:56 executing program 3:
perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
socket$kcm(0x10, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x803, 0x0)
sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000017c0)="23000000560081aee4f80b00000f00fe078bc36f16000072fd670c87594d0063dac37b", 0x23}], 0x1}, 0x0)

20:40:56 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000010001c0"])

20:40:56 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000800000c0"])

20:40:56 executing program 4:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0)
mount$overlay(0x400000, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB=',lowerdir=.:file0'])
r0 = open$dir(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0)
renameat2(r0, &(0x7f0000000040)='./file0/file0\x00', r0, &(0x7f0000000080)='./file0/file0\x00', 0x0)

[  177.187026] audit: type=1400 audit(1564346456.649:38): avc:  denied  { map } for  pid=7118 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=68 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
[  178.050182] IPVS: ftp: loaded support on port[0] = 21
[  178.575380] chnl_net:caif_netlink_parms(): no params data found
[  178.584662] IPVS: ftp: loaded support on port[0] = 21
[  178.635464] bridge0: port 1(bridge_slave_0) entered blocking state
[  178.642239] bridge0: port 1(bridge_slave_0) entered disabled state
[  178.649073] device bridge_slave_0 entered promiscuous mode
[  178.658031] bridge0: port 2(bridge_slave_1) entered blocking state
[  178.664468] bridge0: port 2(bridge_slave_1) entered disabled state
[  178.671412] device bridge_slave_1 entered promiscuous mode
[  178.696289] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  178.705589] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  178.727130] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  178.734433] team0: Port device team_slave_0 added
[  178.741542] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  178.748649] team0: Port device team_slave_1 added
[  178.754138] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  178.763626] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  178.781882] IPVS: ftp: loaded support on port[0] = 21
[  178.862322] device hsr_slave_0 entered promiscuous mode
[  178.900280] device hsr_slave_1 entered promiscuous mode
[  178.959560] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  178.969592] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  178.985014] chnl_net:caif_netlink_parms(): no params data found
[  179.025449] bridge0: port 2(bridge_slave_1) entered blocking state
[  179.031862] bridge0: port 2(bridge_slave_1) entered forwarding state
[  179.038519] bridge0: port 1(bridge_slave_0) entered blocking state
[  179.044893] bridge0: port 1(bridge_slave_0) entered forwarding state
[  179.068179] bridge0: port 1(bridge_slave_0) entered blocking state
[  179.074883] bridge0: port 1(bridge_slave_0) entered disabled state
[  179.081891] device bridge_slave_0 entered promiscuous mode
[  179.088633] bridge0: port 2(bridge_slave_1) entered blocking state
[  179.095073] bridge0: port 2(bridge_slave_1) entered disabled state
[  179.101917] device bridge_slave_1 entered promiscuous mode
[  179.121763] IPVS: ftp: loaded support on port[0] = 21
[  179.153408] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  179.172691] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  179.223961] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  179.231880] team0: Port device team_slave_0 added
[  179.255129] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  179.262385] team0: Port device team_slave_1 added
[  179.276314] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  179.284093] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  179.291965] IPVS: ftp: loaded support on port[0] = 21
[  179.298694] chnl_net:caif_netlink_parms(): no params data found
[  179.372996] device hsr_slave_0 entered promiscuous mode
[  179.440246] device hsr_slave_1 entered promiscuous mode
[  179.514033] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  179.521230] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  179.603023] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  179.609088] 8021q: adding VLAN 0 to HW filter on device bond0
[  179.618887] bridge0: port 1(bridge_slave_0) entered blocking state
[  179.625562] bridge0: port 1(bridge_slave_0) entered disabled state
[  179.632432] device bridge_slave_0 entered promiscuous mode
[  179.639447] bridge0: port 1(bridge_slave_0) entered disabled state
[  179.647857] bridge0: port 2(bridge_slave_1) entered disabled state
[  179.654810] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  179.669514] chnl_net:caif_netlink_parms(): no params data found
[  179.690298] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  179.696528] bridge0: port 2(bridge_slave_1) entered blocking state
[  179.703012] bridge0: port 2(bridge_slave_1) entered disabled state
[  179.709853] device bridge_slave_1 entered promiscuous mode
[  179.721953] IPVS: ftp: loaded support on port[0] = 21
[  179.728493] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  179.777318] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  179.802911] bridge0: port 1(bridge_slave_0) entered blocking state
[  179.809352] bridge0: port 1(bridge_slave_0) entered disabled state
[  179.816664] device bridge_slave_0 entered promiscuous mode
[  179.824562] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  179.832424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  179.839313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  179.850942] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  179.857018] 8021q: adding VLAN 0 to HW filter on device team0
[  179.876969] bridge0: port 2(bridge_slave_1) entered blocking state
[  179.884890] bridge0: port 2(bridge_slave_1) entered disabled state
[  179.892096] device bridge_slave_1 entered promiscuous mode
[  179.899130] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  179.963646] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  179.971288] team0: Port device team_slave_0 added
[  179.978026] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  179.999621] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  180.008119] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  180.015569] team0: Port device team_slave_1 added
[  180.021477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  180.029133] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  180.036857] bridge0: port 1(bridge_slave_0) entered blocking state
[  180.043205] bridge0: port 1(bridge_slave_0) entered forwarding state
[  180.058971] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  180.069113] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  180.079157] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  180.102722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  180.110562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  180.118021] bridge0: port 2(bridge_slave_1) entered blocking state
[  180.124405] bridge0: port 2(bridge_slave_1) entered forwarding state
[  180.131312] chnl_net:caif_netlink_parms(): no params data found
[  180.145288] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  180.159621] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  180.173981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  180.193529] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  180.201759] team0: Port device team_slave_0 added
[  180.226834] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  180.234997] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  180.243529] team0: Port device team_slave_1 added
[  180.254834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  180.265922] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  180.284242] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  180.342049] device hsr_slave_0 entered promiscuous mode
[  180.380266] device hsr_slave_1 entered promiscuous mode
[  180.420563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  180.428286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  180.437974] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  180.457472] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  180.465296] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  180.472337] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  180.479191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  180.486813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  180.496243] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  180.562030] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  180.574750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  180.582505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  180.592259] 8021q: adding VLAN 0 to HW filter on device bond0
[  180.615035] chnl_net:caif_netlink_parms(): no params data found
[  180.663996] device hsr_slave_0 entered promiscuous mode
[  180.700321] device hsr_slave_1 entered promiscuous mode
[  180.741601] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  180.749095] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  180.755447] bridge0: port 1(bridge_slave_0) entered blocking state
[  180.762134] bridge0: port 1(bridge_slave_0) entered disabled state
[  180.769011] device bridge_slave_0 entered promiscuous mode
[  180.775757] bridge0: port 2(bridge_slave_1) entered blocking state
[  180.782200] bridge0: port 2(bridge_slave_1) entered disabled state
[  180.789275] device bridge_slave_1 entered promiscuous mode
[  180.802322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  180.809849] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  180.818555] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  180.826260] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  180.849740] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  180.856986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  180.865057] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  180.889766] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  180.899722] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  180.914385] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  180.922472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  180.929348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  180.941482] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  180.947533] 8021q: adding VLAN 0 to HW filter on device team0
[  180.978622] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  180.994559] 8021q: adding VLAN 0 to HW filter on device batadv0
[  181.004369] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  181.021592] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  181.028604] bridge0: port 1(bridge_slave_0) entered blocking state
[  181.035499] bridge0: port 1(bridge_slave_0) entered disabled state
[  181.042371] device bridge_slave_0 entered promiscuous mode
[  181.049209] bridge0: port 2(bridge_slave_1) entered blocking state
[  181.055784] bridge0: port 2(bridge_slave_1) entered disabled state
[  181.064461] device bridge_slave_1 entered promiscuous mode
[  181.071160] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  181.078178] team0: Port device team_slave_0 added
[  181.085298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  181.093417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  181.101380] bridge0: port 1(bridge_slave_0) entered blocking state
[  181.107743] bridge0: port 1(bridge_slave_0) entered forwarding state
[  181.117019] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  181.140991] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  181.148178] team0: Port device team_slave_1 added
[  181.154082] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  181.162228] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  181.169599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  181.176797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  181.184561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  181.192698] bridge0: port 2(bridge_slave_1) entered blocking state
[  181.199066] bridge0: port 2(bridge_slave_1) entered forwarding state
[  181.208494] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  181.219268] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  181.228572] bond0: Enslaving bond_slave_1 as an active interface with an up link
20:41:00 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000003a0000009bd91873a7"])

[  181.258857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  181.270571] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  181.280488] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  181.338841] device hsr_slave_0 entered promiscuous mode
[  181.349196] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.
20:41:00 executing program 5:

[  181.395477] device hsr_slave_1 entered promiscuous mode
20:41:00 executing program 5:

20:41:00 executing program 5:

[  181.440410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  181.448166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  181.467393] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  181.479619] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
20:41:00 executing program 5:

20:41:01 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000040000091000040"])

[  181.494763] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  181.513271] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  181.521697] team0: Port device team_slave_0 added
[  181.527444] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  181.544947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  181.556050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  181.575184] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
20:41:01 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000004001"])

[  181.592495] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  181.599689] team0: Port device team_slave_1 added
[  181.617855] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  181.641664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  181.651110] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  181.668585] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  181.684952] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  181.705453] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  181.718499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  181.741966] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  181.747982] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  181.771188] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  181.784923] 8021q: adding VLAN 0 to HW filter on device bond0
[  181.804083] 8021q: adding VLAN 0 to HW filter on device bond0
[  181.815571] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  181.823298] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  181.843447] 8021q: adding VLAN 0 to HW filter on device batadv0
[  181.893833] device hsr_slave_0 entered promiscuous mode
[  181.940306] device hsr_slave_1 entered promiscuous mode
[  181.980989] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  181.988127] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  182.001088] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  182.008742] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  182.027783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  182.037018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  182.044762] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  182.061289] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  182.068755] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  182.082233] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  182.088291] 8021q: adding VLAN 0 to HW filter on device team0
[  182.099418] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  182.107910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  182.115524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  182.122541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  182.130361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  182.137853] bridge0: port 1(bridge_slave_0) entered blocking state
[  182.144221] bridge0: port 1(bridge_slave_0) entered forwarding state
[  182.162396] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  182.168464] 8021q: adding VLAN 0 to HW filter on device team0
[  182.182601] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  182.189595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  182.197255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  182.205141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  182.213180] bridge0: port 1(bridge_slave_0) entered blocking state
[  182.219552] bridge0: port 1(bridge_slave_0) entered forwarding state
[  182.229871] 8021q: adding VLAN 0 to HW filter on device bond0
[  182.242352] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  182.253813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  182.262122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  182.270443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  182.278159] bridge0: port 2(bridge_slave_1) entered blocking state
[  182.284560] bridge0: port 2(bridge_slave_1) entered forwarding state
[  182.300732] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  182.309837] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  182.321251] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  182.330562] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  182.340736] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  182.348448] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  182.356585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  182.363760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  182.371697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  182.379437] bridge0: port 2(bridge_slave_1) entered blocking state
[  182.385826] bridge0: port 2(bridge_slave_1) entered forwarding state
[  182.392930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  182.400720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  182.415900] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  182.426397] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
20:41:01 executing program 0:

[  182.433164] 8021q: adding VLAN 0 to HW filter on device team0
[  182.444743] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  182.451789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  182.459599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  182.475620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  182.484822] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  182.495013] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  182.516103] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  182.528287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  182.536517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  182.544707] bridge0: port 1(bridge_slave_0) entered blocking state
[  182.551109] bridge0: port 1(bridge_slave_0) entered forwarding state
[  182.558312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  182.567626] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  182.579275] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  182.589734] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  182.599464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  182.606480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  182.614251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  182.621798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  182.629278] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  182.636988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  182.644911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  182.652554] bridge0: port 2(bridge_slave_1) entered blocking state
[  182.658885] bridge0: port 2(bridge_slave_1) entered forwarding state
[  182.665951] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  182.675668] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  182.685454] 8021q: adding VLAN 0 to HW filter on device bond0
[  182.693337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  182.700987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  182.709252] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  182.722039] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  182.729770] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  182.739161] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  182.745640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  182.754262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  182.761852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  182.769369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  182.776992] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  182.786988] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  182.795866] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  182.802609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  182.811630] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  182.819008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  182.827342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  182.834792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  182.844572] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  182.852960] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  182.861460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  182.868266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  182.875669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  182.883434] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  182.891876] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  182.898589] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  182.905593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  182.913151] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  182.923197] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  182.935449] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  182.945172] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  182.952538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  182.960290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  182.967779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  182.975291] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  182.986243] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  182.993104] 8021q: adding VLAN 0 to HW filter on device team0
[  183.003424] 8021q: adding VLAN 0 to HW filter on device batadv0
[  183.013494] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  183.021351] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  183.027350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  183.039381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  183.047372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  183.059546] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  183.065948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  183.074247] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  183.086554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  183.094768] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  183.107167] bridge0: port 1(bridge_slave_0) entered blocking state
[  183.113544] bridge0: port 1(bridge_slave_0) entered forwarding state
[  183.120999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  183.130569] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  183.141241] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  183.155950] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  183.164394] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  183.171749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  183.179463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  183.188736] bridge0: port 2(bridge_slave_1) entered blocking state
[  183.195139] bridge0: port 2(bridge_slave_1) entered forwarding state
[  183.203483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  183.211586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  183.221448] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  183.231008] 8021q: adding VLAN 0 to HW filter on device batadv0
[  183.242188] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  183.264009] 8021q: adding VLAN 0 to HW filter on device batadv0
[  183.271877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  183.279573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  183.288098] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  183.313144] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  183.325163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  183.339434] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  183.360490] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  183.376163] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  183.386640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  183.394199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  183.401940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  183.412836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  183.429275] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  183.437988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  183.465925] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  183.483865] 8021q: adding VLAN 0 to HW filter on device batadv0
20:41:03 executing program 3:
perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
socket$kcm(0x10, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x803, 0x0)
sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000017c0)="23000000560081aee4f80b00000f00fe078bc36f16000072fd670c87594d0063dac37b", 0x23}], 0x1}, 0x0)

20:41:03 executing program 5:

20:41:03 executing program 0:

[  184.489035] hrtimer: interrupt took 44943 ns
20:41:04 executing program 4:

20:41:04 executing program 1:

20:41:04 executing program 2:

20:41:04 executing program 0:

20:41:04 executing program 5:

20:41:04 executing program 3:

20:41:04 executing program 3:

20:41:04 executing program 2:

20:41:04 executing program 0:

20:41:04 executing program 1:

20:41:04 executing program 3:

20:41:04 executing program 5:

20:41:04 executing program 4:

20:41:04 executing program 2:

20:41:04 executing program 0:

20:41:04 executing program 1:

20:41:04 executing program 3:

20:41:04 executing program 5:

20:41:04 executing program 4:

20:41:04 executing program 1:

20:41:04 executing program 2:

20:41:04 executing program 3:

20:41:04 executing program 5:

20:41:04 executing program 0:

20:41:04 executing program 4:

20:41:04 executing program 1:

20:41:04 executing program 5:

20:41:04 executing program 2:

20:41:04 executing program 3:

20:41:04 executing program 4:

20:41:04 executing program 1:

20:41:04 executing program 0:

20:41:04 executing program 5:

20:41:04 executing program 4:

20:41:04 executing program 2:

20:41:04 executing program 3:

20:41:04 executing program 1:

20:41:04 executing program 0:

20:41:04 executing program 5:

20:41:04 executing program 2:

20:41:04 executing program 3:

20:41:04 executing program 0:

20:41:04 executing program 5:

20:41:04 executing program 4:

20:41:04 executing program 1:

20:41:04 executing program 2:

20:41:04 executing program 3:

20:41:04 executing program 0:

20:41:04 executing program 5:

20:41:04 executing program 1:

20:41:04 executing program 4:

20:41:04 executing program 2:
r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2)
ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000140)={0xb, @raw_data="b9d91d488671cd5fe6f10b70ce1bb853b4b263f00d55ed3909c3465adc3dc44bdcb7944cff229ef0467fc0c103d9c8ab3b8046d26e305e25b9f94c8a18018b724b41e7d25226709f9154c01576ad618d1322a58b59c5a116a46e74e9c16f2a83720369523494e3501bb88db2831846aa33e7b2b15517cc9ae2c7c0df5139ecc2a0ec7e3d6c22f25ed3643abff60ede608a4fe56895c15d74019261513109777ad7458d1a9a41f505fc9dfda804d9ff473d563de31a17921a3187eaf1f8a966c1bcb820da39c07c3a"})

20:41:05 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000780)=""/254)
r1 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000301ffff808fdb003d88c8f00010ae1b"], 0x14}}, 0x0)

20:41:05 executing program 5:

20:41:05 executing program 0:

20:41:05 executing program 1:

20:41:05 executing program 4:

20:41:05 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r0, 0x890c, &(0x7f0000000440)={0x750, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, {0x2, 0x0, @loopback}, 0x800000000000047, 0x8, 0x5, 0x46a})

20:41:05 executing program 2:
mkdir(0x0, 0x2000000000008)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0)
openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00')
prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8)
stat(&(0x7f00000003c0)='./bus\x00', 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, <r3=>0x0}, &(0x7f0000000740)=0xc)
lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0})
lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="02000000010007000000000002000100", @ANYRES32=r2, @ANYBLOB, @ANYRES32, @ANYBLOB="273434c0a725d7d7dbf51b4ffc0b2da60e26c1be4d2866b5881ba20a126aa71f9b3205566c11f33b1bb0309ef1f3206088a7c0693846ce48badfe3edaae2240d8f86327140afaeca1e", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r3, @ANYBLOB="08000200", @ANYRES32=r4, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="10000000000000002000020000000000"], 0xf, 0x3)
ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000780)=""/254)
chdir(&(0x7f0000000180)='./file0\x00')
ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000040)={r0, 0x7fff})
creat(&(0x7f0000000240)='./bus\x00', 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
r5 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000301ffff808fdb003d88c8f00010ae1b"], 0x14}}, 0x0)

20:41:05 executing program 5:
r0 = socket$kcm(0x2b, 0x8000000000001, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
syz_mount_image$jfs(&(0x7f0000002180)='jfs\x00', &(0x7f00000021c0)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@resize='resize'}, {@iocharset={'iocharset', 0x3d, 'macromanian'}}]})

20:41:05 executing program 1:
r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2)
ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000140)={0x4})

[  185.657049] audit: type=1400 audit(1564346465.129:39): avc:  denied  { create } for  pid=7328 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
[  185.693221] audit: type=1400 audit(1564346465.139:40): avc:  denied  { write } for  pid=7328 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
20:41:05 executing program 1:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/uinput\x00', 0x805, 0x0)
r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0)
sendfile(r0, r1, &(0x7f00000000c0)=0x5c, 0x100000000)

[  185.813384] resize option for remount only
[  185.908405] audit: type=1400 audit(1564346465.369:41): avc:  denied  { create } for  pid=7349 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
20:41:05 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000008d04"])

[  186.035897] audit: type=1400 audit(1564346465.429:42): avc:  denied  { write } for  pid=7349 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
20:41:05 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000040000004010040"])

[  186.175003] audit: type=1400 audit(1564346465.469:43): avc:  denied  { read } for  pid=7349 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
20:41:05 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000780)=""/254)
r1 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000301ffff808fdb003d88c8f00010ae1b"], 0x14}}, 0x0)

20:41:05 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000024d564b9bd91873a7"])

20:41:05 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000400100009bd91873a7"])

20:41:05 executing program 5:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x6, 0x800249e21, 0x100000001}, 0x3c)
bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000380), &(0x7f0000000080)=""/178}, 0x18)
bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000540), &(0x7f0000000640)=""/145}, 0x18)

20:41:05 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0)
r1 = syz_open_dev$evdev(0x0, 0x0, 0x0)
dup3(r0, r1, 0x0)

20:41:06 executing program 0:
r0 = socket$kcm(0xa, 0x2, 0x73)
ioctl$sock_ifreq(r0, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', @ifru_ivalue=0x70ff00})

20:41:06 executing program 2:
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x7fffffffffdff)

20:41:06 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000001e01"])

20:41:06 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:06 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000040000000010040"])

20:41:06 executing program 3:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000d90100009bd91873a7"])

[  186.819107] device nr0 entered promiscuous mode
[  186.825562] kvm [7393]: vcpu0, guest rIP: 0xfff0 ignored wrmsr: 0x11e data 0x0
[  186.826209] mmap: syz-executor.2 (7403) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt.
[  186.835046] PF_CAN: dropped non conform CAN FD skbuf: dev type 65534, len 45305, datalen 0
20:41:06 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000002c1001c0"])

20:41:06 executing program 3:
r0 = socket$kcm(0xa, 0x2, 0x73)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000000)={'sit0\x00\x00\x00\x00\x00\x00\x00m\x00', @ifru_ivalue=0x70e000})

20:41:06 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000007a01"])

20:41:06 executing program 0:
socket$can_bcm(0x1d, 0x2, 0x2)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='uid_map\x00')

20:41:06 executing program 4:
openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0)
r1 = syz_open_dev$evdev(0x0, 0x0, 0x0)
dup3(r0, r1, 0x0)

[  186.971689] device nr0 entered promiscuous mode
20:41:06 executing program 3:
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), 0x4)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8)
socket$inet(0x2, 0x6, 0x170d)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00fdffffff8a08b7960ff7aa6e041a7700fdff863802aa0063b8f24252b1d85cbf8f49ab786bf40339653f0ffb0936b564df5e0acad550fe200900da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f94ffffffffffffffbe"], 0x6f)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0)
timerfd_gettime(r1, &(0x7f0000000100))
unlink(&(0x7f0000000040)='./bus\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000280), 0x4)
statx(r1, &(0x7f00000000c0)='./file0/file0\x00', 0x6400, 0x40, &(0x7f0000000400))
ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000240)=""/10)
mkdir(&(0x7f0000000740)='./file0\x00', 0x4000000000000)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1)
rename(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./bus\x00')

20:41:06 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:06 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000007501"])

20:41:06 executing program 5:
perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x803, 0x0)
sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x81000000, &(0x7f0000000140)=[{&(0x7f00000017c0)="23000000560081aee4f80b00000f00fe078bc36f16000072fd670c87594d0063dac37b", 0x23}], 0x1}, 0x0)

[  187.158849] device nr0 entered promiscuous mode
20:41:06 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00')
preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0)

20:41:06 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:06 executing program 4:
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x11, &(0x7f00000001c0)={@broadcast, @dev, [], {@llc={0x4, {@llc={0x0, 0x0, '/'}}}}}, 0x0)

20:41:06 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000007401"])

20:41:06 executing program 5:
perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x803, 0x0)
sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x81000000, &(0x7f0000000140)=[{&(0x7f00000017c0)="23000000560081aee4f80b00000f00fe078bc36f16000072fd670c87594d0063dac37b", 0x23}], 0x1}, 0x0)

20:41:06 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x5, 0x84)
shutdown(r0, 0x0)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x1}]}, &(0x7f0000000180)=0x10)
ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, 0x0)

[  187.313735] device nr0 entered promiscuous mode
[  187.332277] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0)
[  187.393563] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0)
[  187.409658] FAT-fs (loop3): Filesystem has been set read-only
[  187.436642] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500)
[  187.458311] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0)
20:41:06 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000006005"])

20:41:06 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

[  187.482883] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500)
[  187.556577] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500)
[  187.578029] device nr0 entered promiscuous mode
[  187.650741] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500)
[  187.679651] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0)
20:41:07 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x5, 0x84)
shutdown(r0, 0x0)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x1}]}, &(0x7f0000000180)=0x10)
ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, 0x0)

20:41:07 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000008104"])

20:41:07 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000001f0001c0"])

20:41:07 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000001b0001c0"])

20:41:07 executing program 2:
ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000))
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00008, 0x0, 0x0, 0x0, 0x10000000002)

20:41:07 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
socket$kcm(0x29, 0x5, 0x0)
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

[  187.715943] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0)
20:41:07 executing program 2:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400})
ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000001c0)={0x0, 0x0})

20:41:07 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
socket$kcm(0x29, 0x5, 0x0)
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:07 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000580001c09bd91873a7"])

20:41:07 executing program 4:
r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0)
dup3(r1, r0, 0x0)
io_setup(0x9, &(0x7f0000000080)=<r2=>0x0)
io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x201200}])

20:41:07 executing program 0:
prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='/de\xc9m\xeb;fy\xadv')
openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x101, 0x0)

[  188.038295] audit: type=1804 audit(1564346467.509:44): pid=7512 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir694167834/syzkaller.gjtmmn/16/bus" dev="sda1" ino=16579 res=1
20:41:07 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
socket$kcm(0x29, 0x5, 0x0)
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:07 executing program 3:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000040000003010040"])

20:41:07 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000008004"])

20:41:07 executing program 0:
bpf$PROG_LOAD(0x5, 0x0, 0x0)
getpid()
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="8000000000000000b1004080"])
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000000)
openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
sendmsg$kcm(r1, 0x0, 0x51)
write$cgroup_int(r0, &(0x7f0000000080), 0xfffffec7)
socket$kcm(0x2, 0x0, 0x2)

20:41:07 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000200001c0"])

20:41:07 executing program 5:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x101, 0x0, 0x0, {{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0)

[  188.214198] audit: type=1804 audit(1564346467.529:45): pid=7512 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir694167834/syzkaller.gjtmmn/16/bus" dev="sda1" ino=16579 res=1
20:41:07 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:07 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000301ffff808fdb003d88c8f00010ae1b"], 0x14}}, 0x0)

20:41:07 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x1, 0x0, @remote}, 0xfffffffffffffdfd)
r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0)
r1 = syz_open_dev$evdev(0x0, 0x0, 0x0)
ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0)
dup3(r0, r1, 0x0)

20:41:07 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:08 executing program 3:
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0)
syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00')
stat(0x0, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0), 0x0)
lstat(0x0, &(0x7f00000009c0))
ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0)
r1 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000301ffff808fdb003d88c8f00010ae1b"], 0x14}}, 0x0)

20:41:08 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000040000001010040"])

20:41:08 executing program 2:

20:41:08 executing program 2:

20:41:08 executing program 2:

20:41:08 executing program 0:

20:41:08 executing program 2:

20:41:08 executing program 5:

20:41:08 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:08 executing program 5:

20:41:09 executing program 4:

20:41:09 executing program 2:

20:41:09 executing program 5:

20:41:09 executing program 0:

20:41:09 executing program 3:

20:41:09 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:09 executing program 0:

20:41:09 executing program 3:

20:41:09 executing program 5:

20:41:09 executing program 2:

20:41:09 executing program 5:

20:41:09 executing program 4:

20:41:09 executing program 0:

20:41:09 executing program 3:

20:41:09 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:09 executing program 4:

20:41:09 executing program 2:

20:41:09 executing program 5:

20:41:09 executing program 0:

20:41:09 executing program 3:

20:41:09 executing program 2:

20:41:09 executing program 5:

20:41:09 executing program 4:

20:41:09 executing program 0:

20:41:09 executing program 3:

20:41:09 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:09 executing program 2:

20:41:09 executing program 2:

20:41:09 executing program 5:

20:41:09 executing program 0:

20:41:09 executing program 4:

20:41:09 executing program 1:
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r0 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:09 executing program 3:

20:41:09 executing program 2:

20:41:09 executing program 5:

20:41:09 executing program 4:

20:41:09 executing program 0:

20:41:09 executing program 3:

20:41:09 executing program 5:

20:41:09 executing program 2:

20:41:09 executing program 4:

20:41:09 executing program 0:

20:41:09 executing program 1:
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r0 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:09 executing program 3:

20:41:09 executing program 5:

20:41:09 executing program 2:

20:41:09 executing program 2:

20:41:09 executing program 4:

20:41:09 executing program 3:

20:41:09 executing program 0:

20:41:09 executing program 5:

20:41:09 executing program 2:

20:41:10 executing program 1:
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r0 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:10 executing program 3:

20:41:10 executing program 4:

20:41:10 executing program 5:

20:41:10 executing program 0:

20:41:10 executing program 2:

20:41:10 executing program 5:

20:41:10 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c)
poll(&(0x7f0000000080)=[{r0}], 0x28, 0x0)

20:41:10 executing program 4:
setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000004c0)={0x80000000000084, @rand_addr, 0x0, 0x4, 'rr\x00'}, 0x2c)
syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x100, 0x0)
openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x4800, 0x0)
accept(0xffffffffffffffff, &(0x7f0000000140)=@ipx, &(0x7f00000001c0)=0x80)
socketpair(0x0, 0x1, 0x6, 0x0)
r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x50000)
ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0)
mkdir(0x0, 0x0)
ioctl$BLKREPORTZONE(r0, 0xc0101282, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0)
ioctl$KDGKBMETA(r0, 0x4b62, 0x0)
ftruncate(r0, 0x101)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$rxrpc(0x21, 0x2, 0x0)
bind$rxrpc(0xffffffffffffffff, &(0x7f00000000c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x5, @loopback}}, 0x24)
ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, &(0x7f00000003c0)={0x4, 0x0, 0x0, {0x4, 0x6, 0x0, 0x1000}})
listen(r0, 0x0)
sysfs$1(0x1, &(0x7f0000000100)='ceph\x00')
prctl$PR_SET_THP_DISABLE(0x29, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)

20:41:10 executing program 3:
r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0)
write(r0, &(0x7f0000000040)="0600", 0x2)
write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="340000000000250000000000248d7ac36174ab52499f4e1eb8d902a327796ed7774f491b1e8e16c01e74e5647712cb58dbebf0d8d98788033bcbbf16068835471a398ec452910e13afa708fad93def51db9e0cd96612d541b6bac19a0000"], 0xe)
sendfile(r0, r0, &(0x7f0000001000), 0xffff)
mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10)

20:41:10 executing program 5:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
bind$inet(0xffffffffffffffff, 0x0, 0x0)
setsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0)
setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x0, 0x0, 0x400}, 0x6)
getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@rand_addr, @local, @multicast1}, &(0x7f00000000c0)=0xc)
r1 = socket(0x11, 0x0, 0x0)
bind$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14)
setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5)
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f00000003c0)={0x2f, @multicast1, 0x0, 0x0, 'none\x00', 0x1, 0x0, 0x2b}, 0x2c)
r2 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c)
r3 = syz_open_dev$adsp(0x0, 0x0, 0x103800)
ioctl$VIDIOC_TRY_ENCODER_CMD(0xffffffffffffffff, 0xc028564e, 0x0)
mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r2, 0x0)
getsockopt$rose(r3, 0x104, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x4)
sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x2c7, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1)
bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "b722d2a7e6c36f88e333a23f6dd247432f073f09bf0e20453902141ab323eeec0d13e6f85495094d5c4b9c319f5b42917829ea1f56ffe254ff4c64249adb35", 0x2a}, 0x60)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0)
stat(&(0x7f0000004640)='./file0\x00', 0x0)
ioctl$VIDIOC_SUBDEV_G_EDID(r3, 0xc0285628, &(0x7f0000000380)={0x0, 0x3, 0x10001, [], &(0x7f0000000340)=0x3})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0)
ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000200)=@add_del={0x3, &(0x7f0000000180)='hwsim0\x00'})
mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0)
getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f00000001c0)={<r4=>0x0, 0xe0ec, 0x5, 0x0, 0x101}, &(0x7f0000000240)=0x14)
setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000280)={r4, 0x9, 0xffffffff}, 0x8)

20:41:10 executing program 2:
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x229}}], 0x0, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00')
preadv(r0, &(0x7f00000017c0), 0x333, 0x0)

20:41:10 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:10 executing program 2:
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, 0x0, 0x0)
socket(0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
symlink(&(0x7f0000000080)='./file0\x00', 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r0 = socket$netlink(0x10, 0x3, 0x0)
writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0x0)
setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)

[  190.797327] audit: type=1400 audit(1564346470.269:46): avc:  denied  { map } for  pid=7715 comm="syz-executor.3" path=2F6D656D66643A0B656D31C1F8A68D4EC0A35CE2CBA2BAE5F497AC232AFF202864656C6574656429 dev="tmpfs" ino=28567 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1
20:41:10 executing program 4:
bind$bt_rfcomm(0xffffffffffffffff, &(0x7f00000000c0), 0xa)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6)

20:41:10 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

[  190.929614] audit: type=1400 audit(1564346470.309:47): avc:  denied  { map } for  pid=7712 comm="syz-executor.5" path="socket:[29915]" dev="sockfs" ino=29915 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=packet_socket permissive=1
20:41:10 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x100000000000001, 0x0)
syz_open_dev$adsp(0x0, 0x0, 0x0)
r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0)
ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x1000981900, 0x1})
close(r0)

20:41:10 executing program 0:
r0 = socket$inet(0x2, 0x2, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0)
setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f00000002c0)=0x7, 0x4)
recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0)

20:41:10 executing program 4:
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
connect$inet6(r0, 0x0, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f00000000c0)={0x2f, "9e5daefd317ed784f168abb3cacf53a949a2dc58bbc7d584487facf18756a9c4", 0x2, 0x1})
r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0)
r2 = syz_open_dev$evdev(0x0, 0x0, 0x0)
ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000080))
dup3(r1, r2, 0x0)

20:41:10 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:10 executing program 2:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:10 executing program 3:
socket$packet(0x11, 0x0, 0x300)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
sched_setattr(0x0, &(0x7f00000002c0), 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x10004, 0x0, 0x1000, 0x2000, &(0x7f0000ffd000/0x2000)=nil})
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0)
openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfbf}}, 0x0, 0x1, 0x0, 0x9, 0x2}, 0x0)
setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000180)={0x0, 0x7}, 0x3)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0)

20:41:10 executing program 0:
perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x803, 0x0)
sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000017c0)="23000000560081aee4f80b00000f00fe078bc36f16000072fd670c87594d0063dac37b", 0x23}], 0x1}, 0x0)

20:41:10 executing program 5:
r0 = creat(&(0x7f0000000280)='./file0\x00', 0x8)
recvfrom$unix(r0, &(0x7f0000000180)=""/46, 0x2e, 0x40, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e)
recvfrom$unix(r0, &(0x7f00000007c0)=""/233, 0x24b, 0x20, 0x0, 0x0)
r1 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000140)={0x0, 0x6}, 0x8)
bind$inet(r1, &(0x7f0000deb000)={0x2, 0x3, @empty}, 0x10)
sendto$inet(r1, 0x0, 0x2f5, 0x200007fc, &(0x7f0000000000)={0x2, 0x3, @local}, 0x10)
setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000240), 0x4)
bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10)
accept4(r0, 0x0, 0x0, 0x2)
setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000080)={0x8c, @loopback, 0x0, 0x0, 'wrr\x00'}, 0x2c)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
getpid()
stat(0x0, 0x0)
pipe2$9p(&(0x7f00000003c0), 0x4800)
lstat(0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
memfd_create(0x0, 0x0)
fdatasync(0xffffffffffffffff)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0)
linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0)
sendto(r1, &(0x7f00000000c0)='H', 0x1, 0x5, 0x0, 0x0)
sendto(r1, &(0x7f0000000100)="91", 0x1, 0x8044, 0x0, 0x0)
shutdown(r1, 0x2)
recvfrom$inet(r1, 0x0, 0x0, 0x80040000101, 0x0, 0x2f49b2819fbc7c26)

20:41:10 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:10 executing program 2:
bind$bt_rfcomm(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, {0x4}}, 0x4)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6)

20:41:10 executing program 0:
r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0)
write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[], 0xff71)
getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78)
write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000006c000000000000000000000000df3f0000000000000000000000000000000000000000003800"/144], 0x90)
dup3(r1, r0, 0x0)
fcntl$setstatus(r0, 0x4, 0x43fd)
io_setup(0x9, &(0x7f0000000080)=<r2=>0x0)
io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x201200}])

[  191.297513] IPVS: set_ctl: invalid protocol: 140 127.0.0.1:0
[  191.335314] device nr0 entered promiscuous mode
20:41:10 executing program 2:
r0 = socket(0x10, 0x3, 0x0)
close(r0)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r1, &(0x7f0000000040)={0x2, 0x2004e20, @multicast2}, 0x10)
sendto$inet(r1, 0x0, 0x0, 0x20000010, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB], 0x1}}, 0x0)

[  191.357516] IPVS: set_ctl: invalid protocol: 140 127.0.0.1:0
20:41:10 executing program 5:
preadv(0xffffffffffffffff, &(0x7f0000000500)=[{0x0}, {0x0}, {&(0x7f00000004c0)=""/20, 0x14}], 0x3, 0x0)
r0 = syz_open_procfs(0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000740))
mkdir(0x0, 0x2)
lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="1a8316fd8da11ea8db4acff7b4f5975ce84e2ca1b8c1baa4ff4a97a919054bc057f283f4a2ad7760b152da4cd2390aeedcc0a19807bd17e41a2a277f4587c0f19e6703000000ffe3332a8da0527687070e", @ANYRES32=0x0, @ANYBLOB="0400800071ff16c53ee500a5c15611cfeb6b19d94e5a643cc1f941119fe373e99554a30e"], 0x4, 0x3)
ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x10', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\x10rist\xe3cusgrVid:De', 0x0)
fcntl$dupfd(r1, 0x0, r1)
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x100, 0x0)
getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000008c0)={<r2=>0x0, 0xffffffffffffffff, 0xee, 0x1b612b8f, 0xfff, 0x1, 0xffff, 0x80, {<r3=>0x0, @in6={{0xa, 0x0, 0x5, @dev={0xfe, 0x80, [], 0x16}}}, 0x4, 0x2, 0x9, 0x2, 0x8}}, &(0x7f00000001c0)=0xb0)
fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0})
getgroups(0x2, &(0x7f0000000080)=[0xffffffffffffffff, <r5=>0xffffffffffffffff])
getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000640)={r2, 0xfffffffffffffffc, 0x4, 0x200, 0x6ba, 0xfffffffffffffe00, 0x1, 0x3, {r3, @in6={{0xa, 0x4e20, 0x376, @loopback, 0x8}}, 0x6, 0xffff, 0xfffffffffffffffb, 0x88f}}, &(0x7f0000000100)=0xb0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xf3c2, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x8, 0x2}, 0x0, 0x0, &(0x7f0000000300)={0x4, 0xe, 0x3, 0x4}, &(0x7f0000000340)=0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x2}}, 0x10)
setregid(r4, r5)
ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x3)
symlink(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)='./file0\x00')
setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x0, 0xff}, 0x21)

20:41:10 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:11 executing program 4:
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
connect$inet6(r0, 0x0, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f00000000c0)={0x2f, "9e5daefd317ed784f168abb3cacf53a949a2dc58bbc7d584487facf18756a9c4", 0x2, 0x1})
r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0)
r2 = syz_open_dev$evdev(0x0, 0x0, 0x0)
ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000080))
dup3(r1, r2, 0x0)

[  191.589505] audit: type=1804 audit(1564346471.059:48): pid=7794 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir136836230/syzkaller.yZjZGf/36/bus" dev="sda1" ino=16591 res=1
[  191.651167] device nr0 entered promiscuous mode
20:41:11 executing program 0:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0)
ioctl$PPPIOCSFLAGS1(r1, 0x40047459, 0x0)
close(r0)
close(r1)
socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040))
write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00)
close(r1)

20:41:11 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000800000c09bd91873a7"])

[  191.770644] audit: type=1804 audit(1564346471.119:49): pid=7794 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir136836230/syzkaller.yZjZGf/36/bus" dev="sda1" ino=16591 res=1
20:41:11 executing program 3:
bind$bt_rfcomm(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, {0x0, 0x40}}, 0xa)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6)

20:41:11 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:11 executing program 4:
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
connect$inet6(r0, 0x0, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f00000000c0)={0x2f, "9e5daefd317ed784f168abb3cacf53a949a2dc58bbc7d584487facf18756a9c4", 0x2, 0x1})
r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0)
r2 = syz_open_dev$evdev(0x0, 0x0, 0x0)
ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000080))
dup3(r1, r2, 0x0)

[  192.019888] device nr0 entered promiscuous mode
20:41:11 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000007b0100009bd91873a7"])

20:41:11 executing program 3:
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
connect$inet6(r0, 0x0, 0x0)
openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0)
r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0)
r2 = syz_open_dev$evdev(0x0, 0x0, 0x0)
ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000080))
dup3(r1, r2, 0x0)

[  192.067493] device bridge_slave_1 left promiscuous mode
[  192.091629] bridge0: port 2(bridge_slave_1) entered disabled state
[  192.146882] device bridge_slave_0 left promiscuous mode
[  192.177204] bridge0: port 1(bridge_slave_0) entered disabled state
20:41:11 executing program 4:
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
connect$inet6(r0, 0x0, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f00000000c0)={0x2f, "9e5daefd317ed784f168abb3cacf53a949a2dc58bbc7d584487facf18756a9c4", 0x2, 0x1})
r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0)
r2 = syz_open_dev$evdev(0x0, 0x0, 0x0)
ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000080))
dup3(r1, r2, 0x0)

[  192.432286] device hsr_slave_1 left promiscuous mode
[  192.480588] device hsr_slave_0 left promiscuous mode
[  192.534687] team0 (unregistering): Port device team_slave_1 removed
[  192.561832] team0 (unregistering): Port device team_slave_0 removed
[  192.583575] bond0 (unregistering): Releasing backup interface bond_slave_1
[  192.635821] bond0 (unregistering): Releasing backup interface bond_slave_0
[  192.768185] bond0 (unregistering): Released all slaves
[  195.250247] IPVS: ftp: loaded support on port[0] = 21
[  195.577694] chnl_net:caif_netlink_parms(): no params data found
[  195.611951] bridge0: port 1(bridge_slave_0) entered blocking state
[  195.618338] bridge0: port 1(bridge_slave_0) entered disabled state
[  195.625345] device bridge_slave_0 entered promiscuous mode
[  195.632076] bridge0: port 2(bridge_slave_1) entered blocking state
[  195.638431] bridge0: port 2(bridge_slave_1) entered disabled state
[  195.645435] device bridge_slave_1 entered promiscuous mode
[  195.660507] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  195.669094] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  195.691006] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  195.698018] team0: Port device team_slave_0 added
[  195.703613] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  195.711112] team0: Port device team_slave_1 added
[  195.716234] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  195.723532] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  195.773715] device hsr_slave_0 entered promiscuous mode
[  195.810355] device hsr_slave_1 entered promiscuous mode
[  195.850433] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  195.857232] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  195.869532] bridge0: port 2(bridge_slave_1) entered blocking state
[  195.875884] bridge0: port 2(bridge_slave_1) entered forwarding state
[  195.882552] bridge0: port 1(bridge_slave_0) entered blocking state
[  195.888891] bridge0: port 1(bridge_slave_0) entered forwarding state
[  195.916904] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  195.923341] 8021q: adding VLAN 0 to HW filter on device bond0
[  195.931735] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  195.939749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  195.947514] bridge0: port 1(bridge_slave_0) entered disabled state
[  195.954783] bridge0: port 2(bridge_slave_1) entered disabled state
[  195.965105] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  195.971295] 8021q: adding VLAN 0 to HW filter on device team0
[  195.979248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  195.986914] bridge0: port 1(bridge_slave_0) entered blocking state
[  195.993271] bridge0: port 1(bridge_slave_0) entered forwarding state
[  196.011395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  196.018911] bridge0: port 2(bridge_slave_1) entered blocking state
[  196.025310] bridge0: port 2(bridge_slave_1) entered forwarding state
[  196.032612] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  196.040182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  196.048060] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  196.057418] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  196.069097] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  196.081715] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  196.087752] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  196.094837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  196.108229] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  196.118190] 8021q: adding VLAN 0 to HW filter on device batadv0
[  196.570424] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:41:16 executing program 2:

20:41:16 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000004000008105"])

20:41:16 executing program 0:

20:41:16 executing program 4:
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
connect$inet6(r0, 0x0, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f00000000c0)={0x2f, "9e5daefd317ed784f168abb3cacf53a949a2dc58bbc7d584487facf18756a9c4", 0x2, 0x1})
r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0)
r2 = syz_open_dev$evdev(0x0, 0x0, 0x0)
dup3(r1, r2, 0x0)

20:41:16 executing program 3:

20:41:16 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:16 executing program 0:

20:41:16 executing program 3:

20:41:16 executing program 2:

20:41:16 executing program 0:
r0 = socket$kcm(0xa, 0x3, 0x73)
ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000040)={'ip6gre0\x00', @ifru_mtu})

20:41:16 executing program 3:
write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0xfffffffffffffff5)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000700)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0xfffffffffffffff6)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0)
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x2008000040000408, 0x0, 0x0, 0x0, 0x4c9]})
ioctl$KVM_NMI(r2, 0xae9a)
openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0)
recvmsg(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/39, 0x27}], 0x1}, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

20:41:16 executing program 4:
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
connect$inet6(r0, 0x0, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f00000000c0)={0x2f, "9e5daefd317ed784f168abb3cacf53a949a2dc58bbc7d584487facf18756a9c4", 0x2, 0x1})
r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0)
r2 = syz_open_dev$evdev(0x0, 0x0, 0x0)
dup3(r1, r2, 0x0)

20:41:16 executing program 2:
setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x2000000000000021, 0x2, 0x10000000000002)
connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev}}, 0x24)
sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x6c00, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18}}], 0x1, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x333, 0x0)

20:41:16 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="8000000000000000b1004080"])
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000000)
sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0)

20:41:16 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

20:41:16 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000900000409bd91873a7c692"])

[  197.531444] kasan: CONFIG_KASAN_INLINE enabled
[  197.569765] kasan: GPF could be caused by NULL-ptr deref or user memory access
[  197.593598] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000060 data 0x4d00000000f
20:41:17 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

[  197.624367] general protection fault: 0000 [#1] PREEMPT SMP KASAN
[  197.630607] Modules linked in:
[  197.633812] CPU: 1 PID: 7889 Comm: syz-executor.2 Not tainted 4.14.134 #30
[  197.638964] kobject: 'loop1' (ffff8880a499e660): kobject_uevent_env
[  197.640827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  197.640834] task: ffff888089d00300 task.stack: ffff88805a410000
[  197.640853] RIP: 0010:rxrpc_connect_call+0xc9/0x41a0
[  197.640860] RSP: 0018:ffff88805a417738 EFLAGS: 00010206
20:41:17 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

[  197.640870] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90013ff2000
[  197.640877] RDX: 0000000000000003 RSI: ffffffff8593c089 RDI: 0000000000000018
[  197.640883] RBP: ffff88805a417880 R08: 0000000000000001 R09: ffff888089d00ba0
[  197.640893] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a5280c00
[  197.649063] kobject: 'loop1' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop1'
[  197.656649] R13: ffff88805ac88e20 R14: ffff88805ac88e10 R15: ffff88805a417998
20:41:17 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000400000900000409bd91873a7c692"])

[  197.656657] FS:  00007f9a7b501700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000
[  197.656663] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  197.656668] CR2: 00000000015f01f8 CR3: 000000009482d000 CR4: 00000000001426e0
[  197.656675] Call Trace:
[  197.656689]  ? release_sock+0x14a/0x1b0
[  197.656705]  ? rxrpc_discard_expired_client_conns+0x7e0/0x7e0
[  197.656718]  ? __local_bh_enable_ip+0x99/0x1a0
[  197.708429] kobject: 'kvm' (ffff888219fb1610): kobject_uevent_env
[  197.711713]  ? trace_hardirqs_on_caller+0x400/0x590
[  197.711725]  ? release_sock+0x14a/0x1b0
[  197.711733]  ? trace_hardirqs_on+0xd/0x10
[  197.711743]  ? __local_bh_enable_ip+0x99/0x1a0
[  197.711753]  ? _raw_spin_unlock_bh+0x31/0x40
[  197.711766]  rxrpc_new_client_call+0x8f7/0x1420
[  197.726446] kobject: 'kvm' (ffff888219fb1610): fill_kobj_path: path = '/devices/virtual/misc/kvm'
[  197.727252]  ? rxrpc_do_sendmsg+0x91a/0x1103
[  197.727263]  rxrpc_do_sendmsg+0x91a/0x1103
[  197.727278]  ? rxrpc_kernel_send_data+0x470/0x470
[  197.751031] kobject: 'loop0' (ffff88805b750b60): kobject_uevent_env
[  197.752844]  rxrpc_sendmsg+0x48a/0x650
[  197.757422] kobject: 'loop0' (ffff88805b750b60): fill_kobj_path: path = '/devices/virtual/block/loop0'
[  197.763656]  ? security_socket_sendmsg+0x89/0xb0
[  197.763667]  ? rxrpc_sock_destructor+0x130/0x130
[  197.763676]  sock_sendmsg+0xce/0x110
[  197.763684]  ___sys_sendmsg+0x349/0x840
[  197.763694]  ? copy_msghdr_from_user+0x3f0/0x3f0
[  197.763707]  ? __fget+0x210/0x370
[  197.763724]  ? lock_downgrade+0x6e0/0x6e0
[  197.786759] kobject: 'kvm' (ffff888219fb1610): kobject_uevent_env
[  197.790517]  ? __fget+0x237/0x370
[  197.790533]  ? __fget_light+0x172/0x1f0
[  197.790542]  ? __fdget+0x1b/0x20
[  197.790551]  ? sockfd_lookup_light+0xb4/0x160
[  197.790562]  __sys_sendmmsg+0x152/0x3a0
[  197.790572]  ? SyS_sendmsg+0x50/0x50
[  197.790588]  ? kasan_check_read+0x11/0x20
[  197.790598]  ? _copy_to_user+0x87/0xd0
[  197.790611]  ? put_timespec64+0xb4/0x100
[  197.806670] kobject: 'kvm' (ffff888219fb1610): fill_kobj_path: path = '/devices/virtual/misc/kvm'
[  197.808241]  ? nsecs_to_jiffies+0x30/0x30
[  197.808257]  ? SyS_clock_gettime+0xf8/0x180
[  197.808271]  SyS_sendmmsg+0x35/0x60
[  197.924256]  ? __sys_sendmmsg+0x3a0/0x3a0
[  197.928398]  do_syscall_64+0x1e8/0x640
[  197.932274]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  197.937105]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  197.942298] RIP: 0033:0x459829
[  197.945477] RSP: 002b:00007f9a7b500c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  197.953174] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459829
[  197.960447] RDX: 0000000000000001 RSI: 0000000020005c00 RDI: 0000000000000004
[  197.967701] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  197.974956] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9a7b5016d4
[  197.982216] R13: 00000000004c6fe8 R14: 00000000004dc518 R15: 00000000ffffffff
[  197.989485] Code: e8 03 80 3c 18 00 0f 85 6f 39 00 00 48 8b 85 28 ff ff ff 48 8b 18 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 8a 39 00 00 48 8b 5b 18 48 8d bb 00 02 00 00 
[  198.008696] RIP: rxrpc_connect_call+0xc9/0x41a0 RSP: ffff88805a417738
20:41:17 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080))
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KDADDIO(r0, 0x4b34, 0x0)
sched_setscheduler(0x0, 0x0, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
ioctl$VT_ACTIVATE(r1, 0x5606, 0x4)
ioctl$EXT4_IOC_MIGRATE(r2, 0x6609)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x5, 0x4, 0x7})
sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[@pktinfo={{0x24, 0x29, 0x32, {@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @pktinfo={{0x24, 0x29, 0x32, {@remote}}}], 0x50}, 0x0)

20:41:17 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\rW'], 0xb107)

[  198.031146] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000002b data 0x4d00000000f
[  198.034204] kobject: 'loop5' (ffff8880a4ad32e0): kobject_uevent_env
[  198.046703] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000008c data 0x4d00000000f
[  198.054597] kobject: 'loop5' (ffff8880a4ad32e0): fill_kobj_path: path = '/devices/virtual/block/loop5'
[  198.072024] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000057 data 0x4d00000000f
20:41:17 executing program 5:
r0 = socket(0xa, 0x3, 0x7f)
r1 = userfaultfd(0x0)
r2 = getpgrp(0x0)
ioprio_set$pid(0x1, r2, 0x2)
ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x136})
ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000280)={{&(0x7f000090c000/0x1000)=nil, 0x1000}, 0x1})
mlock2(&(0x7f000090c000/0x2000)=nil, 0x2000, 0x0)
dup3(r0, r1, 0x0)

[  198.076510] kobject: 'kvm' (ffff888219fb1610): kobject_uevent_env
[  198.087710] kobject: 'kvm' (ffff888219fb1610): fill_kobj_path: path = '/devices/virtual/misc/kvm'
[  198.093873] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000022 data 0x4d00000000f
[  198.108782] kobject: 'loop1' (ffff8880a499e660): kobject_uevent_env
[  198.121744] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000004e data 0x4d00000000f
[  198.133328] kobject: 'loop1' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop1'
[  198.140296] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000019 data 0x4d00000000f
[  198.155375] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000007a data 0x4d00000000f
[  198.165196] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000045 data 0x4d00000000f
[  198.167469] kobject: 'loop4' (ffff8880a4a3d260): kobject_uevent_env
[  198.176951] kvm [7883]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000003f data 0x4d00000000f
[  198.181912] kobject: 'loop4' (ffff8880a4a3d260): fill_kobj_path: path = '/devices/virtual/block/loop4'
[  198.201769] kobject: 'loop1' (ffff8880a499e660): kobject_uevent_env
[  198.218664] kobject: 'loop1' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop1'
[  198.228843] kobject: 'loop0' (ffff88805b750b60): kobject_uevent_env
[  198.238194] kobject: 'kvm' (ffff888219fb1610): kobject_uevent_env
[  198.244544] kobject: 'loop0' (ffff88805b750b60): fill_kobj_path: path = '/devices/virtual/block/loop0'
[  198.248860] kobject: 'kvm' (ffff888219fb1610): kobject_uevent_env
[  198.254550] kobject: 'kvm' (ffff888219fb1610): fill_kobj_path: path = '/devices/virtual/misc/kvm'
[  198.262562] kobject: 'kvm' (ffff888219fb1610): fill_kobj_path: path = '/devices/virtual/misc/kvm'
[  198.274106] kobject: 'loop5' (ffff8880a4ad32e0): kobject_uevent_env
[  198.281491] kasan: CONFIG_KASAN_INLINE enabled
[  198.289829] kasan: GPF could be caused by NULL-ptr deref or user memory access
[  198.294781] kobject: 'loop5' (ffff8880a4ad32e0): fill_kobj_path: path = '/devices/virtual/block/loop5'
[  198.301888] general protection fault: 0000 [#2] PREEMPT SMP KASAN
[  198.312863] Modules linked in:
[  198.316060] CPU: 1 PID: 7936 Comm: syz-executor.2 Tainted: G      D         4.14.134 #30
[  198.324575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  198.334130] task: ffff8880823ec700 task.stack: ffff888059f78000
[  198.340316] RIP: 0010:rxrpc_connect_call+0xc9/0x41a0
[  198.345417] RSP: 0018:ffff888059f7f738 EFLAGS: 00010206
[  198.350779] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc900143f4000
[  198.358054] RDX: 0000000000000003 RSI: ffffffff8593c089 RDI: 0000000000000018
[  198.365324] RBP: ffff888059f7f880 R08: 0000000000000000 R09: 0000000000000000
[  198.372594] R10: 0000000000000000 R11: ffff8880823ec700 R12: ffff88808b5d9c00
[  198.379868] R13: ffff88805ac88e20 R14: ffff8880a5280d60 R15: ffff888059f7f998
[  198.387153] FS:  00007f9a7b4bf700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000
[  198.391050] kobject: 'kvm' (ffff888219fb1610): kobject_uevent_env
[  198.395901] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  198.395907] CR2: 00007f9a7b4bedb8 CR3: 000000009482d000 CR4: 00000000001426e0
[  198.395913] Call Trace:
[  198.395931]  ? rxrpc_new_client_call+0x3bd/0x1420
[  198.402488] kobject: 'kvm' (ffff888219fb1610): fill_kobj_path: path = '/devices/virtual/misc/kvm'
[  198.408025]  ? mutex_trylock+0x1c0/0x1c0
[  198.408039]  ? rxrpc_discard_expired_client_conns+0x7e0/0x7e0
[  198.441737]  ? lock_downgrade+0x6e0/0x6e0
[  198.445874]  ? release_sock+0x14a/0x1b0
[  198.449842]  ? trace_hardirqs_on+0xd/0x10
[  198.453980]  ? __local_bh_enable_ip+0x99/0x1a0
[  198.458549]  ? _raw_spin_unlock_bh+0x31/0x40
[  198.462949]  rxrpc_new_client_call+0x8f7/0x1420
[  198.467705]  ? rxrpc_do_sendmsg+0x91a/0x1103
[  198.472117]  rxrpc_do_sendmsg+0x91a/0x1103
[  198.476353]  ? rxrpc_sendmsg+0x60/0x650
[  198.480398]  ? rxrpc_kernel_send_data+0x470/0x470
[  198.485237]  ? __local_bh_enable_ip+0x99/0x1a0
[  198.489814]  rxrpc_sendmsg+0x48a/0x650
[  198.493691]  ? security_socket_sendmsg+0x89/0xb0
[  198.498439]  ? rxrpc_sock_destructor+0x130/0x130
[  198.503183]  sock_sendmsg+0xce/0x110
[  198.506883]  ___sys_sendmsg+0x349/0x840
[  198.510848]  ? copy_msghdr_from_user+0x3f0/0x3f0
[  198.515594]  ? wake_up_q+0x95/0xf0
[  198.519139]  ? futex_wake+0x134/0x430
[  198.522933]  ? lock_downgrade+0x6e0/0x6e0
[  198.527073]  ? __fget+0x237/0x370
[  198.530516]  ? __fget_light+0x172/0x1f0
[  198.534480]  ? __fdget+0x1b/0x20
[  198.537830]  ? sockfd_lookup_light+0xb4/0x160
[  198.542312]  __sys_sendmmsg+0x152/0x3a0
[  198.546275]  ? SyS_sendmsg+0x50/0x50
[  198.549986]  ? kasan_check_read+0x11/0x20
[  198.554128]  ? _copy_to_user+0x87/0xd0
[  198.558021]  ? put_timespec64+0xb4/0x100
[  198.562076]  ? nsecs_to_jiffies+0x30/0x30
[  198.566216]  ? SyS_clock_gettime+0xf8/0x180
[  198.570529]  SyS_sendmmsg+0x35/0x60
[  198.574143]  ? __sys_sendmmsg+0x3a0/0x3a0
[  198.578277]  do_syscall_64+0x1e8/0x640
[  198.582154]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  198.586995]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  198.592179] RIP: 0033:0x459829
[  198.595353] RSP: 002b:00007f9a7b4bec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  198.603051] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459829
[  198.610309] RDX: 0000000000000001 RSI: 0000000020005c00 RDI: 0000000000000004
[  198.617565] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000
[  198.624826] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9a7b4bf6d4
[  198.632084] R13: 00000000004c6fe8 R14: 00000000004dc518 R15: 00000000ffffffff
[  198.639343] Code: e8 03 80 3c 18 00 0f 85 6f 39 00 00 48 8b 85 28 ff ff ff 48 8b 18 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 8a 39 00 00 48 8b 5b 18 48 8d bb 00 02 00 00 
[  198.658550] RIP: rxrpc_connect_call+0xc9/0x41a0 RSP: ffff888059f7f738
[  198.666607] ---[ end trace ff01d88d595b687e ]---
[  198.671453] Kernel panic - not syncing: Fatal exception
[  198.677716] Kernel Offset: disabled
[  198.681331] Rebooting in 86400 seconds..