[ 107.675865][ T27] audit: type=1800 audit(1578702153.883:40): pid=10134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 112.060828][ T27] audit: type=1400 audit(1578702158.293:41): avc: denied { map } for pid=10313 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.159' (ECDSA) to the list of known hosts. 2020/01/11 00:22:46 fuzzer started [ 120.669721][ T27] audit: type=1400 audit(1578702166.893:42): avc: denied { map } for pid=10322 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/01/11 00:22:48 dialing manager at 10.128.0.26:35995 2020/01/11 00:22:49 syscalls: 2847 2020/01/11 00:22:49 code coverage: enabled 2020/01/11 00:22:49 comparison tracing: enabled 2020/01/11 00:22:49 extra coverage: enabled 2020/01/11 00:22:49 setuid sandbox: enabled 2020/01/11 00:22:49 namespace sandbox: enabled 2020/01/11 00:22:49 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/11 00:22:49 fault injection: enabled 2020/01/11 00:22:49 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/11 00:22:49 net packet injection: enabled 2020/01/11 00:22:49 net device setup: enabled 2020/01/11 00:22:49 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/01/11 00:22:49 devlink PCI setup: PCI device 0000:00:10.0 is not available 00:24:40 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$MON_IOCG_STATS(r0, 0xc0109207, &(0x7f0000000100)) [ 234.011711][ T27] audit: type=1400 audit(1578702280.243:43): avc: denied { map } for pid=10339 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=22398 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 00:24:40 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setstatus(r0, 0x4, 0x98428d57a99b5f44) write$UHID_DESTROY(r0, &(0x7f0000000340), 0x4) [ 234.232829][T10340] IPVS: ftp: loaded support on port[0] = 21 [ 234.377604][T10340] chnl_net:caif_netlink_parms(): no params data found [ 234.432941][T10343] IPVS: ftp: loaded support on port[0] = 21 [ 234.442910][T10340] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.452265][T10340] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.460603][T10340] device bridge_slave_0 entered promiscuous mode [ 234.475165][T10340] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.482385][T10340] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.491946][T10340] device bridge_slave_1 entered promiscuous mode 00:24:40 executing program 2: ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000001a00)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000200)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x81, 0x3, 0x0, 0x0, "f0b8fbc3"}, 0x0, 0x0, @fd}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 234.533802][T10340] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 234.560437][T10340] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 234.609447][T10340] team0: Port device team_slave_0 added [ 234.619611][T10340] team0: Port device team_slave_1 added [ 234.700349][T10340] device hsr_slave_0 entered promiscuous mode [ 234.749534][T10340] device hsr_slave_1 entered promiscuous mode 00:24:41 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$MON_IOCG_STATS(r0, 0xc0109207, &(0x7f0000000100)) [ 234.811161][T10345] IPVS: ftp: loaded support on port[0] = 21 [ 235.013198][T10343] chnl_net:caif_netlink_parms(): no params data found 00:24:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x3, r3, {0x2, 0x0, @dev}, 0x2}}, 0x2e) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, 0x0) [ 235.182294][ T27] audit: type=1400 audit(1578702281.413:44): avc: denied { create } for pid=10340 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 235.207244][ T27] audit: type=1400 audit(1578702281.413:45): avc: denied { write } for pid=10340 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 235.207275][ T27] audit: type=1400 audit(1578702281.413:46): avc: denied { read } for pid=10340 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 235.363505][T10340] netdevsim netdevsim0 netdevsim0: renamed from eth0 00:24:41 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/unix\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r1, 0x0, 0x80000000000007e) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') socket$alg(0x26, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, 0x0) [ 235.461710][T10343] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.469817][T10343] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.478239][T10343] device bridge_slave_0 entered promiscuous mode [ 235.510979][T10340] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 235.561691][T10340] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 235.641268][T10343] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.648353][T10343] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.656227][T10343] device bridge_slave_1 entered promiscuous mode [ 235.671962][T10345] chnl_net:caif_netlink_parms(): no params data found [ 235.686029][T10340] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 235.767109][T10350] IPVS: ftp: loaded support on port[0] = 21 [ 235.794506][T10351] IPVS: ftp: loaded support on port[0] = 21 [ 235.794718][T10353] IPVS: ftp: loaded support on port[0] = 21 [ 235.841401][T10345] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.848572][T10345] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.856567][T10345] device bridge_slave_0 entered promiscuous mode [ 235.866618][T10345] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.873864][T10345] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.881653][T10345] device bridge_slave_1 entered promiscuous mode [ 235.890479][T10343] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 235.905570][T10343] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 235.947245][T10345] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 235.960565][T10345] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 235.991772][T10345] team0: Port device team_slave_0 added [ 235.999952][T10343] team0: Port device team_slave_0 added [ 236.025622][T10345] team0: Port device team_slave_1 added [ 236.044155][T10343] team0: Port device team_slave_1 added [ 236.140810][T10345] device hsr_slave_0 entered promiscuous mode [ 236.189118][T10345] device hsr_slave_1 entered promiscuous mode [ 236.238952][T10345] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 236.246771][T10345] Cannot create hsr debugfs directory [ 236.352270][T10343] device hsr_slave_0 entered promiscuous mode [ 236.389187][T10343] device hsr_slave_1 entered promiscuous mode [ 236.458856][T10343] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 236.466415][T10343] Cannot create hsr debugfs directory [ 236.607307][T10353] chnl_net:caif_netlink_parms(): no params data found [ 236.708001][T10350] chnl_net:caif_netlink_parms(): no params data found [ 236.730825][T10351] chnl_net:caif_netlink_parms(): no params data found [ 236.811556][T10351] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.818623][T10351] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.826660][T10351] device bridge_slave_0 entered promiscuous mode [ 236.841750][T10351] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.848946][T10351] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.856831][T10351] device bridge_slave_1 entered promiscuous mode [ 236.924690][T10343] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 236.976057][T10343] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 237.010254][T10353] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.017383][T10353] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.025413][T10353] device bridge_slave_0 entered promiscuous mode [ 237.044181][T10350] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.053728][T10350] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.063640][T10350] device bridge_slave_0 entered promiscuous mode [ 237.074141][T10351] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.085056][T10343] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 237.151139][T10353] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.158213][T10353] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.167827][T10353] device bridge_slave_1 entered promiscuous mode [ 237.175477][T10345] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 237.241575][T10350] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.248664][T10350] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.257203][T10350] device bridge_slave_1 entered promiscuous mode [ 237.265945][T10351] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 237.285022][T10343] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 237.337383][T10345] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 237.427416][T10351] team0: Port device team_slave_0 added [ 237.443382][T10353] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.453604][T10345] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 237.513119][T10350] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.526552][T10340] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.535477][T10351] team0: Port device team_slave_1 added [ 237.545770][T10353] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 237.571032][T10345] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 237.602532][T10350] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 237.631856][T10353] team0: Port device team_slave_0 added [ 237.642880][T10350] team0: Port device team_slave_0 added [ 237.673296][T10353] team0: Port device team_slave_1 added [ 237.691041][T10350] team0: Port device team_slave_1 added [ 237.697595][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.706402][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.717802][T10340] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.804000][T10353] device hsr_slave_0 entered promiscuous mode [ 237.849638][T10353] device hsr_slave_1 entered promiscuous mode [ 237.889062][T10353] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 237.896808][T10353] Cannot create hsr debugfs directory [ 237.940838][T10351] device hsr_slave_0 entered promiscuous mode [ 237.989386][T10351] device hsr_slave_1 entered promiscuous mode [ 238.038942][T10351] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 238.046492][T10351] Cannot create hsr debugfs directory [ 238.112153][T10350] device hsr_slave_0 entered promiscuous mode [ 238.149239][T10350] device hsr_slave_1 entered promiscuous mode [ 238.198872][T10350] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 238.206423][T10350] Cannot create hsr debugfs directory [ 238.245278][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.254232][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.263138][ T2979] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.270350][ T2979] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.278393][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.287961][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.296345][ T2979] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.303426][ T2979] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.311778][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.366675][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.451942][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.530441][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.539931][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.575760][T10353] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 238.632704][T10353] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 238.696667][T10353] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 238.741000][T10353] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 238.791693][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.799890][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.808301][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.855787][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.866596][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.875319][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.884032][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.894635][T10340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 238.914542][T10350] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 238.982856][T10351] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 239.045933][T10345] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.053927][T10350] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 239.116559][T10350] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 239.172831][T10350] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 239.250235][T10351] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 239.296147][T10351] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 239.362488][T10343] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.382995][T10351] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 239.428879][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 239.436305][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 239.450663][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.458365][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.475985][T10343] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.500096][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.512898][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.529157][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.537788][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.546321][ T2894] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.553393][ T2894] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.561574][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.570799][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.579252][ T2894] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.586287][ T2894] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.593920][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.603932][T10345] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.616222][T10340] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 239.640939][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.652489][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 239.661778][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.671490][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.680268][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 239.718959][ T2762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.727601][ T2762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.736684][ T2762] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.743896][ T2762] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.752838][ T2762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.761850][ T2762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.771175][ T2762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 239.780706][ T2762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 239.825907][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.834159][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.843383][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.852867][ T2887] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.859990][ T2887] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.867955][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.876616][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 239.884901][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.934631][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.943794][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.952053][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 239.960889][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.969838][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.980238][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 239.993945][T10353] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.003928][T10343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 240.026083][T10340] device veth0_vlan entered promiscuous mode [ 240.053393][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 240.062545][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.071942][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.080811][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.090219][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.097905][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.106118][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.114159][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.133345][T10353] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.160112][T10350] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.166934][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.175899][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.187637][T10340] device veth1_vlan entered promiscuous mode [ 240.209696][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 240.217726][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 240.226499][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.237770][T10345] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 240.250446][T10345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 240.274851][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 240.284950][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.294951][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.303614][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.312505][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.321604][ T2886] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.328662][ T2886] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.337563][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.360942][T10343] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.375028][T10350] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.383500][ T27] audit: type=1400 audit(1578702286.613:47): avc: denied { associate } for pid=10340 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 240.417707][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.427837][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.437009][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.446181][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.455508][ T2894] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.462633][ T2894] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.471595][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.480902][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.490836][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.499971][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.508303][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.517211][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.544166][T10351] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.569907][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.578096][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.587738][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.596478][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.605091][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.613823][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 240.621784][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.630302][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.639406][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.647918][ T2894] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.650539][ T27] audit: type=1400 audit(1578702286.873:48): avc: denied { open } for pid=10357 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 240.655018][ T2894] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.690055][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 240.715398][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.724121][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.734125][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.743023][ T2885] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.750141][ T2885] bridge0: port 2(bridge_slave_1) entered forwarding state 00:24:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000a00)="a9", 0x3}], 0x1) [ 240.759605][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.783000][T10351] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.795856][T10345] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.840195][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.850241][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.858091][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.866664][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.876553][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 00:24:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200002a000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b70000000f00000095000000000000003b1c38312c8021431088eccfb0dc47421e7af7c71d8255e61cc1bc3fa2d3974f52830c8982d2596bab1c6bcf9e0000f2cfd77c29b7097491e182cd24dc8f9b2fce787d745202ba97c99a477cd778ff7f96861e449addb5df4266a90f71e0e4cf8a9c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff043051fffffe100001b00633a77fb892f1414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) [ 240.886114][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.897150][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.951429][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.960594][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.971745][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.980430][ T2885] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.988546][ T2885] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.996602][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 241.005899][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 241.008452][ T27] audit: type=1400 audit(1578702287.233:49): avc: denied { kernel } for pid=10368 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 241.015233][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 241.047010][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 241.055603][ C1] hrtimer: interrupt took 29659 ns [ 241.056358][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 241.069504][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 241.089860][T10350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 241.103345][ T27] audit: type=1400 audit(1578702287.303:50): avc: denied { prog_load } for pid=10368 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 241.139984][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.150179][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.159494][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.168367][ T2885] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.175496][ T2885] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.184798][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 241.229284][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 241.236707][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.246325][ T27] audit: type=1400 audit(1578702287.453:51): avc: denied { prog_run } for pid=10368 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 241.247680][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 00:24:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @initdev}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000100), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) [ 241.284777][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.295091][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 241.304052][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 241.331475][T10343] device veth0_vlan entered promiscuous mode [ 241.348191][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.356166][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.371508][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 241.405626][T10353] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 241.426818][T10343] device veth1_vlan entered promiscuous mode [ 241.453410][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 241.464351][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 241.475895][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 241.484985][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 241.496000][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.505757][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 241.516789][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 241.533712][T10350] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 241.566154][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 241.574821][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 241.588290][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.597154][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 241.606061][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 241.614651][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 241.623117][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 241.633479][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.641343][ T2894] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 00:24:47 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, 0x0, 0x0) [ 241.711013][T10345] device veth0_vlan entered promiscuous mode [ 241.741711][T10351] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 241.758973][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 241.767248][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 241.780312][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 241.859825][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 241.873954][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.896395][T10345] device veth1_vlan entered promiscuous mode [ 241.908788][T10350] device veth0_vlan entered promiscuous mode [ 241.933569][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.946966][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.955414][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 241.965562][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 241.988257][T10350] device veth1_vlan entered promiscuous mode [ 242.023991][T10389] overlayfs: filesystem on './file0' not supported as upperdir [ 242.038252][T10351] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 242.060492][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 242.078519][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 00:24:48 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setstatus(r0, 0x4, 0x98428d57a99b5f44) write$UHID_DESTROY(r0, &(0x7f0000000340), 0x4) [ 242.162557][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 242.177972][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 242.213745][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 242.223257][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 242.234752][T10353] device veth0_vlan entered promiscuous mode [ 242.305491][T10353] device veth1_vlan entered promiscuous mode 00:24:48 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$MON_IOCG_STATS(r0, 0xc0109207, &(0x7f0000000100)) [ 242.473176][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 242.507551][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 242.571540][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 242.610791][T10406] overlayfs: failed to resolve './file0': -2 00:24:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1e) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 242.616030][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 242.738648][T10351] device veth0_vlan entered promiscuous mode 00:24:49 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x64) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000a00)=ANY=[@ANYBLOB="aaaaaaaaaa29ffffffffffff8100310086dd663f382715013c08fe8000000000000000000000000000aafe8000000000000000000000000000aa870e040707400600000000000000000cc7e7940000000001fe800000000000000000000000000023ff01000000000000000000000000000100000000000000000000ffffac1e000100000000000000000000ffff0000010100000000000000000000000000000001fe8000000000000000000000000000bb0009000000000000010500000000000738000000070c4b09000100000000000000ffffff7f000000009a00000000000000fe7f00000000000003000000000000007906000000000000c20400000003c204000000060000000c00038a6400000006000106000000002fbf04058160000000000000000000000000ffffac1414bb00000000000000000000ffff00000000ff0100000000000000000000000000010000000000000000000000000000000193fce9737feec98be08763dc009c98d03311000000000000c2040000040001060000000000000401060104000000000502000805020007083a7c8cb38f2831970abf03bdf066e30e39810e8a7aee0ce79dd980dee2bebc1fc01ac4fd5d99ae118851b5004225847886e4a3d9d9eadbfd74957f040101c966000000000000000000000000000000000718000007ff04ff0008ff7f0000000000000200000000000000000000000000ae12040907500080ff01000000000000000000000000000100000000000000000000000000000000fe800000000000000000000000000010915dc0aa16b281f60463e06bb02fcc4dfe8000000000000000000000000000bb00000000000000000000000000000001fe80000000000000000000000000000efe8800000000000000000000000000012e02000700000000fe8000000000000000000000000000aa252c000000000000000100c910fe8000000000000000000000000000aa0592081c17a5d6e460e91ce551f398e2b8d964b65b8444c2af9bde862d40dfae733109d5a947598a2b1f3d8cbc494953e0f291eae9066018ac7209da778ef17ffa6ea603148eb3cda7294f1d1d9f534ae17324f67f4dca9bcc36d798e80e059fcfe56687001869903b87aa0c1244d4c344a3c18682ed95164ed7d2ce92ed4a0b321ba44eb59c5bf528a3aa8c5d01dcce00d537242a3c74d81a16d03ff6a6317cbe0a4969a64662cf3cd9911d4c0b8d3bd7de3ccc57d82919f0e236e7d6365334612404139e8e423c54f158df62eae49f8fc503aabd68975bf9fadd5d38c9cc35f63ce95b7c4dfa3b8b82eebdf2175ba81a13c9d158eccaddc7424ecbe04c4a0dc3bd9d48fe5c27860ca8263676e9d85a184e9288aae1fb43de4297c8faac2fa83a53b96cb1aae4f15b367a985e7b156a1ff07c26048f42fb36951d902e0001000401810101000401800400691c8f19bef14d25d9994873fa43cacc2c08d121dd52d20ed3a39659745c4a54769124e51df6a2c24b1c3b0ccfb5f6aa599671a15cb1ecd27846cc38ede2d17165b5f842502e8f5ded51aa7916a2aad2d02ce1f4ee936d37caf414f3ade5ea5b9a0228feb0fa6fb1eaab9c0b0b7ff4c0c78f79a9b64697ff5a4d8c93086a427d9a1f4bf16214e37869c6bcac8b589d074e7c4d2bfaa0cac72c7cc688fa9f6a1c0f542e189bb3b6ba6d28ea8d0dc118381abe0bd8b15bd0c3fd01bb06b7faf4c07fa799b7c7ec8ccf686dc53ba78868130605153194e3a1cae2f0a155f5fe672fd53378a1b1c3de753108cb38ced7332c03b1b9350dfe0be83b8d573fe26f43d1f07ce4e03dc0f0414602ff246bba4726b11890c1223030f6ea4ad38334949b947f64c467b08600141680e9c4b2c73cd86feb4f08634ed4d846f68c928b210b3176184fc6b3fba112914feec62b8df38a9ac1e1191a1a07fb48eb3cd41f31f78bbdb2da86c64c4a77f485502f4492245fa21bbc3b9cc0f8e49bfa327334d1c625326c76411666ca23d86ff4a5e47d2172be176f253f67cc34580db6de59c2c0dd0e35e4f30742d221781180c67b1614b01d515988716f5caebe3e957597216ee5a39b4dbe3e8168ae8d1c818e5dc99d4c3a2901efeff4f3347542cdbfebacc90db6e07d8763c2635c5c91f9309e0fb0ee11837e7ee299f2faffa5cee06908d7008360b05b5ee2cd0df257a9a1733d20fb7d"], &(0x7f00000003c0)={0x0, 0x1, [0x871, 0x0, 0xd68, 0x8c]}) pipe(&(0x7f0000000080)) close(0xffffffffffffffff) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = accept$ax25(r0, 0x0, &(0x7f0000000680)) recvmmsg(r1, &(0x7f0000007080), 0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x40040, 0x0) pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007080)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000280)=""/136, 0x88}, {0x0}, {&(0x7f0000000400)=""/254, 0xfe}, {&(0x7f0000000500)=""/153, 0x99}], 0x4}}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/120, 0x78}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f000095dffc)=0x1) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000000), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, 0x0, &(0x7f0000000380)) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) pipe(&(0x7f0000000080)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000040)) syz_open_dev$mice(&(0x7f0000000640)='/dev/input/mice\x00', 0x0, 0x402000) socket(0x10, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000002a00)) [ 242.795711][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 242.811240][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 00:24:49 executing program 2: ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000001a00)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000200)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x81, 0x3, 0x0, 0x0, "f0b8fbc3"}, 0x0, 0x0, @fd}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 242.879102][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 242.909421][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 00:24:49 executing program 5: r0 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000180)="00cc67fb79f4442905b3", 0xa, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000280)={r0, r1, r0}, &(0x7f0000000480)=""/83, 0x53, 0x0) [ 242.965465][T10351] device veth1_vlan entered promiscuous mode [ 243.163471][T10428] overlayfs: workdir and upperdir must reside under the same mount [ 243.362605][T10428] overlayfs: filesystem on './file1' not supported as upperdir 00:24:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800e00000000300000000000000000903000000008e17"], 0x0, 0x1b}, 0x20) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 00:24:49 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r0, &(0x7f00000007c0)={&(0x7f0000000380)=@id, 0x10, 0x0}, 0x0) 00:24:49 executing program 2: ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000001a00)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000200)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x81, 0x3, 0x0, 0x0, "f0b8fbc3"}, 0x0, 0x0, @fd}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 00:24:49 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000400)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r0, 0xc0884123, &(0x7f00000000c0)={0x0, "c42d403a1c325b1484d610b5e5c45eeab9a99d518cfb1b6e0ce870dfb890442abec469694679f7f7cbbb591aca6933c9a7e1b30b570db087f760c38676bce12c"}) 00:24:49 executing program 5: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 243.709324][T10456] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 00:24:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_open_procfs(0x0, 0x0) 00:24:52 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r0 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x53, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x8000000000001f0, 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 00:24:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1000}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 00:24:52 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000280)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000001480)=[{&(0x7f00000000c0)=""/83, 0x53}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_uring_register$IORING_UNREGISTER_BUFFERS(r0, 0x1, 0x0, 0x0) 00:24:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000140), 0x10) setsockopt(r0, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) close(r0) 00:24:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0xfffffffd}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0x10, 0x0}, 0x0) [ 246.152529][ T27] audit: type=1400 audit(1578702292.383:52): avc: denied { map_create } for pid=10476 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:24:52 executing program 3: r0 = eventfd(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000080)={r3, 0x0, 0x2, r0}) 00:24:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_open_procfs(0x0, 0x0) 00:24:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x80) r1 = socket(0x2, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") 00:24:52 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001dc0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 00:24:53 executing program 4: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x1e) unshare(0x20600) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f00000001c0)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) getpid() r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)) 00:24:53 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) [ 246.983553][ T27] audit: type=1800 audit(1578702293.213:53): pid=10491 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16557 res=0 00:24:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1000}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 00:24:53 executing program 1: r0 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) tkill(r0, 0x1000000000014) [ 247.187012][T10531] snd_dummy snd_dummy.0: control 112:0:0:Î:0 is already present 00:24:53 executing program 0: perf_event_open(&(0x7f0000001600)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x6, &(0x7f00000012c0)=0x0) r1 = socket(0x10, 0x80002, 0x0) write(r1, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) r2 = socket(0x10, 0x80002, 0x0) write(r2, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) recvmmsg(r2, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) 00:24:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000240)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\xa6,\x0f[\xdd\xf1\x02\x99\xdf\x92\xd5>oJ\xa1[\x9fh\x1b\xe5\x8c\xc8\xb8\xed\xd3F\x04\xef\x04\xee9\xb8\xbd\xb5\x9a\xe1\t\x8eX\x19\v.\xf8\xbd\xa5\xd5d\xad\xfe\xd1\x05\"\xa5\xbf\x85\xc4\xa1\xabK9\x8f\x14\xcbPw\x83B\xc6dk\xfa\xae\x94\xb3\xa9\xa5\x84D\xdd\xee\xd8\x17$\xc3\x03\x03\xb7(\x85\x90>\x1e\xd4\xea\x82\v\x01\x1eD\x95o09HI\xb8i\x9d]\x18r\x82t\x0f\xe4\xe1j\v8\a\xf9\xf0\x94QQ})b\x111\xbb\x8c\xefx\xa3\xc9\v&\xbd(P\xfa<\x0f\xfa@\x80\xcc\x92\xbetJ\xbd\xf2>\xf9x\x02\x88 E\xb1\xdf\xde7\x8d\x97\ad|\xf5\xc1\xec\x1f\xac\a\x84Pf\xf2b\xd2\xecZ!\x14\xb1\xb0\xa1\xdb\xae{N\xf9\xfc\xc9J2\xdf\tM\x00\x00\x00\x00\x00\x00\x00', 0x2) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x4) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) fchown(r1, 0x0, 0x0) 00:24:53 executing program 4: socket$inet6(0xa, 0x8000008000080003, 0x5) socket(0x10, 0x80002, 0x0) socket$inet6(0xa, 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') r1 = socket$inet6(0xa, 0x800000003, 0xff) dup(r1) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) getdents64(r0, &(0x7f0000000380)=""/87, 0x1f7) getdents64(r0, &(0x7f0000000080)=""/167, 0xa7) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 00:24:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) recvmmsg(r0, &(0x7f0000003740)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)=""/146, 0x92}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) 00:24:54 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='etds trusted:u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 00:24:54 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e21, 0x8, @loopback, 0x7}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1000}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 00:24:54 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) [ 248.298407][T10572] encrypted_key: keylen parameter is missing 00:24:54 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, 0xd}) 00:24:54 executing program 3: socket$kcm(0x11, 0x800000000000005, 0x0) r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x111) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x3f, &(0x7f0000000080)) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r2 = getpid() perf_event_open(0x0, r2, 0xa, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r2, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000000c0)='wlan1}em1\x00'}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000340)=ANY=[@ANYBLOB="07080000000000000000000000000000000000000000000000000000ad8c000000000000"]) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000200)=@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x13}}, 0x80, &(0x7f0000001e00)=[{0x0}, {&(0x7f0000000140)="861f00b2511bf2db3b014c285cdff2af75", 0x11}, {&(0x7f0000000280)}, {&(0x7f0000002180)}, {&(0x7f0000001d40)="1273a4ffd1a14c6361a1f93eaeb4d850b3c4f707d135623b3607bc2ef691af6a28992402c511827cb395b6c3148c0bc1e46e8a34c1cdb81ede6811ed4a375a0ce7d649f6e2db9beefd6da80f8cab181ed4639a3b98192055667edd64cd8a0a0a8f5134df2578763bf566b8af1a69a7e7da0188381381ede3", 0x78}], 0x5, &(0x7f0000002740)=ANY=[@ANYBLOB="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"/809], 0x32f}, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x4, 0x40, 0x1}, 0x193) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0xfffffffffffffe05, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003300050ad25a80648c6356c10424fc00106000000a000000053582c1b0acea8b0900098003001700d1bd", 0x2e}], 0x1}, 0x0) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000080)=r4, 0x4) perf_event_open(&(0x7f00000003c0)={0x4, 0x70, 0x80, 0x9, 0x1, 0x0, 0x0, 0x1ff, 0x10, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4a3, 0x2, @perf_config_ext={0x2, 0x8000}, 0x0, 0x3f, 0x5, 0x9, 0x6, 0x0, 0x4}, 0xffffffffffffffff, 0xd, r4, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0xab0012beb63a1625}, 0x0, 0x0, 0xffffffffffffffff, 0x2) gettid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='cpuacct.stat\x00', 0x0, 0x0) 00:24:54 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x1, 0x10, &(0x7f0000000000)={0x2}, 0x2d7}, 0x70) [ 248.581341][T10583] device lo entered promiscuous mode 00:24:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000021008102e00f80ecdb4cb9020200000001000006810040fb12001800040fda1b40d719a906000500000f", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 00:24:57 executing program 1: r0 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) tkill(r0, 0x1000000000014) 00:24:57 executing program 5: socket$kcm(0x11, 0x800000000000005, 0x0) r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x111) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x3f, &(0x7f0000000080)) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000000c0)='wlan1}em1\x00'}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)=ANY=[@ANYBLOB="07080000000000000000000000000000000000000000000000000000ad8c000000000000"]) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000200)=@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x13}}, 0x80, &(0x7f0000001e00)=[{0x0}, {&(0x7f0000000140)="861f00b2511bf2db3b014c285cdff2af75", 0x11}, {&(0x7f0000000280)}, {&(0x7f0000002180)}, {&(0x7f0000001d40)="1273a4ffd1a14c6361a1f93eaeb4d850b3c4f707d135623b3607bc2ef691af6a28992402c511827cb395b6c3148c0bc1e46e8a34c1cdb81ede6811ed4a375a0ce7d649f6e2db9beefd6da80f8cab181ed4639a3b98192055667edd64cd8a0a0a8f5134df2578763bf566b8af1a69a7e7da0188381381ede3", 0x78}], 0x5, &(0x7f0000002740)=ANY=[@ANYBLOB="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"], 0x326}, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x4, 0x40, 0x1}, 0x193) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280), 0x0) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000080)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x4, 0x70, 0x80, 0x9, 0x1, 0x0, 0x0, 0x1ff, 0x10, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4a3, 0x2, @perf_config_ext={0x2, 0x8000}, 0x0, 0x3f, 0x5, 0x9, 0x6, 0x0, 0x4}, 0xffffffffffffffff, 0xd, r3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0xab0012beb63a1625}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) gettid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='cpuacct.stat\x00', 0x0, 0x0) 00:24:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000380)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, 0x0, 0x0, &(0x7f00000021c0)=""/194, 0xc2}, 0x2061) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, 0x0) socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x22, 0x80003, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) socket$kcm(0x11, 0x0, 0x0) 00:24:57 executing program 3: 00:24:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='auxv\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) 00:24:57 executing program 4: 00:24:57 executing program 3: 00:24:57 executing program 4: [ 251.291104][T10616] device lo entered promiscuous mode 00:24:57 executing program 0: 00:24:57 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000021008102e00f80ecdb4cb9020200000001000000810040fb12001800040fda1b40d719a906000500000f", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 00:24:57 executing program 3: 00:24:57 executing program 4: 00:24:59 executing program 1: r0 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) tkill(r0, 0x1000000000014) 00:24:59 executing program 0: 00:24:59 executing program 4: 00:24:59 executing program 3: 00:24:59 executing program 2: 00:24:59 executing program 5: 00:24:59 executing program 4: 00:24:59 executing program 2: 00:24:59 executing program 3: 00:24:59 executing program 0: 00:24:59 executing program 5: 00:24:59 executing program 0: 00:25:00 executing program 1: r0 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) tkill(r0, 0x1000000000014) 00:25:00 executing program 4: 00:25:00 executing program 5: 00:25:00 executing program 2: 00:25:00 executing program 3: 00:25:00 executing program 0: 00:25:00 executing program 2: 00:25:00 executing program 5: 00:25:00 executing program 0: 00:25:00 executing program 3: 00:25:00 executing program 4: 00:25:01 executing program 2: 00:25:02 executing program 1: gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) 00:25:02 executing program 5: 00:25:02 executing program 4: 00:25:02 executing program 3: 00:25:02 executing program 0: 00:25:02 executing program 2: 00:25:02 executing program 0: 00:25:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[{@map_acorn='map=acorn'}, {@uid={'uid'}}]}) 00:25:02 executing program 4: 00:25:02 executing program 3: 00:25:02 executing program 5: 00:25:02 executing program 0: [ 256.402243][T10716] ISOFS: Unable to identify CD-ROM format. 00:25:03 executing program 1: gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) 00:25:03 executing program 4: 00:25:03 executing program 5: 00:25:03 executing program 3: 00:25:03 executing program 2: 00:25:03 executing program 0: 00:25:04 executing program 5: 00:25:04 executing program 4: 00:25:04 executing program 3: 00:25:04 executing program 2: 00:25:04 executing program 0: 00:25:04 executing program 4: 00:25:05 executing program 1: gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) 00:25:05 executing program 3: 00:25:05 executing program 5: 00:25:05 executing program 0: 00:25:05 executing program 2: 00:25:05 executing program 4: 00:25:05 executing program 3: 00:25:05 executing program 4: 00:25:05 executing program 2: 00:25:05 executing program 5: 00:25:05 executing program 0: 00:25:06 executing program 2: 00:25:07 executing program 1: r0 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000140)) tkill(r0, 0x1000000000014) 00:25:07 executing program 3: 00:25:07 executing program 0: 00:25:07 executing program 5: 00:25:07 executing program 4: 00:25:07 executing program 2: 00:25:07 executing program 2: 00:25:07 executing program 0: 00:25:07 executing program 5: 00:25:07 executing program 4: 00:25:07 executing program 3: 00:25:07 executing program 0: 00:25:10 executing program 1: r0 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000140)) tkill(r0, 0x1000000000014) 00:25:10 executing program 2: 00:25:10 executing program 3: 00:25:10 executing program 5: 00:25:10 executing program 4: 00:25:10 executing program 0: 00:25:10 executing program 2: 00:25:10 executing program 0: 00:25:10 executing program 5: 00:25:10 executing program 4: 00:25:10 executing program 3: 00:25:10 executing program 2: 00:25:13 executing program 1: r0 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000140)) tkill(r0, 0x1000000000014) 00:25:13 executing program 0: 00:25:13 executing program 5: 00:25:13 executing program 3: 00:25:13 executing program 4: 00:25:13 executing program 2: 00:25:13 executing program 2: 00:25:13 executing program 3: 00:25:13 executing program 5: 00:25:13 executing program 4: 00:25:13 executing program 0: 00:25:13 executing program 5: 00:25:16 executing program 1: r0 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x8}}, 0x0) tkill(r0, 0x1000000000014) 00:25:16 executing program 2: 00:25:16 executing program 3: 00:25:16 executing program 4: 00:25:16 executing program 0: 00:25:16 executing program 5: 00:25:16 executing program 4: 00:25:16 executing program 5: 00:25:16 executing program 3: 00:25:16 executing program 2: 00:25:16 executing program 0: 00:25:17 executing program 5: 00:25:19 executing program 1: r0 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x8}}, 0x0) tkill(r0, 0x1000000000014) 00:25:19 executing program 3: 00:25:19 executing program 0: 00:25:19 executing program 4: 00:25:19 executing program 2: 00:25:19 executing program 5: 00:25:19 executing program 5: 00:25:19 executing program 2: 00:25:19 executing program 4: 00:25:20 executing program 3: 00:25:20 executing program 0: 00:25:20 executing program 5: 00:25:22 executing program 3: 00:25:22 executing program 2: 00:25:22 executing program 0: 00:25:22 executing program 4: 00:25:22 executing program 1: r0 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x8}}, 0x0) tkill(r0, 0x1000000000014) 00:25:22 executing program 5: 00:25:23 executing program 5: 00:25:23 executing program 4: 00:25:23 executing program 0: 00:25:23 executing program 2: unshare(0x400) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)) 00:25:23 executing program 3: sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)={0x30, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @rand_addr="e36de2c95296ec401f624c89f92f8359"}]}, 0x30}}, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x4e22}}, {{@in=@local}, 0x0, @in=@broadcast}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 00:25:23 executing program 5: io_setup(0x0, &(0x7f00000003c0)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000700)={0x1, 0x3, 0x0, 0x0, 0x8}) mkdirat(0xffffffffffffffff, &(0x7f00000004c0)='./file1\x00', 0x0) 00:25:23 executing program 4: unshare(0x400) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x14, 0x4, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x11, 0x5, &(0x7f0000000000)=@framed={{}, [@func, @map={0x18, 0x0, 0x1, 0x0, r0}, @exit]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:25:23 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0) 00:25:23 executing program 2: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000002300)={0x0, 0xfb, 0xfbd, 0x0, 0x0, "62cfc0096d81d69a9e3c5b8369c66908", "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"}, 0xfbd, 0x0) open(0x0, 0x0, 0x0) 00:25:23 executing program 4: socket$inet(0x2, 0x4000000000000001, 0x0) pipe(&(0x7f0000000140)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000002c0)=0x1b) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) [ 277.221370][ T27] audit: type=1400 audit(1578702323.453:54): avc: denied { map_read map_write } for pid=10946 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 277.455147][T10949] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 277.488211][T10949] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 277.517964][T10949] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 277.545006][T10949] EXT4-fs (loop3): orphan cleanup on readonly fs [ 277.557392][T10949] EXT4-fs error (device loop3): ext4_orphan_get:1247: comm syz-executor.3: bad orphan inode 2303484447 [ 277.602434][T10949] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 00:25:26 executing program 1: r0 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) tkill(r0, 0x1000000000014) 00:25:26 executing program 5: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x4) epoll_wait(r1, &(0x7f0000000100)=[{}], 0x1, 0x2e0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0xb5bd7dc56a15c312}) pipe(&(0x7f00000002c0)) 00:25:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) r2 = socket$inet(0x2, 0x3, 0x2) sendmmsg$inet(r2, &(0x7f0000005e80)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}}], 0x1, 0x0) 00:25:26 executing program 4: capset(&(0x7f0000000000)={0x19980330}, &(0x7f00000000c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 00:25:26 executing program 0: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) eventfd2(0x0, 0x0) 00:25:26 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x14f, &(0x7f0000000180)={0x0, 0x27}, 0x1, 0x0, 0x0, 0xd000}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000200)) epoll_wait(r2, &(0x7f0000000180)=[{}], 0x1, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = memfd_create(&(0x7f0000000100)='#\x00', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r4, 0x0) 00:25:26 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write(r1, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pipe(&(0x7f00000000c0)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000080)={0x0, r2+30000000}, 0x0) [ 279.848957][T10981] capability: warning: `syz-executor.4' uses 32-bit capabilities (legacy support in use) [ 279.886261][ T27] audit: type=1400 audit(1578702326.113:55): avc: denied { block_suspend } for pid=10970 comm="syz-executor.5" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 00:25:26 executing program 3: r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)="05", 0x1, 0xfffffffffffffffd) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) [ 280.031081][ T27] audit: type=1400 audit(1578702326.143:56): avc: denied { map } for pid=10974 comm="syz-executor.3" path=2F6D656D66643A23202864656C6574656429 dev="tmpfs" ino=41857 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 00:25:26 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b, 0x0, 0xffffffffffffffff}) dup(r1) socket$nl_generic(0x10, 0x3, 0x10) unshare(0x400) pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400), 0x0) 00:25:26 executing program 3: r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)="05", 0x1, 0xfffffffffffffffd) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) 00:25:26 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$join(0x1, 0x0) 00:25:26 executing program 4: capset(&(0x7f0000000000)={0x19980330}, &(0x7f00000000c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 00:25:29 executing program 1: r0 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) tkill(r0, 0x1000000000014) 00:25:29 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000040)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000200)='./bus/file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) 00:25:29 executing program 3: r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)="05", 0x1, 0xfffffffffffffffd) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) 00:25:29 executing program 5: unshare(0x400) r0 = syz_open_dev$evdev(&(0x7f0000002540)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x400445a0, &(0x7f0000000040)=[0x1]) 00:25:29 executing program 4: capset(&(0x7f0000000000)={0x19980330}, &(0x7f00000000c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 00:25:29 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0xc740) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = dup(r1) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080), 0x4) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000002c0)) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:25:29 executing program 3: r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)="05", 0x1, 0xfffffffffffffffd) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) [ 283.041348][T11038] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 00:25:29 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000140)={{}, {0x77359400}}, 0x0) syz_open_pts(r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 00:25:29 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000040)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000200)='./bus/file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) 00:25:29 executing program 0: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000440)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) splice(r2, 0x0, r1, 0x0, 0x81, 0x0) 00:25:29 executing program 3: r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) 00:25:29 executing program 4: capset(&(0x7f0000000000)={0x19980330}, &(0x7f00000000c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 00:25:32 executing program 1: r0 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) tkill(r0, 0x1000000000014) 00:25:32 executing program 3: r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) 00:25:32 executing program 4: capset(&(0x7f0000000000)={0x19980330}, &(0x7f00000000c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 00:25:32 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000040)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000200)='./bus/file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) 00:25:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0xa02000000000000, 0x60, &(0x7f00000008c0)={'filter\x00', 0xc001, 0x4, 0x3e0, 0x0, 0x100, 0x1e8, 0x2f8, 0x2f8, 0x2f8, 0x4, 0x0, {[{{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x1e8}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'team0\x00', 'macvlan1\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @mac=@dev, @empty, @remote}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x430) 00:25:32 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) 00:25:32 executing program 3: r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) [ 286.069669][T11076] kasan: CONFIG_KASAN_INLINE enabled [ 286.100017][T11076] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 286.160572][T11076] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 286.167542][T11076] CPU: 0 PID: 11076 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 286.176213][T11076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.186362][T11076] RIP: 0010:xt_rateest_put+0xa1/0x440 [ 286.191721][T11076] Code: 85 87 01 fb 45 84 f6 0f 84 68 02 00 00 e8 37 86 01 fb 49 8d bd 68 13 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 6c 03 00 00 4d 8b b5 68 13 00 00 e8 29 bf ed fa [ 286.212288][T11076] RSP: 0018:ffffc90001797940 EFLAGS: 00010202 [ 286.218335][T11076] RAX: dffffc0000000000 RBX: ffff88809def4400 RCX: ffffc90014adb000 [ 286.226298][T11076] RDX: 000000000000026d RSI: ffffffff8673a0b9 RDI: 0000000000001368 [ 286.234275][T11076] RBP: ffffc90001797970 R08: ffff888050b4a100 R09: ffffed1015d0703d [ 286.242234][T11076] R10: ffffed1015d0703c R11: ffff8880ae8381e3 R12: 000000000000002d [ 286.250211][T11076] R13: 0000000000000000 R14: 0000000000000001 R15: ffffffff8673a470 [ 286.258187][T11076] FS: 00007fba63eef700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 286.267102][T11076] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 286.274633][T11076] CR2: 00007fecb5e21518 CR3: 00000000a1708000 CR4: 00000000001406f0 [ 286.282669][T11076] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 286.290886][T11076] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 286.298838][T11076] Call Trace: [ 286.302117][T11076] ? xt_rateest_put+0x440/0x440 [ 286.306964][T11076] xt_rateest_tg_destroy+0x72/0xa0 [ 286.312115][T11076] ? xt_percpu_counter_free+0x8f/0xd0 [ 286.317503][T11076] translate_table+0x11f4/0x1d80 [ 286.322433][T11076] ? arpt_alloc_initial_table+0x690/0x690 [ 286.328169][T11076] ? lock_downgrade+0x920/0x920 [ 286.333055][T11076] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 286.339344][T11076] ? _copy_from_user+0x12c/0x1a0 [ 286.344278][T11076] do_arpt_set_ctl+0x317/0x650 [ 286.349037][T11076] ? __do_replace+0xa80/0xa80 [ 286.353708][T11076] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 286.359397][T11076] ? rcu_read_lock_held+0x9c/0xb0 [ 286.364418][T11076] ? wait_for_completion+0x440/0x440 [ 286.369686][T11076] ? mutex_unlock+0xd/0x10 [ 286.374110][T11076] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 286.380082][T11076] nf_setsockopt+0x77/0xd0 [ 286.384506][T11076] ip_setsockopt+0xdf/0x100 [ 286.389018][T11076] udp_setsockopt+0x68/0xb0 [ 286.393529][T11076] sock_common_setsockopt+0x94/0xd0 [ 286.398735][T11076] __sys_setsockopt+0x261/0x4c0 [ 286.403591][T11076] ? sock_create_kern+0x50/0x50 [ 286.408468][T11076] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 286.413909][T11076] ? do_syscall_64+0x26/0x790 [ 286.418594][T11076] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.424658][T11076] ? do_syscall_64+0x26/0x790 [ 286.429321][T11076] __x64_sys_setsockopt+0xbe/0x150 [ 286.434539][T11076] do_syscall_64+0xfa/0x790 [ 286.439028][T11076] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.444899][T11076] RIP: 0033:0x45af49 [ 286.448780][T11076] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.468364][T11076] RSP: 002b:00007fba63eeec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 286.476754][T11076] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045af49 [ 286.484707][T11076] RDX: 0000000000000060 RSI: 0a02000000000000 RDI: 0000000000000003 [ 286.492659][T11076] RBP: 000000000075bf20 R08: 0000000000000430 R09: 0000000000000000 [ 286.500611][T11076] R10: 00000000200008c0 R11: 0000000000000246 R12: 00007fba63eef6d4 00:25:32 executing program 4: capset(&(0x7f0000000000)={0x19980330}, &(0x7f00000000c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 286.508564][T11076] R13: 00000000004d3440 R14: 00000000004e4298 R15: 00000000ffffffff [ 286.516518][T11076] Modules linked in: [ 286.543766][T11076] ---[ end trace e5afd15df5843284 ]--- [ 286.551952][T11076] RIP: 0010:xt_rateest_put+0xa1/0x440 [ 286.557441][T11076] Code: 85 87 01 fb 45 84 f6 0f 84 68 02 00 00 e8 37 86 01 fb 49 8d bd 68 13 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 6c 03 00 00 4d 8b b5 68 13 00 00 e8 29 bf ed fa [ 286.567817][ T4311] kobject: 'loop4' (00000000d640143a): kobject_uevent_env [ 286.579849][T11076] RSP: 0018:ffffc90001797940 EFLAGS: 00010202 [ 286.593157][T11076] RAX: dffffc0000000000 RBX: ffff88809def4400 RCX: ffffc90014adb000 00:25:32 executing program 3: r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x5) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)="05", 0x1, 0xfffffffffffffffd) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) [ 286.612686][T11076] RDX: 000000000000026d RSI: ffffffff8673a0b9 RDI: 0000000000001368 [ 286.627365][ T4311] kobject: 'loop4' (00000000d640143a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 286.642619][T11076] RBP: ffffc90001797970 R08: ffff888050b4a100 R09: ffffed1015d0703d 00:25:32 executing program 4: capset(&(0x7f0000000000)={0x19980330}, &(0x7f00000000c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 286.663053][T11076] R10: ffffed1015d0703c R11: ffff8880ae8381e3 R12: 000000000000002d [ 286.686175][ T4311] kobject: 'loop3' (00000000ed8272df): kobject_uevent_env 00:25:32 executing program 3: r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x5) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)="05", 0x1, 0xfffffffffffffffd) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) 00:25:32 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000040)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000200)='./bus/file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) [ 286.707647][ T4311] kobject: 'loop3' (00000000ed8272df): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 286.791996][T11076] R13: 0000000000000000 R14: 0000000000000001 R15: ffffffff8673a470 [ 286.800400][T11076] FS: 00007fba63eef700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 286.810652][T11076] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 286.817351][T11076] CR2: 0000000001065df8 CR3: 00000000a1708000 CR4: 00000000001406e0 [ 286.826818][ T4311] kobject: 'loop4' (00000000d640143a): kobject_uevent_env [ 286.834330][ T4311] kobject: 'loop4' (00000000d640143a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 286.847487][T11076] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 286.865625][ T4311] kobject: 'loop3' (00000000ed8272df): kobject_uevent_env [ 286.874186][T11076] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 286.888698][ T4311] kobject: 'loop3' (00000000ed8272df): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 286.903401][T11076] Kernel panic - not syncing: Fatal exception [ 286.910867][T11076] Kernel Offset: disabled [ 286.915231][T11076] Rebooting in 86400 seconds..