Warning: Permanently added '10.128.0.118' (ECDSA) to the list of known hosts. [ 36.557133] random: sshd: uninitialized urandom read (32 bytes read) 2019/09/17 02:09:59 fuzzer started [ 36.743707] kauditd_printk_skb: 10 callbacks suppressed [ 36.743716] audit: type=1400 audit(1568686199.924:36): avc: denied { map } for pid=6853 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 37.317151] random: cc1: uninitialized urandom read (8 bytes read) 2019/09/17 02:10:01 dialing manager at 10.128.0.105:38157 2019/09/17 02:10:01 syscalls: 2466 2019/09/17 02:10:01 code coverage: enabled 2019/09/17 02:10:01 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/09/17 02:10:01 extra coverage: extra coverage is not supported by the kernel 2019/09/17 02:10:01 setuid sandbox: enabled 2019/09/17 02:10:01 namespace sandbox: enabled 2019/09/17 02:10:01 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/17 02:10:01 fault injection: enabled 2019/09/17 02:10:01 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/17 02:10:01 net packet injection: enabled 2019/09/17 02:10:01 net device setup: enabled [ 38.897122] random: crng init done 02:11:49 executing program 5: 02:11:49 executing program 0: 02:11:49 executing program 3: 02:11:49 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x6000000, 0x100000001, 0x6000000, 0x1}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)="11dca5055e62cfe47bf070") setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080), 0x10) 02:11:49 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0xd, 0x0, 0x8) 02:11:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1, 0x0, 0x0, 0x2000000000002) [ 145.882335] audit: type=1400 audit(1568686309.064:37): avc: denied { map } for pid=6853 comm="syz-fuzzer" path="/root/syzkaller-shm728543317" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 145.927246] audit: type=1400 audit(1568686309.084:38): avc: denied { map } for pid=6871 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13690 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 146.073187] IPVS: ftp: loaded support on port[0] = 21 [ 146.871373] IPVS: ftp: loaded support on port[0] = 21 [ 146.885056] chnl_net:caif_netlink_parms(): no params data found [ 146.924500] IPVS: ftp: loaded support on port[0] = 21 [ 146.969148] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.975761] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.982746] device bridge_slave_0 entered promiscuous mode [ 146.999215] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.005639] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.012519] device bridge_slave_1 entered promiscuous mode [ 147.032253] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 147.044540] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 147.052256] chnl_net:caif_netlink_parms(): no params data found [ 147.078163] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 147.085553] team0: Port device team_slave_0 added [ 147.093550] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 147.100790] team0: Port device team_slave_1 added [ 147.108958] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 147.119778] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 147.151498] IPVS: ftp: loaded support on port[0] = 21 [ 147.192383] device hsr_slave_0 entered promiscuous mode [ 147.250273] device hsr_slave_1 entered promiscuous mode [ 147.321406] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 147.328091] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.334708] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.341543] device bridge_slave_0 entered promiscuous mode [ 147.349593] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.356047] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.363235] device bridge_slave_1 entered promiscuous mode [ 147.372385] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 147.424562] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 147.447147] chnl_net:caif_netlink_parms(): no params data found [ 147.456653] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 147.469016] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.475454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.482287] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.488618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.509632] IPVS: ftp: loaded support on port[0] = 21 [ 147.542442] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 147.549500] team0: Port device team_slave_0 added [ 147.555885] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 147.563069] team0: Port device team_slave_1 added [ 147.570880] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 147.601269] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 147.639784] chnl_net:caif_netlink_parms(): no params data found [ 147.655055] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.661637] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.668448] device bridge_slave_0 entered promiscuous mode [ 147.679165] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.685573] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.692464] device bridge_slave_1 entered promiscuous mode [ 147.773130] device hsr_slave_0 entered promiscuous mode [ 147.810365] device hsr_slave_1 entered promiscuous mode [ 147.872581] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 147.888482] IPVS: ftp: loaded support on port[0] = 21 [ 147.894016] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 147.903849] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 147.925724] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.943230] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.972155] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 148.004760] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.014185] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.021061] device bridge_slave_0 entered promiscuous mode [ 148.065104] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.071581] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.078366] device bridge_slave_1 entered promiscuous mode [ 148.086036] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 148.115009] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 148.122250] team0: Port device team_slave_0 added [ 148.128803] 8021q: adding VLAN 0 to HW filter on device bond0 [ 148.139633] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 148.159307] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 148.166449] team0: Port device team_slave_1 added [ 148.171640] chnl_net:caif_netlink_parms(): no params data found [ 148.179856] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 148.187344] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 148.195193] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 148.263764] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 148.274693] chnl_net:caif_netlink_parms(): no params data found [ 148.292134] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 148.299229] team0: Port device team_slave_0 added [ 148.311864] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 148.328417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.336190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.364383] device hsr_slave_0 entered promiscuous mode [ 148.400515] device hsr_slave_1 entered promiscuous mode [ 148.440994] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 148.448022] team0: Port device team_slave_1 added [ 148.453333] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 148.461484] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 148.467536] 8021q: adding VLAN 0 to HW filter on device team0 [ 148.475961] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 148.483492] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 148.490576] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 148.513490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.521422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.528889] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.535241] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.544395] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 148.556966] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 148.602020] device hsr_slave_0 entered promiscuous mode [ 148.660313] device hsr_slave_1 entered promiscuous mode [ 148.741529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.749327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.757022] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.763434] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.773226] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 148.794620] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 148.801790] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.808124] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.815167] device bridge_slave_0 entered promiscuous mode [ 148.822237] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.828565] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.835580] device bridge_slave_1 entered promiscuous mode [ 148.843476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 148.853486] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 148.863197] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.869535] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.876730] device bridge_slave_0 entered promiscuous mode [ 148.883699] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.890573] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.897674] device bridge_slave_1 entered promiscuous mode [ 148.908913] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 148.923247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 148.946740] 8021q: adding VLAN 0 to HW filter on device bond0 [ 148.955572] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 148.963329] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 148.972086] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 148.984691] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 148.993239] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 149.002808] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 149.011568] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 149.029565] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 149.037934] team0: Port device team_slave_0 added [ 149.049690] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 149.056728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 149.064550] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 149.072084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 149.078796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.085684] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 149.094207] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 149.101461] team0: Port device team_slave_1 added [ 149.107083] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 149.119782] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 149.128800] team0: Port device team_slave_0 added [ 149.134704] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 149.142296] team0: Port device team_slave_1 added [ 149.147838] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 149.156342] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 149.164339] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 149.174319] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 149.180477] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.186649] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 149.194574] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 149.202469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.210305] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.218287] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 149.234910] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 149.253374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.261434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.268837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 149.276703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.284280] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.290636] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.298352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 149.352222] device hsr_slave_0 entered promiscuous mode [ 149.390338] device hsr_slave_1 entered promiscuous mode [ 149.431028] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 149.471999] device hsr_slave_0 entered promiscuous mode [ 149.510311] device hsr_slave_1 entered promiscuous mode [ 149.550943] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 149.557802] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 149.569480] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 149.578014] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 149.585028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.594219] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.601713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 149.609313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.616956] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.623336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.631296] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 149.637281] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 149.644869] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 149.654597] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 149.675704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 149.688712] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 149.699265] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 149.709198] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 149.717387] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 149.727633] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 149.744634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 149.753075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 149.761010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 149.768419] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 149.779488] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 149.790851] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 149.799542] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 149.810692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.818208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.828116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.835744] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.854685] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.883703] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 149.892404] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 149.903131] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 149.909362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 149.919360] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.930898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.938298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.947088] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 149.963073] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.974205] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 149.985257] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 149.992917] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 149.999988] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 150.009143] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 150.019459] 8021q: adding VLAN 0 to HW filter on device bond0 [ 150.026314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 150.037286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 150.046464] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 150.052827] 8021q: adding VLAN 0 to HW filter on device team0 [ 150.062200] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 150.070959] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 150.078930] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready 02:11:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1, 0x0, 0x0, 0x0) [ 150.086762] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 150.103619] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 150.109692] 8021q: adding VLAN 0 to HW filter on device team0 [ 150.118929] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 02:11:53 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000940)=0x7b) read$char_usb(r0, &(0x7f00000003c0)=""/100, 0x64) [ 150.131880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 150.138775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 150.146067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 150.153272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 150.166390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 150.176109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 150.187331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 150.195254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 150.203004] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.209329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 150.216768] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 150.225773] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 150.233210] 8021q: adding VLAN 0 to HW filter on device team0 [ 150.241353] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 150.250784] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 150.263024] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 150.269089] 8021q: adding VLAN 0 to HW filter on device team0 [ 150.276449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 02:11:53 executing program 5: write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 150.284283] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 150.292374] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.298759] bridge0: port 1(bridge_slave_0) entered forwarding state [ 150.305845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 150.313691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 150.327356] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.333748] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.343428] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 150.359142] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 150.376361] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 150.381884] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 150.393555] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 150.410661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 150.419780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 150.431989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 150.439677] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.446045] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.457723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 150.465766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 150.478343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 150.486105] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.492480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 150.503976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 150.516397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 150.527495] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.533872] bridge0: port 2(bridge_slave_1) entered forwarding state 02:11:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/if_inet6\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x2, 0x0) 02:11:53 executing program 4: io_setup(0xfffffffffffffff9, &(0x7f0000000140)) [ 150.547196] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 150.572072] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 150.579543] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 02:11:53 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x2a) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r4 = socket(0x10, 0x2, 0x0) sendto(r4, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x5f) recvmmsg(r4, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x36, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1034}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x1de}], 0x8, &(0x7f0000002400)=""/191, 0xfffffffffffffd97}}], 0x4000000000001de, 0x0, &(0x7f0000003700)={0x77359400}) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) [ 150.614118] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 150.628149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 150.648996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 150.664896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 150.673027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 150.684987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 150.692974] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.699352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 150.711960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 150.724270] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 150.732671] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.739042] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.751986] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 150.765383] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 150.773824] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 150.786874] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 150.804636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 150.812200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 150.824419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 150.832495] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 150.844740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 150.852527] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 150.864385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 150.873241] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 150.884927] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 150.893906] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 150.906016] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 150.914801] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 150.931137] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 150.946261] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 150.954213] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 150.966724] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 150.974447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 150.982297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 150.989824] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 150.997322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 151.005001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 151.013753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 151.023380] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 151.038048] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 151.047084] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 151.062094] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 151.070994] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 151.077924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 151.085803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 151.093371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 151.106810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 02:11:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 151.114584] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 151.125812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 151.134208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 151.147724] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 151.156290] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 151.166784] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 151.173047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 151.174723] hrtimer: interrupt took 30378 ns [ 151.180749] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 151.191299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 151.198740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 151.206167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 151.213843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 151.222372] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 151.230508] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 151.242890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 151.252068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 151.259431] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 151.266925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 151.274506] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 151.280260] protocol 88fb is buggy, dev hsr_slave_0 [ 151.286221] protocol 88fb is buggy, dev hsr_slave_1 [ 151.293314] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 151.304241] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 151.311835] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 151.319685] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 151.330520] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 151.336542] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 151.344326] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 151.350410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 151.357240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 151.364993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 151.372529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 151.379842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 151.389711] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 151.400087] protocol 88fb is buggy, dev hsr_slave_0 [ 151.405177] protocol 88fb is buggy, dev hsr_slave_1 [ 151.413465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 151.423348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 151.436745] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 151.444391] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 151.450117] protocol 88fb is buggy, dev hsr_slave_0 [ 151.452588] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 151.456128] protocol 88fb is buggy, dev hsr_slave_1 [ 151.467164] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 151.470929] protocol 88fb is buggy, dev hsr_slave_0 [ 151.470961] protocol 88fb is buggy, dev hsr_slave_1 [ 151.487441] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 151.499766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 151.507574] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 151.517553] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 151.520285] protocol 88fb is buggy, dev hsr_slave_0 [ 151.528662] protocol 88fb is buggy, dev hsr_slave_1 [ 151.529291] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 151.544252] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 151.567796] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 151.585760] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 151.612736] 8021q: adding VLAN 0 to HW filter on device batadv0 02:11:55 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000002c0)={'filter\x00'}, &(0x7f0000000080)=0x24) 02:11:55 executing program 5: 02:11:56 executing program 1: 02:11:56 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x2a) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r4 = socket(0x10, 0x2, 0x0) sendto(r4, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x5f) recvmmsg(r4, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x36, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1034}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x1de}], 0x8, &(0x7f0000002400)=""/191, 0xfffffffffffffd97}}], 0x4000000000001de, 0x0, &(0x7f0000003700)={0x77359400}) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 02:11:56 executing program 3: 02:11:56 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x5, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x33b, 0x0) 02:11:56 executing program 0: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r0+30000000}}, 0x0) dup(0xffffffffffffffff) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r1, &(0x7f0000004b40)=[{{&(0x7f0000000b00)=@rc, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f00000049c0)=[{&(0x7f0000003380)=""/83, 0x53}, {0x0}], 0x2, &(0x7f0000004a40)=""/243, 0xf3}}], 0x2, 0x0, 0x0) 02:11:56 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_ENCAP_DPORT={0x8, 0x10}], @gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r2}]]}}}]}, 0x44}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) 02:11:56 executing program 3: 02:11:56 executing program 3: 02:11:56 executing program 1: 02:11:56 executing program 5: 02:11:56 executing program 3: 02:11:56 executing program 3: 02:11:56 executing program 5: 02:11:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000640)=""/148, 0x94}], 0x100000000000026e, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x174, 0x4000006800) 02:11:57 executing program 0: 02:11:57 executing program 1: 02:11:57 executing program 3: 02:11:57 executing program 5: 02:11:57 executing program 2: r0 = inotify_init() r1 = epoll_create(0x80001) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) 02:11:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 02:11:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:11:57 executing program 1: 02:11:57 executing program 0: 02:11:57 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x6000000, 0x100000001, 0x6000000, 0x1}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)="11dca5055e62cfe47bf070") 02:11:57 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r0, &(0x7f0000000180), 0x0}, 0x18) [ 154.305384] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 154.368228] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 02:11:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000640)=""/148, 0x94}], 0x100000000000026e, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x174, 0x4000006800) 02:11:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) dup2(r0, r1) 02:11:57 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x0, 0x0) 02:11:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000001503000028feffff"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:11:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000180)=0x7397, 0xfdb2) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x110000104e20, @empty}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:11:57 executing program 5: 02:11:57 executing program 1: [ 154.568850] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 02:11:57 executing program 5: 02:11:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000400)={@in={{0x2, 0x0, @empty}}, 0x0, 0x4, 0x0, "0a3f5398a8b66ee170ad160d9341bf768a749a9ccd388eae1128fd6df3aa85a05ca0a75dd2b485183c08094952fcd5104f23c8f05bc61780bfc5ed6379f61ab6fb1cfed2526b503676106ea16ff563a8"}, 0xd8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) [ 154.633704] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 02:11:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write(r0, &(0x7f00000001c0)="ee0107200c9f8fbf5ca312794d57d7c84858f6d02ac7044478a1ceaba80c756a581354e1c3bc0f39ab71266531e5c6b4d607559441a2a1492bc86146e4a205b0b8db310441cf08c043a775bb5e3a82dbc589f50c52e15266c634790cab6745980751ca698dbd91bc", 0x7f37) 02:11:58 executing program 2: 02:11:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000640)=""/148, 0x94}], 0x100000000000026e, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x174, 0x4000006800) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) 02:11:58 executing program 0: 02:11:58 executing program 3: 02:11:58 executing program 5: 02:11:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000640)=""/148, 0x94}], 0x100000000000026e, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x174, 0x4000006800) 02:11:58 executing program 0: 02:11:58 executing program 3: 02:11:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") setresgid(0x0, 0x0, 0xffffffffffffffff) 02:11:58 executing program 5: shmget(0x0, 0x4000, 0x600, &(0x7f0000ffc000/0x4000)=nil) 02:11:58 executing program 0: 02:11:58 executing program 3: 02:11:58 executing program 5: 02:11:58 executing program 1: r0 = memfd_create(&(0x7f0000000200)='eth0\x00', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc8, 0x0, &(0x7f0000000000)) 02:11:58 executing program 2: 02:11:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x54) r1 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0185879, 0x20000000) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x100000000, 0x0, @local}, 0x80, 0x0}, 0x51) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0xfffffec7) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r3 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x40, 0x0, 0xc6, 0x2, 0x2, 0x0, 0x0, 0x0, 0x1ff, 0xffffffff, 0x0, 0x1, 0x6, 0x0, 0xc565, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x7d3e84c, 0x0, 0x3, 0x8, 0x401, 0x5, 0xff, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x2, 0x5}, 0x40, 0x3, 0x1, 0x5, 0x2}, 0x0, 0x0, r3, 0xa) 02:11:58 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000440)=""/28, 0x1c) timer_create(0x0, &(0x7f0000000000)={0x0, 0x200000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() tkill(r4, 0x101000000000013) 02:11:58 executing program 5: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)={0x90, 0x0, 0x0, 0x0, 0x0, {}, [@generic="ab082061c6fc72952f1991f5ba2abd3d9c92022d64416d75c5de024f347a6d9f5cb9e6e2de121b2c5abf0ca63f1d778fac9621331f376585784702b662edbe4e8a15aa17bae81c1555fa812c4ddd49b1f6fbfde64b4f37d018535359eda619141963c60988b0034942e783f2fbf7bf57bdbcf26c18d3d18e93cd"]}, 0x90}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x88d82) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000140)={0x0, 0xffff}) write(r1, &(0x7f0000000000), 0xffffff86) 02:11:58 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0185879, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x100000000, 0x0, @local}, 0x80, 0x0}, 0x51) socket$kcm(0x29, 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0xfffffec7) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b970729, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x0, 0x0, 0xa30, 0x0, 0x0, 0x5, 0x40, 0x0, 0xc6, 0x2, 0x2, 0x0, 0x0, 0x0, 0x1ff, 0xffffffff, 0x8, 0x1, 0x6, 0x0, 0xc565, 0x0, 0x0, 0x1, 0x8, 0x3, 0x0, 0x0, 0x7d3e84c, 0x0, 0x3, 0x8, 0x401, 0x5, 0xff, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x2, 0x5}, 0x40, 0x3, 0x1, 0x5, 0x2}, 0x0, 0x0, r3, 0xa) 02:11:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288eea1993f0265df5cf1cddab550611c674c08ef172743db062950b8631", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@assoc={0x18, 0x117, 0x4, 0x759a}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x750a}, {&(0x7f0000000680)=""/120, 0x78}, {&(0x7f0000000300)=""/230, 0xffffff6f}], 0x3}}], 0x1, 0x0, &(0x7f0000008bc0)) 02:11:58 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000001c0)=0x24) 02:11:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="816b0806384fb52a45213055ce56"], 0xe) close(r1) [ 155.588316] audit: type=1400 audit(1568686318.764:39): avc: denied { map } for pid=7124 comm="syz-executor.1" path=2F6D656D66643A65746830202864656C6574656429 dev="tmpfs" ino=26407 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 02:11:58 executing program 4: msgsnd(0x0, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgsnd(0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/228}, 0xec, 0xe42821a6f81bd540, 0x0) msgrcv(0x0, &(0x7f0000000400)={0x0, ""/203}, 0xcf, 0x2, 0x2000) 02:11:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x54) r1 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0185879, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x100000000, 0x0, @local}, 0x80, 0x0}, 0x0) socket$kcm(0x29, 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0xfffffec7) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b970729, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x0, 0x0, 0xa30, 0x0, 0x0, 0x5, 0x40, 0x0, 0xc6, 0x2, 0x2, 0x0, 0x0, 0x0, 0x1ff, 0xffffffff, 0x8, 0x1, 0x6, 0x0, 0xc565, 0x0, 0x0, 0x1, 0x8, 0x3, 0x0, 0x0, 0x7d3e84c, 0x0, 0x3, 0x8, 0x401, 0x5, 0xff, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x2, 0x5}, 0x40, 0x3, 0x1, 0x5, 0x2}, 0x0, 0x0, r3, 0xa) 02:11:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 155.753695] device nr0 entered promiscuous mode 02:11:58 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r4, &(0x7f0000000400)=[{{0x0, 0x29c, 0x0}}], 0x1, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r4, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:11:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 155.855687] audit: type=1400 audit(1568686319.034:40): avc: denied { name_bind } for pid=7166 comm="syz-executor.4" src=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 155.913037] device nr0 entered promiscuous mode [ 155.939185] audit: type=1400 audit(1568686319.034:41): avc: denied { node_bind } for pid=7166 comm="syz-executor.4" src=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 155.962655] audit: type=1400 audit(1568686319.064:42): avc: denied { name_connect } for pid=7166 comm="syz-executor.4" dest=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 02:11:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x54) r1 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0185879, 0x20000000) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x100000000, 0x0, @local}, 0x80, 0x0}, 0x51) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0xfffffec7) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r3 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x40, 0x0, 0xc6, 0x2, 0x2, 0x0, 0x0, 0x0, 0x1ff, 0xffffffff, 0x0, 0x1, 0x6, 0x0, 0xc565, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x7d3e84c, 0x0, 0x3, 0x8, 0x401, 0x5, 0xff, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x2, 0x5}, 0x40, 0x3, 0x1, 0x5, 0x2}, 0x0, 0x0, r3, 0xa) 02:11:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) 02:11:59 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="816b0806384fb52a45213055ce56"], 0xe) close(r1) 02:11:59 executing program 4: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0xa0, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0x78, 0x2b, [@IFLA_XDP_FD={0x74, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}}]}, @IFLA_GROUP={0x8}]}, 0xa0}}, 0x0) 02:11:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x54) r1 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0185879, 0x20000000) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x100000000, 0x0, @local}, 0x80, 0x0}, 0x51) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0xfffffec7) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r3 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x40, 0x0, 0xc6, 0x2, 0x2, 0x0, 0x0, 0x0, 0x1ff, 0xffffffff, 0x0, 0x1, 0x6, 0x0, 0xc565, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x7d3e84c, 0x0, 0x3, 0x8, 0x401, 0x5, 0xff, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x2, 0x5}, 0x40, 0x3, 0x1, 0x5, 0x2}, 0x0, 0x0, r3, 0xa) 02:11:59 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000007c0)='fd\x00') getdents64(r0, &(0x7f0000000180)=""/92, 0xff72) [ 156.505908] net_ratelimit: 8 callbacks suppressed [ 156.505915] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 156.527159] futex_wake_op: syz-executor.2 tries to shift op by 3904; fix this program 02:11:59 executing program 4: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0xa0, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0x78, 0x2b, [@IFLA_XDP_FD={0x74, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}}]}, @IFLA_GROUP={0x8}]}, 0xa0}}, 0x0) [ 156.576653] device nr0 entered promiscuous mode [ 156.590443] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 02:11:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgrcv(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1, 0x9db5e658824014e6, 0x0) 02:11:59 executing program 3: socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000180)=@file={0x0, './file0/../file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x4924924924922c9, 0x10000000000040) close(r0) ftruncate(0xffffffffffffffff, 0x0) [ 156.651298] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 02:12:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000000)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x875c, 0x0, 0x4c51a1c6}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) openat$capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:12:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xffffffffffffff9f, 0x2, [@TCA_PIE_TUPDATE={0x8}]}}]}, 0x38}}, 0x0) 02:12:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:12:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x54) r1 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0185879, 0x20000000) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x100000000, 0x0, @local}, 0x80, 0x0}, 0x51) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0xfffffec7) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r3 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x40, 0x0, 0xc6, 0x2, 0x2, 0x0, 0x0, 0x0, 0x1ff, 0xffffffff, 0x0, 0x1, 0x6, 0x0, 0xc565, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x7d3e84c, 0x0, 0x3, 0x8, 0x401, 0x5, 0xff, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x2, 0x5}, 0x40, 0x3, 0x1, 0x5, 0x2}, 0x0, 0x0, r3, 0xa) 02:12:01 executing program 1: socket$inet(0x10, 0x2, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") write$selinux_load(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14d) 02:12:01 executing program 3: r0 = memfd_create(&(0x7f0000000200)='eth0\x00', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x9b, 0x0, &(0x7f0000000000)) 02:12:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)='g', 0x524, 0xfffffffffffffffb) [ 158.761286] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 158.778567] SELinux: failed to load policy [ 158.784644] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7227 comm=syz-executor.4 02:12:02 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0xa0, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0x78, 0x2b, [@IFLA_XDP_FD={0x74, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}}]}, @IFLA_GROUP={0x8}]}, 0xa0}}, 0x0) [ 158.809704] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 158.827986] SELinux: failed to load policy 02:12:02 executing program 4: r0 = memfd_create(&(0x7f0000000200)='eth0\x00', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xa6, 0x0, &(0x7f0000000000)) 02:12:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288eea1993f0265df5cf1cddab550611c674c08ef172743db062950b8631", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x750a}, {&(0x7f0000000680)=""/120, 0x78}, {&(0x7f0000000300)=""/230, 0xffffff6f}], 0x3}}], 0x1, 0x0, &(0x7f0000008bc0)) 02:12:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)='g', 0x524, 0xfffffffffffffffb) [ 158.934866] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 02:12:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000002740)="11dca5055e0bcfe47bf070") recvfrom$rose(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shmget(0x0, 0x3000, 0x0, &(0x7f0000ea4000/0x3000)=nil) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 159.029584] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 02:12:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000000)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x875c, 0x0, 0x4c51a1c6}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) openat$capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:12:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)='g', 0x524, 0xfffffffffffffffb) 02:12:03 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x38, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = gettid() clone(0x100000100001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = inotify_init1(0x0) r2 = getpid() fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) kcmp(r3, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) sched_setaffinity(0x0, 0xffffff8b, &(0x7f0000000080)=0x9) ptrace$setopts(0x4206, r0, 0x0, 0x0) mq_notify(0xffffffffffffffff, 0x0) 02:12:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2, 0x11, r0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2) 02:12:03 executing program 4: getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/149, &(0x7f0000000100)=0x95) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgsnd(r0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/228}, 0xec, 0xe42821a6f81bd540, 0x0) 02:12:03 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 02:12:03 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2000000000002) 02:12:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) geteuid() mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000000)={0xa927, 0x129, 0x0, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000280)=0x1, 0x4) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000580)='mode') mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x40000012, r1, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000340)=[@in={0x2, 0x0, @local}, @in6={0xa, 0x4e21, 0x0, @loopback}, @in={0x2, 0x4e22, @multicast1}], 0x3c) [ 159.903690] audit: type=1400 audit(1568686323.084:43): avc: denied { map } for pid=7281 comm="syz-executor.1" path="socket:[27737]" dev="sockfs" ino=27737 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tcp_socket permissive=1 02:12:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)='g', 0x524, 0xfffffffffffffffb) 02:12:03 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="00038aa174036ed7e08f7edd73dd20"], 0xfdef) 02:12:03 executing program 1: socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xfc59) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 02:12:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$alg(0x26, 0x5, 0x0) bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='scalable\x00', 0x9) socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) shutdown(r2, 0x1) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000240)={'vcan0\x00'}) sendto$inet6(r3, &(0x7f00000000c0), 0xffffffeb, 0x0, 0x0, 0x535e2f3003f56a5b) [ 160.111502] audit: type=1400 audit(1568686323.294:44): avc: denied { associate } for pid=7305 comm="syz-executor.4" name="file0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 160.119975] device nr0 entered promiscuous mode [ 160.156308] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 160.269083] device nr0 entered promiscuous mode 02:12:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0xfff) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000080)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0xffffffffffffff00}) 02:12:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4c7]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:12:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) 02:12:03 executing program 2: getitimer(0x2, &(0x7f0000000000)) 02:12:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) geteuid() mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000000)={0xa927, 0x129, 0x0, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000280)=0x1, 0x4) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000580)='mode') mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x40000012, r1, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000340)=[@in={0x2, 0x0, @local}, @in6={0xa, 0x4e21, 0x0, @loopback}, @in={0x2, 0x4e22, @multicast1}], 0x3c) 02:12:03 executing program 2: close(0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000002740)="11dca5055e0bcfe47bf070") ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f00000000c0)={'bcsh0\x00', {0x2, 0x0, @broadcast}}) 02:12:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) [ 160.566040] kvm [7333]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000006 02:12:03 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=unix,'}) 02:12:03 executing program 4: r0 = memfd_create(&(0x7f0000000200)='eth0\x00', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc6, 0x0, &(0x7f0000000000)) [ 160.608009] kvm [7333]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000008 [ 160.638280] kvm [7333]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000a 02:12:03 executing program 1: r0 = memfd_create(&(0x7f0000000200)='eth0\x00', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xec, 0x0, &(0x7f0000000000)) 02:12:03 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) dup2(r0, r1) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) fchown(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) [ 160.672511] 9pnet: p9_fd_create_unix (7354): problem connecting socket: ./file0/file0: -20 [ 160.691666] kvm [7333]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000c [ 160.699702] kvm [7333]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000e [ 160.716487] kvm [7333]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000012 [ 160.725452] 9pnet: p9_fd_create_unix (7354): problem connecting socket: ./file0/file0: -20 [ 160.754737] kvm [7333]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000014 [ 160.782306] kvm [7333]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000016 [ 160.802438] kvm [7333]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000018 [ 160.814830] kvm [7333]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000001a [ 160.824684] kvm [7333]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000020 data 0x2f3d67 [ 160.840363] kvm [7333]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000022 data 0x89173701 [ 160.905886] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:04 executing program 5: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000200), 0x87) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000080)='.', 0x0, 0x5010, 0x0) 02:12:04 executing program 1: r0 = socket(0xa, 0x3, 0x1) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r0, 0x0, 0x156}]) 02:12:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4c7]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:12:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x8}) 02:12:04 executing program 0: setpgid(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) dup2(r0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0xc32f, &(0x7f0000000440)=0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x200000002, 0x70, 0x200e3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, &(0x7f0000000140)={0xce, 0x0, 0x7, 0x800, 0x2a, 0x0, 0x42fadb0580c2a26c}) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r3, 0x0) ftruncate(r1, 0x48280) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x10001, r1, &(0x7f0000000800)="371d848c24591792863b2d5d6bc3c76a00000100f050000079e6ae1a07de1d42fd46fdfada485aaea1cda588838353786b2ff4f7b644e0839054fcd3486dfe9795b35eae35042b0ae441065b6570a16e9f59424cf705c5958d33fbfcec4080876e65ccb6cc4a9a8e6a0f46559eb725fdab41865ab93895a77a3e494f920e9617dc006dcbe35e9ff7112f2a58bbd9f7123b6661186821900b092f90a53e27d726e56671cc23bf1472b65c3131051de54ab9b1fe6b7b515163790da97ebdaf688dc5b30aed84cbb5c86c3c0a64548106e6a4bfd61442897160333d8ad0b914906fb8839422a3", 0x2c84e1972a71ed36}]) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, 0xffffffffffffffff, 0x0}]) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r4, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) 02:12:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$alg(0x26, 0x5, 0x0) bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='scalable\x00', 0x9) socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) shutdown(r2, 0x1) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000240)={'vcan0\x00'}) sendto$inet6(r3, &(0x7f00000000c0), 0xffffffeb, 0x0, 0x0, 0x535e2f3003f56a5b) 02:12:04 executing program 5: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000200), 0x87) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000080)='.', 0x0, 0x5010, 0x0) [ 161.076345] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:04 executing program 1: setpgid(0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0xc32f, &(0x7f0000000440)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x200000002, 0x70, 0x200e3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, &(0x7f0000000140)={0xce, 0x0, 0x7, 0x800, 0x2a, 0x0, 0x42fadb0580c2a26c}) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000800)="371d848c24591792863b2d5d6bc3c76a00000100f050000079e6ae1a07de1d42fd46fdfada485aaea1cda588838353786b2ff4f7b644e0839054fcd3486dfe9795b35eae35042b0ae441065b6570a16e9f59424cf705c5958d33fbfcec4080876e65ccb6cc4a9a8e6a0f46559eb725fdab41865ab93895a77a3e494f920e9617dc006dcbe35e9ff7112f2a58bbd9f7123b6661186821900b092f90a53e27d726e56671cc23bf1472b65c3131051de54ab9b1fe6b7b515163790da97ebdaf688dc5b30aed84cbb5c86c3c0a64548106e6a4bfd61442897160333d8ad0b914906fb8839422a3", 0x2c84e1972a71ed36}]) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="15323030302e4c"], 0x15) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) [ 161.115055] audit: type=1804 audit(1568686324.294:45): pid=7389 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir627708940/syzkaller.pqdrYl/16/bus" dev="sda1" ino=16624 res=1 02:12:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x8}) [ 161.191432] kvm [7383]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000020 data 0x141308 02:12:04 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002940)={&(0x7f0000001640)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f00000027c0)=[{0x0}, {&(0x7f0000000100)=""/55, 0x37}, {&(0x7f0000002700)=""/136, 0x88}], 0x3}, 0x10140) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000001780)={0x7, 0x70, 0xffffffffffff7fff, 0x0, 0x8, 0x0, 0x0, 0x9, 0x4000, 0x6, 0x0, 0x9, 0xa0, 0x7, 0x100, 0x4, 0x0, 0x0, 0x1, 0x9, 0x8, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x9, 0x200, 0xc, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3ff, 0x2, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x6, 0x3, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)={[{0x2b, 'pids'}]}, 0x6) openat$cgroup_ro(r1, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) [ 161.255321] kvm [7383]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000022 data 0x89173701 [ 161.294836] audit: type=1804 audit(1568686324.474:46): pid=7405 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir119714078/syzkaller.7Wjxyo/22/bus" dev="sda1" ino=16610 res=1 02:12:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288eea1993f0265df5cf1cddab550611c674c08ef172743db062950b8631", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000000300)=""/230, 0xe6}], 0x2}}], 0x1, 0x0, &(0x7f0000008bc0)) [ 161.348122] audit: type=1804 audit(1568686324.524:47): pid=7396 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir627708940/syzkaller.pqdrYl/16/bus" dev="sda1" ino=16624 res=1 02:12:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x8}) 02:12:04 executing program 0: setpgid(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) dup2(r0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0xc32f, &(0x7f0000000440)=0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x200000002, 0x70, 0x200e3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, &(0x7f0000000140)={0xce, 0x0, 0x7, 0x800, 0x2a, 0x0, 0x42fadb0580c2a26c}) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r3, 0x0) ftruncate(r1, 0x48280) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x10001, r1, &(0x7f0000000800)="371d848c24591792863b2d5d6bc3c76a00000100f050000079e6ae1a07de1d42fd46fdfada485aaea1cda588838353786b2ff4f7b644e0839054fcd3486dfe9795b35eae35042b0ae441065b6570a16e9f59424cf705c5958d33fbfcec4080876e65ccb6cc4a9a8e6a0f46559eb725fdab41865ab93895a77a3e494f920e9617dc006dcbe35e9ff7112f2a58bbd9f7123b6661186821900b092f90a53e27d726e56671cc23bf1472b65c3131051de54ab9b1fe6b7b515163790da97ebdaf688dc5b30aed84cbb5c86c3c0a64548106e6a4bfd61442897160333d8ad0b914906fb8839422a3", 0x2c84e1972a71ed36}]) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, 0xffffffffffffffff, 0x0}]) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r4, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) 02:12:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @ioapic={0x2c337d8206bec983, 0x0, 0xe03, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {0x6}, {}, {}, {}, {0x0, 0x150}]}}) [ 161.479792] audit: type=1804 audit(1568686324.624:48): pid=7405 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir119714078/syzkaller.7Wjxyo/22/bus" dev="sda1" ino=16610 res=1 [ 161.663196] audit: type=1804 audit(1568686324.794:49): pid=7419 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir627708940/syzkaller.pqdrYl/17/bus" dev="sda1" ino=16598 res=1 02:12:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4c7]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:12:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x8}) 02:12:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="fc0000001d000102000000000000000084000500fe8000000000000000000000000000aa000004d2000000000a000000dfe44b8f5a2dddfa48b327b5860082400635000007000000010000000500000000000000ac1414bb000000000000000000000000000004d63c0000000a000000ff0100000000000000000000000000010335000000000100010000000010000007000000240017000200000027bd700025bd700027bd70002dbd7000090000000500000002000000240009000200000000000000560f0000000000002c8900000000000078000000000000000c001c00", @ANYRES32=0x0, @ANYBLOB="0000000008001600070000000c00100001000000001b1aacaf0c3cc54839a5ee2579ae93e9b2bfeb5d3e439ddced85ace79b7733d7c15113d0ca48fe45da3b1a0cd34efd627b716a1046bd25e502dc05cc934b7bee49990c2c6c741d38763ce230dcb18efce1e5112725a92827f39c4b6e8135f08ffa4e3cacb731083bb7160bee8b6e25c2e6ab9f362e18701b58f714a01510be520508b5979b2f8589f6ce6ab699ffd5e1880ae4b30e0cce616f92e465587d96bd60ca88b09cef68e30d127734e2f3c86e6fc9a1819203df78c4283588df69e55ed9c83824229e4b06682b2124bd"], 0xfc}}, 0x0) [ 161.865443] kvm [7438]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000020 data 0x8b390 [ 161.875268] kvm [7438]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000022 data 0x89173701 02:12:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$alg(0x26, 0x5, 0x0) bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='scalable\x00', 0x9) socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) shutdown(r2, 0x1) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000240)={'vcan0\x00'}) sendto$inet6(r3, &(0x7f00000000c0), 0xffffffeb, 0x0, 0x0, 0x535e2f3003f56a5b) 02:12:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = gettid() tkill(r0, 0x16) migrate_pages(r0, 0x5, 0x0, 0x0) 02:12:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x58, r3, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, '\nip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x58}}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 02:12:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x875c, 0x0, 0x4c51a1c6, 0x0, 0x408776f6}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xfffffffffffffffe], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:12:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x8}) [ 161.977106] audit: type=1400 audit(1568686325.154:50): avc: denied { create } for pid=7445 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 161.980240] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 162.059095] IPVS: persistence engine module ip_vs_pe_ [ 162.059095] ip not found 02:12:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x8}) [ 162.090808] audit: type=1400 audit(1568686325.194:51): avc: denied { write } for pid=7445 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 162.121835] IPVS: persistence engine module ip_vs_pe_ [ 162.121835] ip not found 02:12:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x8}) 02:12:05 executing program 5: r0 = socket$kcm(0x10, 0x80000000000002, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000002d0081cf14078becdb4cb904014865160f000100ffffffff000009000e0015001500cd5e7c8f76d153b4", 0x2e}], 0x1}, 0x0) [ 162.187050] audit: type=1400 audit(1568686325.194:52): avc: denied { read } for pid=7445 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 02:12:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4c7]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 162.273395] kasan: CONFIG_KASAN_INLINE enabled 02:12:05 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x8}) [ 162.298654] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 162.338478] kvm [7471]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000020 data 0x7f9ba [ 162.348810] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 162.355055] Modules linked in: [ 162.358245] CPU: 1 PID: 7449 Comm: syz-executor.3 Not tainted 4.14.144 #0 [ 162.365162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.367760] kobject: 'loop5' (ffff8880a4abca60): kobject_uevent_env [ 162.374523] task: ffff88807f086200 task.stack: ffff88805fe58000 [ 162.374535] RIP: 0010:tcp_push+0xe9/0x610 [ 162.374542] RSP: 0018:ffff88805fe5fa48 EFLAGS: 00010202 [ 162.396886] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000ac6c000 [ 162.398238] kobject: 'loop5' (ffff8880a4abca60): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 162.404143] RDX: 0000000000000007 RSI: ffffffff85231b30 RDI: 0000000000000038 [ 162.404149] RBP: ffff88805fe5fa98 R08: ffff888059fd699c R09: ffff88807f086aa0 [ 162.404154] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888059fd6100 [ 162.404159] R13: 0000000000000000 R14: ffff888059fd6994 R15: 0000000000000000 [ 162.404165] FS: 00007f686a3db700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 162.404170] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.404175] CR2: 0000001b31720000 CR3: 0000000080539000 CR4: 00000000001426e0 [ 162.404183] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 162.471246] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 162.478512] Call Trace: [ 162.481100] tcp_sendmsg_locked+0x2307/0x3200 [ 162.485597] ? tcp_sendpage+0x60/0x60 [ 162.489398] ? trace_hardirqs_on_caller+0x400/0x590 [ 162.494406] ? trace_hardirqs_on+0xd/0x10 [ 162.498549] tcp_sendmsg+0x30/0x50 [ 162.502082] inet_sendmsg+0x122/0x500 [ 162.505874] ? inet_recvmsg+0x500/0x500 [ 162.510278] sock_sendmsg+0xce/0x110 [ 162.513987] SYSC_sendto+0x206/0x310 [ 162.517708] ? SYSC_connect+0x2d0/0x2d0 [ 162.521682] ? kasan_check_read+0x11/0x20 [ 162.525826] ? _copy_to_user+0x87/0xd0 [ 162.529706] ? put_timespec64+0xb4/0x100 [ 162.533782] ? nsecs_to_jiffies+0x30/0x30 [ 162.537925] ? SyS_clock_gettime+0xf8/0x180 [ 162.542239] SyS_sendto+0x40/0x50 [ 162.545685] ? SyS_getpeername+0x30/0x30 [ 162.549742] do_syscall_64+0x1e8/0x640 [ 162.553622] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 162.558461] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 162.563644] RIP: 0033:0x4598e9 [ 162.566825] RSP: 002b:00007f686a3dac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 162.574524] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004598e9 [ 162.581791] RDX: 00000000ffffffeb RSI: 00000000200000c0 RDI: 0000000000000008 [ 162.589054] RBP: 000000000075bf20 R08: 0000000000000000 R09: 535e2f3003f56a5b 02:12:05 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$cont(0x4, r1, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000440)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f0000000240)=0x78) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) r5 = add_key(&(0x7f00000000c0)='trusted\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000180)="9e6a9f3ad2c5594cf9bb8211fd84bd926a11b6326c4a99662cad5ee9605ae19174bf3c8586759303441361528cea4994c909436866ae2f5db870600645b7c21d129e34d851b8c32cfa6c73774291e041e8886003a02edb72c60d9297a6839283962f893e", 0x64, 0xfffffffffffffff8) keyctl$unlink(0x9, r4, r5) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cachefiles\x00', 0x400000, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r8, 0x2403, 0x9987) [ 162.596316] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f686a3db6d4 [ 162.603579] R13: 00000000004c7880 R14: 00000000004dd188 R15: 00000000ffffffff [ 162.610845] Code: 00 4d 8d 84 24 9c 08 00 00 4c 89 45 b8 e8 c0 c7 39 fc 48 8d 7b 38 4c 8b 45 b8 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 06 0f 8e 1e 04 00 00 48 b8 00 00 00 00 00 [ 162.630049] RIP: tcp_push+0xe9/0x610 RSP: ffff88805fe5fa48 02:12:05 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x8}) [ 162.649777] kobject: 'loop4' (ffff8880a4a64160): kobject_uevent_env [ 162.658884] kobject: 'loop4' (ffff8880a4a64160): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 162.661873] ---[ end trace 892cd404d179102c ]--- [ 162.675965] Kernel panic - not syncing: Fatal exception [ 162.682634] Kernel Offset: disabled [ 162.686253] Rebooting in 86400 seconds..