Warning: Permanently added '10.128.0.216' (ECDSA) to the list of known hosts. 2019/02/22 20:57:37 fuzzer started [ 51.455546] audit: type=1400 audit(1550869057.356:36): avc: denied { map } for pid=7851 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/02/22 20:57:40 dialing manager at 10.128.0.26:43663 2019/02/22 20:57:40 syscalls: 1 2019/02/22 20:57:40 code coverage: enabled 2019/02/22 20:57:40 comparison tracing: enabled 2019/02/22 20:57:40 extra coverage: extra coverage is not supported by the kernel 2019/02/22 20:57:40 setuid sandbox: enabled 2019/02/22 20:57:40 namespace sandbox: enabled 2019/02/22 20:57:40 Android sandbox: /sys/fs/selinux/policy does not exist 2019/02/22 20:57:40 fault injection: enabled 2019/02/22 20:57:40 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/02/22 20:57:40 net packet injection: enabled 2019/02/22 20:57:40 net device setup: enabled 21:00:37 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) [ 231.417159] audit: type=1400 audit(1550869237.316:37): avc: denied { map } for pid=7865 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15489 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 231.537339] IPVS: ftp: loaded support on port[0] = 21 21:00:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000019c0)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x21) [ 231.640942] chnl_net:caif_netlink_parms(): no params data found [ 231.715831] IPVS: ftp: loaded support on port[0] = 21 [ 231.735261] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.742120] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.750196] device bridge_slave_0 entered promiscuous mode [ 231.775073] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.781445] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.789019] device bridge_slave_1 entered promiscuous mode 21:00:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) write$P9_RXATTRCREATE(r1, &(0x7f00000000c0)={0x7}, 0xfe3e) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x3, 0xd028, 0x8) [ 231.861182] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 231.872047] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 231.894986] team0: Port device team_slave_0 added [ 231.901657] team0: Port device team_slave_1 added [ 231.923457] chnl_net:caif_netlink_parms(): no params data found [ 232.025628] device hsr_slave_0 entered promiscuous mode 21:00:38 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$read(0xb, 0xfffffffffffffffd, &(0x7f0000000000)=""/4, 0xfffffffffffffd5c) [ 232.093389] device hsr_slave_1 entered promiscuous mode [ 232.182556] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.205217] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.218299] device bridge_slave_0 entered promiscuous mode [ 232.229101] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.231573] IPVS: ftp: loaded support on port[0] = 21 [ 232.235631] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.247892] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.254276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.275741] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.279387] IPVS: ftp: loaded support on port[0] = 21 [ 232.282106] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.297101] device bridge_slave_1 entered promiscuous mode 21:00:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mkdir(&(0x7f0000000300)='./control\x00', 0x0) r0 = open(&(0x7f0000000600)='./control\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000000)='./control\x00', 0x0, 0x0) faccessat(r0, &(0x7f00000000c0)='./control\x00', 0x0, 0x0) [ 232.349466] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 232.384565] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 232.439498] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.492196] team0: Port device team_slave_0 added [ 232.514711] team0: Port device team_slave_1 added [ 232.523509] chnl_net:caif_netlink_parms(): no params data found [ 232.531165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.556098] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.592599] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.600460] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 232.619650] 8021q: adding VLAN 0 to HW filter on device team0 [ 232.640655] IPVS: ftp: loaded support on port[0] = 21 21:00:38 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={'syz', 0x1}) unshare(0x40000000) socketpair(0xa, 0x0, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000100)=""/245, &(0x7f0000000200)=0xf5) semget$private(0x0, 0x1, 0x420) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000000)=""/149) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000280)) [ 232.713210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.721519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.732327] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.738737] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.751127] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.759197] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.769930] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.776309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.854886] device hsr_slave_0 entered promiscuous mode [ 232.893366] device hsr_slave_1 entered promiscuous mode [ 232.943594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.952666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.972368] chnl_net:caif_netlink_parms(): no params data found [ 232.981315] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.987719] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.994890] device bridge_slave_0 entered promiscuous mode [ 233.002874] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.009305] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.016251] device bridge_slave_1 entered promiscuous mode [ 233.042487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 233.051564] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 233.059274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 233.066956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.074539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 233.081933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.089531] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 233.101341] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 233.126345] IPVS: ftp: loaded support on port[0] = 21 [ 233.136463] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 233.155442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 233.162900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.180164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 233.216134] team0: Port device team_slave_0 added [ 233.222954] team0: Port device team_slave_1 added [ 233.296266] device hsr_slave_0 entered promiscuous mode [ 233.333467] device hsr_slave_1 entered promiscuous mode [ 233.395569] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.401936] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.409204] device bridge_slave_0 entered promiscuous mode [ 233.422837] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 233.439202] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.445692] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.452805] device bridge_slave_1 entered promiscuous mode [ 233.474017] audit: type=1400 audit(1550869239.376:38): avc: denied { associate } for pid=7866 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 233.525116] chnl_net:caif_netlink_parms(): no params data found [ 233.538911] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 233.547971] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 233.603077] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.609447] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.616117] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.622895] bridge0: port 1(bridge_slave_0) entered forwarding state 21:00:39 executing program 0: 21:00:39 executing program 0: [ 233.649099] team0: Port device team_slave_0 added [ 233.661808] team0: Port device team_slave_1 added 21:00:39 executing program 0: 21:00:39 executing program 0: [ 233.715656] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.738013] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.748497] bridge0: port 2(bridge_slave_1) entered disabled state 21:00:39 executing program 0: [ 233.775069] 8021q: adding VLAN 0 to HW filter on device team0 21:00:39 executing program 0: [ 233.819349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.831289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 21:00:39 executing program 0: [ 233.871197] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.888970] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.897783] device bridge_slave_0 entered promiscuous mode [ 233.922443] chnl_net:caif_netlink_parms(): no params data found [ 233.930936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.943341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.950941] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.957326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.964453] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.972323] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.979968] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.986311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.993123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.000807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.008578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.016248] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.034059] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.040411] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.048229] device bridge_slave_1 entered promiscuous mode [ 234.085516] device hsr_slave_0 entered promiscuous mode [ 234.133507] device hsr_slave_1 entered promiscuous mode [ 234.196744] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.204768] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 234.211643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.219719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.227334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.235311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.242858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.250501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.258646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 234.292526] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 234.315519] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 234.343939] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.354323] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.360661] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.371324] device bridge_slave_0 entered promiscuous mode [ 234.378686] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.385204] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.392013] device bridge_slave_1 entered promiscuous mode [ 234.421252] team0: Port device team_slave_0 added [ 234.427798] team0: Port device team_slave_1 added [ 234.435918] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 234.447584] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.505759] device hsr_slave_0 entered promiscuous mode [ 234.523704] device hsr_slave_1 entered promiscuous mode [ 234.565173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.572355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.580671] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 234.589857] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 234.618669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.628150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.636260] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.642597] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.654478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.662182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.670289] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.676674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.689913] team0: Port device team_slave_0 added [ 234.714447] team0: Port device team_slave_1 added [ 234.728389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.737128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.745547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.753325] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.761317] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 21:00:40 executing program 0: [ 234.786827] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.819398] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.836469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.852869] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.861093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.872668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.935208] device hsr_slave_0 entered promiscuous mode [ 234.983388] device hsr_slave_1 entered promiscuous mode [ 235.064778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.072258] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.079915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.087726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.095582] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.101963] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.108858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.116759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.124638] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.130965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.137855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 235.145711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.166174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.174286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.181914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.190055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.197956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.206071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.214980] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.222550] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.240839] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 235.251227] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 235.266794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.274854] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.282364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.290169] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.298613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 235.311190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 235.350794] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 235.366861] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 235.390771] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.432981] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.449215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.460905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 21:00:41 executing program 2: 21:00:41 executing program 1: [ 235.483965] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.494971] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.509108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.522504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.550205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.566441] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.582833] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.589270] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.603926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.628352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.648017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.656507] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.662865] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.670378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.678396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.686043] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.692524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.699454] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.728372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 235.737010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.745105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.752679] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.760347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.768496] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.776140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.783971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.791688] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.799312] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.805690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.812592] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.820365] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.831744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 235.852521] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 235.862162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.884867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.892749] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.902309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.911480] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.925722] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 235.935763] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 235.954193] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.961324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.974649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.984244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.995689] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 236.001888] IPVS: ftp: loaded support on port[0] = 21 [ 236.003464] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 236.059658] IPVS: ftp: loaded support on port[0] = 21 [ 236.061378] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 236.155205] audit: type=1326 audit(1550869242.056:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7931 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 [ 236.950929] audit: type=1326 audit(1550869242.846:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7931 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 21:00:42 executing program 4: 21:00:43 executing program 3: 21:00:43 executing program 0: 21:00:43 executing program 1: 21:00:43 executing program 2: 21:00:43 executing program 4: 21:00:43 executing program 5: 21:00:43 executing program 1: 21:00:43 executing program 4: 21:00:43 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:43 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r1, r1) 21:00:43 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) 21:00:43 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000040)={0xbcff, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 21:00:43 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00') 21:00:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000000), 0x4) 21:00:43 executing program 4: clock_settime(0x402, 0x0) 21:00:43 executing program 5: semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1800}], 0x1) 21:00:43 executing program 0: add_key$user(&(0x7f0000000880)='user\x00', &(0x7f00000008c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) 21:00:43 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:43 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$apparmor_current(r1, &(0x7f0000001100)=ANY=[@ANYBLOB], 0x1) read$FUSE(r0, &(0x7f00000011c0), 0x1000) 21:00:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x800000006, 0x0, 0x0, 0xfffffffffffffffe}]}) clock_gettime(0x0, &(0x7f0000005c00)) 21:00:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x0, 0x0, 0x0, 0x0, 0x0) getpeername(r0, 0x0, &(0x7f0000000280)) 21:00:43 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x0, 0x0, 0x0, 0x0, 0x0) syncfs(r0) 21:00:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x800000006, 0x0, 0x0, 0xfffffffffffffffe}]}) munlockall() [ 237.647608] audit: type=1326 audit(1550869243.546:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7990 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 21:00:43 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:43 executing program 4: clone(0x0, 0x0, 0x0, 0x0, 0x0) clock_settime(0x0, 0x0) [ 237.782291] audit: type=1326 audit(1550869243.616:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7999 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 21:00:43 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:43 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) 21:00:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r1) 21:00:43 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) [ 238.433583] audit: type=1326 audit(1550869244.326:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7990 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 21:00:44 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) geteuid() 21:00:44 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:44 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$describe(0x6, r0, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) [ 238.520888] audit: type=1326 audit(1550869244.416:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7999 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 21:00:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x800000006, 0x0, 0x0, 0xfffffffffffffffe}]}) shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x3000)=nil, 0x0) 21:00:44 executing program 3: munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 21:00:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:44 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f0000000280)) 21:00:44 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:44 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000ac0)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f0000004780)='ns/uts\x00') [ 238.695557] audit: type=1326 audit(1550869244.586:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8064 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 21:00:44 executing program 4: syz_genetlink_get_family_id$ipvs(0x0) clone(0x210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000600)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0}, 0x48) 21:00:44 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) [ 238.807668] audit: type=1400 audit(1550869244.696:46): avc: denied { create } for pid=8076 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 21:00:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:44 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0x10000007c) creat(&(0x7f0000000140)='./file1\x00', 0x8) clone(0x2000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) [ 238.902272] audit: type=1400 audit(1550869244.696:47): avc: denied { write } for pid=8076 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 238.982323] audit: type=1400 audit(1550869244.756:48): avc: denied { prog_load } for pid=8076 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 239.056942] audit: type=1400 audit(1550869244.756:49): avc: denied { read } for pid=8076 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 21:00:45 executing program 5: clone(0x2122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='status\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x5) 21:00:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0}, 0x48) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) 21:00:45 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:45 executing program 4: syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)={0x4}) 21:00:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:45 executing program 5: clone(0x2122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='status\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x5) 21:00:45 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:45 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\xff', 0x200000000000017e, 0x0) write$cgroup_type(r0, 0x0, 0x0) 21:00:45 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:48 executing program 3: r0 = creat(&(0x7f0000000000)='./file1\x00', 0x8) close(r0) syz_execute_func(&(0x7f0000000100)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e003e0f1110c442019dcc400f6afed3196f") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) write$P9_RMKNOD(r2, 0x0, 0x0) 21:00:48 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:48 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\xff', 0x200000000000017e, 0x0) write$cgroup_type(r0, 0x0, 0x0) 21:00:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:48 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000380)=0x404100000001, 0xfe3f) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132441) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', 0x0, 0x11000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) 21:00:48 executing program 4: clone(0x84007bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x200000000000001, 0x0) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, 0x0, 0x0) ptrace(0x11, r0) 21:00:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:48 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:48 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x130) link(0x0, &(0x7f00000000c0)='./file0\x00') getpeername(r0, &(0x7f0000000100)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) fadvise64(r0, 0x0, 0xffffffffffffffff, 0x5) setxattr$security_ima(0x0, &(0x7f0000001680)='security.ima\x00', &(0x7f00000016c0)=@ng={0x4, 0x0, "714a93598120c8"}, 0x9, 0x1) clock_gettime(0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)='trusted.overlay.origin\x00', &(0x7f0000001a80)='y\x00', 0x2, 0x0) getegid() fcntl$getflags(r0, 0x0) dup(r0) setxattr$trusted_overlay_redirect(&(0x7f0000001e00)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2) 21:00:48 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = gettid() ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) add_key$user(0x0, &(0x7f00000006c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_keyring_id(0x0, 0x0, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000000)={0x12, 0x7, 0x1, {{0x5, 'none\x00'}, 0x12}}, 0x12) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@multicast1, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000400)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) tkill(r1, 0x1000000000016) 21:00:48 executing program 4: clone(0x84007bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x200000000000001, 0x0) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, 0x0, 0x0) ptrace(0x11, r0) 21:00:48 executing program 0: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r3 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000000)={0xfffffffffffffffd, 0x7, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000040)={0x117, 0x0, 0x0, 0x0, 0x0, 0x80000000}) 21:00:48 executing program 2: socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:48 executing program 2: socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:49 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000380)=0x404100000001, 0xfe3f) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132441) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', 0x0, 0x11000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) 21:00:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:49 executing program 4: clone(0x84007bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x200000000000001, 0x0) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, 0x0, 0x0) ptrace(0x11, r0) 21:00:49 executing program 0: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r3 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000000)={0xfffffffffffffffd, 0x7, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000040)={0x117, 0x0, 0x0, 0x0, 0x0, 0x80000000}) 21:00:49 executing program 2: socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:49 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:51 executing program 4: clone(0x84007bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x200000000000001, 0x0) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, 0x0, 0x0) ptrace(0x11, r0) 21:00:51 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:51 executing program 0: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r3 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000000)={0xfffffffffffffffd, 0x7, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000040)={0x117, 0x0, 0x0, 0x0, 0x0, 0x80000000}) 21:00:51 executing program 3: 21:00:51 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:51 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000380)=0x404100000001, 0xfe3f) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132441) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', 0x0, 0x11000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) 21:00:51 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:51 executing program 3: 21:00:51 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:51 executing program 0: 21:00:51 executing program 4: clone(0x84007bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x200000000000001, 0x0) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ptrace(0x11, r0) 21:00:51 executing program 3: 21:00:51 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:51 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:51 executing program 0: 21:00:52 executing program 3: 21:00:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:52 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:52 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000380)=0x404100000001, 0xfe3f) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132441) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', 0x0, 0x11000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) 21:00:52 executing program 0: syz_execute_func(&(0x7f00000000c0)="3666440f50f564ff0941c344ee9dc01497f142f542b0596e0266420fe2e33edb11aa61d014f241d1e7d3196f") r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)}, 0x4000001) 21:00:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) keyctl$setperm(0x5, 0x0, 0x3e4e8f22331a81bd) 21:00:52 executing program 3: clone(0x84007bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x200000000000001, 0x0) syz_execute_func(&(0x7f0000000140)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dcc2f193e66430f3a0ce397") r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, 0x0, 0x0) ptrace(0x11, r0) 21:00:52 executing program 4: clone(0x84007bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x200000000000001, 0x0) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ptrace(0x11, r0) 21:00:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x1000002102001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd139c443c10db80b000000af") connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:00:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x0) 21:00:52 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) tkill(r2, 0x1000000000016) 21:00:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000180)) 21:00:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x0) 21:00:52 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:52 executing program 4: clone(0x84007bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x200000000000001, 0x0) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ptrace(0x11, r0) 21:00:52 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) dup2(r0, r1) 21:00:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x0) 21:00:52 executing program 3: clone(0x0, 0x0, 0x0, 0x0, 0x0) semget(0xffffffffffffffff, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, 0x0) msgget(0xffffffffffffffff, 0x0) 21:00:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) [ 247.143279] protocol 88fb is buggy, dev hsr_slave_0 [ 247.148529] protocol 88fb is buggy, dev hsr_slave_1 21:00:53 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x571fee3c) unlink(&(0x7f00000000c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='s']) creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 21:00:53 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 21:00:53 executing program 4: clone(0x84007bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x200000000000001, 0x0) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) ptrace(0x11, r0) 21:00:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f0000000080)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "3b71e7", 0x8, 0x0, 0x0, @remote, @remote, {[], @icmpv6=@echo_request}}}}}, 0x0) 21:00:53 executing program 5: socket$inet(0x2, 0x4000000000000001, 0x0) io_setup(0x9, &(0x7f0000000340)=0x0) io_submit(r0, 0x1, &(0x7f0000000680)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 21:00:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) getgroups(0x0, 0x0) 21:00:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$unix(0x1, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) unshare(0x400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000100)) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000040)) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x180, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) 21:00:53 executing program 2: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x10, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:00:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) [ 247.602705] hrtimer: interrupt took 30413 ns [ 247.636790] kauditd_printk_skb: 1 callbacks suppressed [ 247.636803] audit: type=1400 audit(1550869253.526:51): avc: denied { map_create } for pid=8408 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 21:00:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) [ 248.186025] protocol 88fb is buggy, dev hsr_slave_0 [ 248.191125] protocol 88fb is buggy, dev hsr_slave_1 [ 248.195123] protocol 88fb is buggy, dev hsr_slave_0 [ 248.196232] protocol 88fb is buggy, dev hsr_slave_0 [ 248.201210] protocol 88fb is buggy, dev hsr_slave_1 [ 248.206208] protocol 88fb is buggy, dev hsr_slave_1 21:00:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x2, 0x0) fcntl$setstatus(r2, 0x4, 0x2002) fcntl$setstatus(r2, 0x4, 0x63fa) write$P9_RWSTAT(r1, 0x0, 0x0) 21:00:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$unix(0x1, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) unshare(0x400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000100)) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000040)) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x180, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) 21:00:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:54 executing program 2: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x10, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:00:54 executing program 4: clone(0x84007bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x200000000000001, 0x0) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) ptrace(0x11, r0) 21:00:54 executing program 3: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x10, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:00:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:54 executing program 2: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x10, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:00:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x2, 0x0) fcntl$setstatus(r2, 0x4, 0x2002) fcntl$setstatus(r2, 0x4, 0x63fa) write$P9_RWSTAT(r1, 0x0, 0x0) 21:00:54 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x80044dff, &(0x7f0000000200)) [ 248.903115] protocol 88fb is buggy, dev hsr_slave_0 [ 248.908254] protocol 88fb is buggy, dev hsr_slave_1 21:00:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$unix(0x1, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) unshare(0x400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000100)) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000040)) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x180, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) 21:00:55 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x80044dff, &(0x7f0000000200)) 21:00:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:55 executing program 4: clone(0x84007bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x200000000000001, 0x0) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) ptrace(0x11, r0) 21:00:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x2, 0x0) fcntl$setstatus(r2, 0x4, 0x2002) fcntl$setstatus(r2, 0x4, 0x63fa) write$P9_RWSTAT(r1, 0x0, 0x0) 21:00:55 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x80044dff, &(0x7f0000000200)) 21:00:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0xc}]}, &(0x7f0000000000)='GPL\x00'}, 0x48) 21:00:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:55 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x80044dff, &(0x7f0000000200)) [ 249.444450] audit: type=1400 audit(1550869255.346:52): avc: denied { prog_run } for pid=8505 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 21:00:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) keyctl$chown(0x4, r1, 0x0, r2) 21:00:55 executing program 3: ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000200)) 21:00:55 executing program 5: 21:00:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x2, 0x0) fcntl$setstatus(r2, 0x4, 0x2002) fcntl$setstatus(r2, 0x4, 0x63fa) write$P9_RWSTAT(r1, 0x0, 0x0) 21:00:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:56 executing program 4: clone(0x84007bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x200000000000001, 0x0) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, 0x0, 0x0) ptrace(0x11, r0) 21:00:56 executing program 2: 21:00:56 executing program 3: ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000200)) 21:00:56 executing program 5: 21:00:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x2, 0x0) fcntl$setstatus(r1, 0x4, 0x2002) fcntl$setstatus(r1, 0x4, 0x63fa) 21:00:56 executing program 5: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x100000000a, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 21:00:56 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000040)='./control/file0\x00', 0x0, 0xffffffffffffffff) rmdir(&(0x7f0000000000)='./control\x00') 21:00:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:56 executing program 3: ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000200)) 21:00:56 executing program 4: clone(0x84007bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x200000000000001, 0x0) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, 0x0, 0x0) ptrace(0x11, r0) 21:00:56 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x80044dff, &(0x7f0000000200)) 21:00:56 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x81) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_setup(0x5, &(0x7f00000000c0)=0x0) write$ppp(r4, &(0x7f0000000240)='8', 0x1) io_submit(r5, 0x1, &(0x7f0000b52fd8)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r4, &(0x7f000096f000)="0000bc4ffe7f00009d", 0x9}]) r6 = syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0x0, 0x400400) r7 = gettid() syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') getgid() writev(r0, &(0x7f0000000080), 0x0) getpeername$ax25(r6, &(0x7f0000000040)={{0x3, @default}, [@netrom, @rose, @null, @bcast, @netrom, @bcast, @remote, @rose]}, &(0x7f0000000100)=0x48) setsockopt$rose(r6, 0x104, 0x4, &(0x7f0000000140)=0x9, 0x4) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) ioprio_get$pid(0x2, r7) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000000000)) tkill(r7, 0x1004000000016) fgetxattr(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="73797374066d2e3a2d57695bb3a5b7c09c3427430696704fe5ddbdcf5934557e0000000015ece80a6c15acb7d3ca97958ab36dda3bdc6e8ec53d2b0eb1db929ced61fbf7c0165445bc6a2a0a137b4bd9a3938accb72ab56440521d6c3a889165ac02e363abfa7e21cc167cd91a5f60cafbf0f6707729af1c1c9b9f19899c744d5c6758505f3d3ac10960f3b89a163d4f3d13592686badfb38152e64b67a3"], 0x0, 0x0) close(r3) dup2(r6, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000007c0)={[{0x7, 0x3, 0x3, 0xe2fe, 0xffffffffffffff81, 0x4, 0x4, 0xffffffffffffb1b0, 0x10000, 0x0, 0x3, 0x2}, {0x716, 0x7, 0x8, 0x8, 0x0, 0x0, 0x2, 0x4, 0x1, 0x0, 0x2, 0x6b74, 0x8000}, {0x1, 0x0, 0x1406, 0xea7, 0x5, 0x20, 0x4, 0x1, 0x80000001, 0x81, 0x8245, 0x0, 0x2}]}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) timer_delete(r8) 21:00:56 executing program 2: 21:00:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:56 executing program 4: clone(0x84007bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x200000000000001, 0x0) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, 0x0, 0x0) ptrace(0x11, r0) 21:00:56 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x80044dff, &(0x7f0000000200)) 21:00:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x2, 0x0) fcntl$setstatus(r1, 0x4, 0x2002) fcntl$setstatus(r1, 0x4, 0x63fa) 21:00:56 executing program 2: 21:00:56 executing program 4: clone(0x84007bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x200000000000001, 0x0) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) ptrace(0x10, r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, 0x0, 0x0) ptrace(0x11, r0) 21:00:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:56 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x80044dff, &(0x7f0000000200)) 21:00:57 executing program 2: 21:00:57 executing program 3: openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000200)) 21:00:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x81) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_setup(0x5, &(0x7f00000000c0)=0x0) write$ppp(r4, &(0x7f0000000240)='8', 0x1) io_submit(r5, 0x1, &(0x7f0000b52fd8)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r4, &(0x7f000096f000)="0000bc4ffe7f00009d", 0x9}]) r6 = syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0x0, 0x400400) r7 = gettid() syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') getgid() writev(r0, &(0x7f0000000080), 0x0) getpeername$ax25(r6, &(0x7f0000000040)={{0x3, @default}, [@netrom, @rose, @null, @bcast, @netrom, @bcast, @remote, @rose]}, &(0x7f0000000100)=0x48) setsockopt$rose(r6, 0x104, 0x4, &(0x7f0000000140)=0x9, 0x4) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) ioprio_get$pid(0x2, r7) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000000000)) tkill(r7, 0x1004000000016) fgetxattr(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="73797374066d2e3a2d57695bb3a5b7c09c3427430696704fe5ddbdcf5934557e0000000015ece80a6c15acb7d3ca97958ab36dda3bdc6e8ec53d2b0eb1db929ced61fbf7c0165445bc6a2a0a137b4bd9a3938accb72ab56440521d6c3a889165ac02e363abfa7e21cc167cd91a5f60cafbf0f6707729af1c1c9b9f19899c744d5c6758505f3d3ac10960f3b89a163d4f3d13592686badfb38152e64b67a3"], 0x0, 0x0) close(r3) dup2(r6, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000007c0)={[{0x7, 0x3, 0x3, 0xe2fe, 0xffffffffffffff81, 0x4, 0x4, 0xffffffffffffb1b0, 0x10000, 0x0, 0x3, 0x2}, {0x716, 0x7, 0x8, 0x8, 0x0, 0x0, 0x2, 0x4, 0x1, 0x0, 0x2, 0x6b74, 0x8000}, {0x1, 0x0, 0x1406, 0xea7, 0x5, 0x20, 0x4, 0x1, 0x80000001, 0x81, 0x8245, 0x0, 0x2}]}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) timer_delete(r8) 21:00:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x2, 0x0) fcntl$setstatus(r1, 0x4, 0x2002) fcntl$setstatus(r1, 0x4, 0x63fa) 21:00:59 executing program 2: 21:00:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:59 executing program 3: openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000200)) 21:00:59 executing program 4: clone(0x84007bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x200000000000001, 0x0) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) ptrace(0x10, r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, 0x0, 0x0) ptrace(0x11, r0) 21:00:59 executing program 2: 21:00:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:59 executing program 3: openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000200)) 21:00:59 executing program 2: 21:00:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:00:59 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x80044dff, 0x0) 21:00:59 executing program 5: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() sched_getparam(r0, &(0x7f0000000200)) 21:00:59 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r0, 0x1, &(0x7f00000004c0)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}]) 21:00:59 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x80044dff, 0x0) 21:00:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:01:00 executing program 4: clone(0x84007bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x200000000000001, 0x0) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) ptrace(0x10, r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, 0x0, 0x0) ptrace(0x11, r0) 21:01:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x2, 0x0) fcntl$setstatus(r2, 0x4, 0x63fa) write$P9_RWSTAT(r1, 0x0, 0x0) 21:01:00 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x80044dff, 0x0) 21:01:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:01:00 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000400)) 21:01:00 executing program 2: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000140)="ea69f9846d61a4758407d006fef42c5e43ba2601513a315b01a31e81e50b248f1e18b0d31539f5b7da1919c3bd85e0604140f77dd96bcbe562439796c8192d79363b4fdc4661f078ca00a93a9c46feabdd1ac00f2fe70ffe8d0c00b8f8921d3d4d8a1fa7d01adcb89cb994a3218cbbb59be4374274493f8137b90b530f5cf03a68825c2818f9bd4a975c2757bf87cf4326c2c5640015f022989d0cf6af0c2a9e3b241da8139abb95f8f6da3207238ebf0165a079ffa034b6b96d39c15b022b631ab018d778b9cfc948dbd9e376481cb160628562c5c4faa90e851ae8e03007", 0xdf) 21:01:00 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(0x0, 0x0) 21:01:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:01:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw\x00\xde>\xd7\x9f\xe0\xbb\xdcU\x00\x00\x00\x00\x15O,J^\xac\xac\x94\xf4\xf5\xdb\"@9A\xa4`\xc9\xea\xa2\xd8\xca\x17\b\x00\x00\x04\x00\x00\x00\x00\x00\x00\xfa') read$FUSE(r0, 0x0, 0x9a) 21:01:00 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x2) r0 = socket$inet6(0xa, 0x3, 0x84) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000040)='./file0\x00', 0x0) unlink(&(0x7f00000000c0)='./file0\x00') fstat(0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xfc68, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000d80)=ANY=[], 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) fcntl$getownex(r3, 0x10, 0x0) prlimit64(0x0, 0x3, 0x0, &(0x7f0000000240)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x8000, 0x8001) fallocate(0xffffffffffffffff, 0x8, 0x0, 0x2fcb391c) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000004580)='stat\x00') ioctl$TIOCMBIS(r4, 0x5416, &(0x7f00000045c0)=0x7f) r5 = socket(0x19, 0x6, 0x6) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000100)={'eql\x00\b\x00', {0x2, 0x80000000, @dev={0xac, 0x14, 0x14, 0xc}}}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x10004, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r5, 0x6, 0x21, &(0x7f00000000c0)="b3000000001d2100", 0x245) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x467e10df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000004540)={0x0, 0x1c9c380}) 21:01:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x2, 0x0) fcntl$setstatus(r2, 0x4, 0x63fa) write$P9_RWSTAT(r1, 0x0, 0x0) 21:01:00 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r3 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r3, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000040)={0x17}) [ 254.758247] sched: DL replenish lagged too much [ 254.771644] IPVS: ftp: loaded support on port[0] = 21 [ 254.960379] IPVS: ftp: loaded support on port[0] = 21 21:01:01 executing program 4: clone(0x84007bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x200000000000001, 0x0) r0 = getpid() execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, 0x0, 0x0) ptrace(0x11, r0) 21:01:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 21:01:01 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x82003, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) lstat(0x0, 0x0) write$P9_RSTATu(r0, 0x0, 0xffffffffffffff54) 21:01:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x2, 0x0) fcntl$setstatus(r2, 0x4, 0x63fa) write$P9_RWSTAT(r1, 0x0, 0x0) 21:01:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r3 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r3, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000040)={0x17}) 21:01:01 executing program 4: clone(0x84007bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x200000000000001, 0x0) r0 = getpid() execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, 0x0, 0x0) ptrace(0x11, r0) 21:01:01 executing program 2: pipe2(0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfffffffffffffe5b) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1e8) prlimit64(0x0, 0x8, &(0x7f0000000000), 0x0) 21:01:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x2002) fcntl$setstatus(r1, 0x4, 0x63fa) write$P9_RWSTAT(r0, 0x0, 0x0) 21:01:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) [ 255.493571] IPVS: ftp: loaded support on port[0] = 21 [ 255.572343] IPVS: ftp: loaded support on port[0] = 21 [ 404.343288] INFO: task kworker/u4:1:21 blocked for more than 140 seconds. [ 404.350647] Not tainted 5.0.0-rc7+ #83 [ 404.355461] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 404.363485] kworker/u4:1 D25936 21 2 0x80000000 [ 404.369130] Workqueue: netns cleanup_net [ 404.373265] Call Trace: [ 404.375855] __schedule+0x817/0x1cc0 [ 404.379559] ? pci_mmcfg_check_reserved+0x170/0x170 [ 404.384618] ? wait_woken+0x250/0x250 [ 404.388407] schedule+0x92/0x180 [ 404.391761] _synchronize_rcu_expedited.constprop.0+0x4d4/0x530 [ 404.398721] ? wait_rcu_exp_gp+0x70/0x70 [ 404.402807] ? finish_wait+0x260/0x260 [ 404.406770] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 404.412782] ? __lock_is_held+0xb6/0x140 [ 404.417020] ? __lock_is_held+0xb6/0x140 [ 404.421095] synchronize_rcu_expedited+0x27/0xa0 [ 404.425976] synchronize_net+0x3b/0x60 [ 404.429926] dev_deactivate_many+0x46f/0xb60 [ 404.434438] ? __might_sleep+0x95/0x190 [ 404.438412] __dev_close_many+0x13d/0x300 [ 404.442547] ? netdev_notify_peers+0xc0/0xc0 [ 404.447006] ? __lock_is_held+0xb6/0x140 [ 404.451196] dev_close_many+0x25b/0x6f0 [ 404.455242] ? lock_acquire+0x16f/0x3f0 [ 404.459220] ? netdev_master_upper_dev_link+0x50/0x50 [ 404.464480] rollback_registered_many+0x43b/0xfd0 [ 404.469319] ? generic_xdp_install+0x3d0/0x3d0 [ 404.474076] ? find_held_lock+0x35/0x130 [ 404.478153] ? ip_tunnel_delete_nets+0x212/0x5f0 [ 404.483033] unregister_netdevice_many.part.0+0x1b/0x1f0 [ 404.488560] unregister_netdevice_many+0x3b/0x50 [ 404.494069] ip_tunnel_delete_nets+0x41e/0x5f0 [ 404.498669] ? ip_tunnel_update+0x9b0/0x9b0 [ 404.502986] ? free_bucket_spinlocks+0x16/0x20 [ 404.507959] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 404.513564] ? vti_get_size+0x10/0x10 [ 404.517372] vti_exit_batch_net+0x23/0x30 [ 404.521519] ops_exit_list.isra.0+0x105/0x160 [ 404.526629] cleanup_net+0x3fb/0x960 [ 404.530334] ? netns_install+0x1d0/0x1d0 [ 404.534566] ? __lock_is_held+0xb6/0x140 [ 404.538631] ? check_preemption_disabled+0x48/0x290 [ 404.543824] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 404.549278] process_one_work+0x98e/0x1790 [ 404.553585] ? pwq_dec_nr_in_flight+0x320/0x320 [ 404.558258] ? lock_acquire+0x16f/0x3f0 [ 404.562339] worker_thread+0x98/0xe40 [ 404.566198] ? trace_hardirqs_on+0x67/0x230 [ 404.570534] kthread+0x357/0x430 [ 404.573974] ? process_one_work+0x1790/0x1790 [ 404.578479] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 404.584059] ret_from_fork+0x3a/0x50 [ 404.587903] INFO: task syz-executor.5:8722 blocked for more than 140 seconds. [ 404.595223] Not tainted 5.0.0-rc7+ #83 [ 404.600065] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 404.608080] syz-executor.5 D25760 8722 7883 0x80000004 [ 404.613751] Call Trace: [ 404.616415] __schedule+0x817/0x1cc0 [ 404.620114] ? __mutex_lock+0x721/0x1310 [ 404.624232] ? pci_mmcfg_check_reserved+0x170/0x170 [ 404.629251] schedule+0x92/0x180 [ 404.632602] schedule_preempt_disabled+0x13/0x20 [ 404.637413] __mutex_lock+0x726/0x1310 [ 404.641296] ? rtnl_lock+0x17/0x20 [ 404.644881] ? mutex_trylock+0x1e0/0x1e0 [ 404.648994] ? kfree+0x173/0x230 [ 404.652363] ? cache_destroy_net+0x3c/0x50 [ 404.657408] ? kfree+0x173/0x230 [ 404.660787] ? lockdep_hardirqs_on+0x415/0x5d0 [ 404.665420] ? trace_hardirqs_on+0x67/0x230 [ 404.669810] ? cache_destroy_net+0x3c/0x50 [ 404.674272] mutex_lock_nested+0x16/0x20 [ 404.678334] ? mutex_lock_nested+0x16/0x20 [ 404.682662] rtnl_lock+0x17/0x20 [ 404.686130] cangw_pernet_exit+0x13/0x30 [ 404.690892] ? cgw_remove_all_jobs+0x410/0x410 [ 404.697017] ops_exit_list.isra.0+0xb0/0x160 [ 404.702323] setup_net+0x3f2/0x730 [ 404.706622] ? ops_init+0x410/0x410 [ 404.711368] copy_net_ns+0x1d9/0x340 [ 404.715190] create_new_namespaces+0x400/0x7b0 [ 404.719788] unshare_nsproxy_namespaces+0xc2/0x200 [ 404.724950] ksys_unshare+0x440/0x980 [ 404.728937] ? walk_process_tree+0x2d0/0x2d0 [ 404.733668] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 404.738427] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.743865] ? do_syscall_64+0x26/0x610 [ 404.747857] ? lockdep_hardirqs_on+0x415/0x5d0 [ 404.753158] __x64_sys_unshare+0x31/0x40 [ 404.757272] do_syscall_64+0x103/0x610 [ 404.761148] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.766680] RIP: 0033:0x457e29 [ 404.769996] Code: 24 28 48 89 4c 24 08 66 c7 44 24 10 01 01 48 c7 44 24 18 00 00 00 00 e8 a5 b0 fc ff 48 8b 44 24 38 48 89 04 24 e8 d7 77 fb ff <48> 8b 6c 24 40 48 83 c4 48 c3 48 89 d1 eb 90 e8 73 20 00 00 e9 7e [ 404.789516] RSP: 002b:00007f1305615c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 404.797295] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000457e29 [ 404.804597] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 404.811987] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 404.819304] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f13056166d4 [ 404.826626] R13: 00000000004c6c3b R14: 00000000004dc3f8 R15: 00000000ffffffff [ 404.834072] INFO: task syz-executor.5:8735 blocked for more than 140 seconds. [ 404.841356] Not tainted 5.0.0-rc7+ #83 [ 404.845982] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 404.853982] syz-executor.5 D27472 8735 7883 0x80000004 [ 404.859755] Call Trace: [ 404.862341] __schedule+0x817/0x1cc0 [ 404.866149] ? __mutex_lock+0x721/0x1310 [ 404.870210] ? pci_mmcfg_check_reserved+0x170/0x170 [ 404.875279] schedule+0x92/0x180 [ 404.878642] schedule_preempt_disabled+0x13/0x20 [ 404.883468] __mutex_lock+0x726/0x1310 [ 404.887359] ? rtnl_lock+0x17/0x20 [ 404.890908] ? mutex_trylock+0x1e0/0x1e0 [ 404.895021] ? kfree+0x173/0x230 [ 404.898441] ? cache_destroy_net+0x3c/0x50 [ 404.902664] ? kfree+0x173/0x230 [ 404.906209] ? lockdep_hardirqs_on+0x415/0x5d0 [ 404.910798] ? trace_hardirqs_on+0x67/0x230 [ 404.915781] ? cache_destroy_net+0x3c/0x50 [ 404.920014] mutex_lock_nested+0x16/0x20 [ 404.924154] ? mutex_lock_nested+0x16/0x20 [ 404.928388] rtnl_lock+0x17/0x20 [ 404.931739] cangw_pernet_exit+0x13/0x30 [ 404.935848] ? cgw_remove_all_jobs+0x410/0x410 [ 404.940431] ops_exit_list.isra.0+0xb0/0x160 [ 404.945105] setup_net+0x3f2/0x730 [ 404.948914] ? ops_init+0x410/0x410 [ 404.952530] copy_net_ns+0x1d9/0x340 [ 404.956295] create_new_namespaces+0x400/0x7b0 [ 404.960881] unshare_nsproxy_namespaces+0xc2/0x200 [ 404.965869] ksys_unshare+0x440/0x980 [ 404.969669] ? walk_process_tree+0x2d0/0x2d0 [ 404.974156] __x64_sys_unshare+0x31/0x40 [ 404.978216] do_syscall_64+0x103/0x610 [ 404.982097] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.987336] RIP: 0033:0x457e29 [ 404.990611] Code: 24 28 48 89 4c 24 08 66 c7 44 24 10 01 01 48 c7 44 24 18 00 00 00 00 e8 a5 b0 fc ff 48 8b 44 24 38 48 89 04 24 e8 d7 77 fb ff <48> 8b 6c 24 40 48 83 c4 48 c3 48 89 d1 eb 90 e8 73 20 00 00 e9 7e [ 405.009698] RSP: 002b:00007f13055d3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 405.017473] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000457e29 [ 405.024804] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 405.032078] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 405.039391] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f13055d46d4 [ 405.047115] R13: 00000000004c6c3b R14: 00000000004dc3f8 R15: 00000000ffffffff [ 405.054445] [ 405.054445] Showing all locks held in the system: [ 405.060761] 4 locks held by kworker/u4:1/21: [ 405.065207] #0: 00000000f5626691 ((wq_completion)"%s""netns"){+.+.}, at: process_one_work+0x87e/0x1790 [ 405.074778] #1: 00000000ad028c6f (net_cleanup_work){+.+.}, at: process_one_work+0x8b4/0x1790 [ 405.083527] #2: 000000002fc47772 (pernet_ops_rwsem){++++}, at: cleanup_net+0xae/0x960 [ 405.091684] #3: 00000000bab43809 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 405.099033] 1 lock held by khungtaskd/1040: [ 405.103488] #0: 0000000047573b38 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 405.112224] 1 lock held by rsyslogd/7706: [ 405.116436] 2 locks held by getty/7827: [ 405.120397] #0: 00000000f262ad5f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 405.128696] #1: 00000000f8ecbbdd (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 405.137589] 2 locks held by getty/7828: [ 405.141600] #0: 000000008419190a (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 405.150007] #1: 0000000073855570 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 405.158913] 2 locks held by getty/7829: [ 405.162868] #0: 0000000019784993 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 405.171159] #1: 00000000443de2e5 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 405.180459] 2 locks held by getty/7830: [ 405.184490] #0: 00000000971cd1b0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 405.192827] #1: 0000000008500fd3 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 405.201750] 2 locks held by getty/7831: [ 405.205761] #0: 000000007148e293 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 405.214189] #1: 000000003582b0e4 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 405.223214] 2 locks held by getty/7832: [ 405.227278] #0: 00000000aa499e86 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 405.235583] #1: 00000000b4e2e870 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 405.244508] 2 locks held by getty/7833: [ 405.248590] #0: 00000000dc740979 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 405.256886] #1: 00000000fa84c635 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 405.265820] 3 locks held by kworker/0:2/7874: [ 405.270301] #0: 0000000001e0a559 ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: process_one_work+0x87e/0x1790 [ 405.280755] #1: 00000000fedb48cb ((addr_chk_work).work){+.+.}, at: process_one_work+0x8b4/0x1790 [ 405.289846] #2: 00000000bab43809 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 405.297192] 1 lock held by syz-executor.4/8385: [ 405.301931] #0: 00000000eed4ddd3 (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x376/0x23f0 [ 405.312387] 1 lock held by syz-executor.4/8442: [ 405.317130] #0: 00000000455f9ca5 (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x376/0x23f0 [ 405.326996] 1 lock held by syz-executor.4/8515: [ 405.331770] #0: 000000009ace9e78 (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x376/0x23f0 [ 405.341761] 2 locks held by syz-executor.5/8722: [ 405.346550] #0: 000000002fc47772 (pernet_ops_rwsem){++++}, at: copy_net_ns+0x1ba/0x340 [ 405.354750] #1: 00000000bab43809 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 405.362182] 2 locks held by syz-executor.5/8735: [ 405.367053] #0: 000000002fc47772 (pernet_ops_rwsem){++++}, at: copy_net_ns+0x1ba/0x340 [ 405.375379] #1: 00000000bab43809 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 405.382702] [ 405.385220] ============================================= [ 405.385220] [ 405.392231] NMI backtrace for cpu 1 [ 405.395909] CPU: 1 PID: 1040 Comm: khungtaskd Not tainted 5.0.0-rc7+ #83 [ 405.402743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.412078] Call Trace: [ 405.414654] dump_stack+0x172/0x1f0 [ 405.418267] nmi_cpu_backtrace.cold+0x63/0xa4 [ 405.422875] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 405.427875] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 405.433150] arch_trigger_cpumask_backtrace+0x14/0x20 [ 405.438333] watchdog+0x9df/0xee0 [ 405.441786] kthread+0x357/0x430 [ 405.445213] ? reset_hung_task_detector+0x30/0x30 [ 405.450061] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 405.455588] ret_from_fork+0x3a/0x50 [ 405.459731] Sending NMI from CPU 1 to CPUs 0: [ 405.464576] NMI backtrace for cpu 0 [ 405.464580] CPU: 0 PID: 45 Comm: kworker/u4:2 Not tainted 5.0.0-rc7+ #83 [ 405.464585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.464588] Workqueue: bat_events batadv_nc_worker [ 405.464592] RIP: 0010:__lock_acquire+0x49/0x4700 [ 405.464601] Code: fc ff df 48 83 e4 f0 48 81 ec a0 01 00 00 48 8b 45 10 48 c7 84 24 a0 00 00 00 b3 8a b5 41 48 c7 84 24 a8 00 00 00 60 af 5a 88 <48> c7 84 24 b0 00 00 00 50 ef 56 81 48 89 84 24 98 00 00 00 48 8d [ 405.464604] RSP: 0018:ffff8880a98efa80 EFLAGS: 00000082 [ 405.464609] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000002 [ 405.464613] RDX: dffffc0000000000 RSI: 0000000000000000 RDI: ffffffff889a4300 [ 405.464616] RBP: ffff8880a98efc50 R08: 0000000000000000 R09: 0000000000000000 [ 405.464620] R10: ffffed1015d05bcf R11: 0000000000000000 R12: ffffffff889a4300 [ 405.464623] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 [ 405.464627] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 405.464630] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 405.464634] CR2: ffffffffff600400 CR3: 000000009d42f000 CR4: 00000000001406f0 [ 405.464638] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 405.464641] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 405.464643] Call Trace: [ 405.464645] ? add_timer+0x463/0xbe0 [ 405.464648] ? __lock_acquire+0x53b/0x4700 [ 405.464650] ? mark_held_locks+0x100/0x100 [ 405.464654] ? mark_held_locks+0x100/0x100 [ 405.464656] ? lock_downgrade+0x810/0x810 [ 405.464659] ? batadv_nc_worker+0x1fa/0x760 [ 405.464661] ? find_held_lock+0x35/0x130 [ 405.464664] ? batadv_nc_worker+0x1fa/0x760 [ 405.464666] lock_acquire+0x16f/0x3f0 [ 405.464669] ? batadv_nc_worker+0xe3/0x760 [ 405.464671] batadv_nc_worker+0x117/0x760 [ 405.464673] ? batadv_nc_worker+0xe3/0x760 [ 405.464676] process_one_work+0x98e/0x1790 [ 405.464678] ? pwq_dec_nr_in_flight+0x320/0x320 [ 405.464681] ? lock_acquire+0x16f/0x3f0 [ 405.464683] worker_thread+0x98/0xe40 [ 405.464685] kthread+0x357/0x430 [ 405.464688] ? process_one_work+0x1790/0x1790 [ 405.464691] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 405.464693] ret_from_fork+0x3a/0x50 [ 405.465702] Kernel panic - not syncing: hung_task: blocked tasks [ 405.683972] CPU: 1 PID: 1040 Comm: khungtaskd Not tainted 5.0.0-rc7+ #83 [ 405.690889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.700241] Call Trace: [ 405.702823] dump_stack+0x172/0x1f0 [ 405.706444] panic+0x2cb/0x65c [ 405.709623] ? __warn_printk+0xf3/0xf3 [ 405.713495] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 405.718406] ? ___preempt_schedule+0x16/0x18 [ 405.722798] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 405.728232] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 405.733663] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 405.739094] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 405.744529] watchdog+0x9f0/0xee0 [ 405.747972] kthread+0x357/0x430 [ 405.751317] ? reset_hung_task_detector+0x30/0x30 [ 405.756139] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 405.761663] ret_from_fork+0x3a/0x50 [ 405.766705] Kernel Offset: disabled [ 405.770329] Rebooting in 86400 seconds..