[ 46.895279] audit: type=1800 audit(1546474895.308:29): pid=8307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 46.935953] audit: type=1800 audit(1546474895.318:30): pid=8307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.123' (ECDSA) to the list of known hosts. 2019/01/03 00:21:44 fuzzer started syzkaller login: [ 55.813113] kauditd_printk_skb: 5 callbacks suppressed [ 55.813129] audit: type=1400 audit(1546474904.228:36): avc: denied { map } for pid=8492 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/01/03 00:21:46 dialing manager at 10.128.0.26:43105 2019/01/03 00:21:53 syscalls: 1 2019/01/03 00:21:53 code coverage: enabled 2019/01/03 00:21:53 comparison tracing: enabled 2019/01/03 00:21:53 setuid sandbox: enabled 2019/01/03 00:21:53 namespace sandbox: enabled 2019/01/03 00:21:53 Android sandbox: /sys/fs/selinux/policy does not exist 2019/01/03 00:21:53 fault injection: enabled 2019/01/03 00:21:53 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/01/03 00:21:53 net packet injection: enabled 2019/01/03 00:21:53 net device setup: enabled 00:24:27 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0x2, 0x0, 0x0, @ipv4={[], [], @loopback}}}, 0x65) [ 219.145440] audit: type=1400 audit(1546475067.558:37): avc: denied { map } for pid=8505 comm="syz-executor0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15336 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 219.244607] IPVS: ftp: loaded support on port[0] = 21 00:24:27 executing program 1: syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x40, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) close(r2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000280)={0x1, 0x0, {0x0, 0x1c, 0x12, 0x7, 0x0, 0x5, 0x2}}) getpeername(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(r0, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) lstat(0x0, 0x0) [ 219.368053] chnl_net:caif_netlink_parms(): no params data found [ 219.456952] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.470428] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.479529] device bridge_slave_0 entered promiscuous mode [ 219.487759] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.494941] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.503753] device bridge_slave_1 entered promiscuous mode [ 219.523152] IPVS: ftp: loaded support on port[0] = 21 [ 219.551725] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.574186] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.614535] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.623628] team0: Port device team_slave_0 added [ 219.632158] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 219.640926] team0: Port device team_slave_1 added 00:24:28 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') write$apparmor_exec(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f00000001c0)=0x1, 0x4) listen(r2, 0x0) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280), &(0x7f00000002c0)=0x8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) [ 219.658815] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 219.666836] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 219.731690] device hsr_slave_0 entered promiscuous mode [ 219.768171] device hsr_slave_1 entered promiscuous mode 00:24:28 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000700)={0x0, @in, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x10000000011}, 0x98) sendto$inet6(r0, &(0x7f0000000180), 0xfff9, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) [ 219.888852] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 219.905273] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 219.918630] IPVS: ftp: loaded support on port[0] = 21 [ 220.014948] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.021644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.028632] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.035011] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.055308] chnl_net:caif_netlink_parms(): no params data found 00:24:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@gettaction={0x20, 0x32, 0x601, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x20}}, 0x0) [ 220.171001] IPVS: ftp: loaded support on port[0] = 21 [ 220.233199] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.246730] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.280939] device bridge_slave_0 entered promiscuous mode [ 220.294200] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 220.307897] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.320241] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.326619] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.342535] device bridge_slave_1 entered promiscuous mode [ 220.370002] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 00:24:28 executing program 5: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = epoll_create(0xe29f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000200)) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r1) bpf$MAP_CREATE(0x0, 0x0, 0xfffffee9) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) [ 220.454442] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 220.464417] IPVS: ftp: loaded support on port[0] = 21 [ 220.471022] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.484609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.510347] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.530406] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.539244] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 220.568645] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.580988] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 220.602321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.610413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.618347] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.624698] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.636670] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 220.651749] chnl_net:caif_netlink_parms(): no params data found [ 220.682168] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 220.696137] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 220.704043] team0: Port device team_slave_0 added [ 220.712943] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.720816] team0: Port device team_slave_1 added [ 220.726009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.734278] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.742047] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.748473] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.777749] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.784248] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.792539] device bridge_slave_0 entered promiscuous mode [ 220.800136] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.806499] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.813824] device bridge_slave_1 entered promiscuous mode [ 220.827751] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.839580] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 220.847077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 220.860172] IPVS: ftp: loaded support on port[0] = 21 [ 220.873058] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.904699] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 220.913496] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.981388] device hsr_slave_0 entered promiscuous mode [ 221.038346] device hsr_slave_1 entered promiscuous mode [ 221.101356] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 221.111989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 221.121730] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 221.130553] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.158430] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 221.169808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 221.177704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.222085] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 221.235216] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 221.242806] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.251745] team0: Port device team_slave_0 added [ 221.260361] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 221.267715] team0: Port device team_slave_1 added [ 221.273434] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 221.283703] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 221.299355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 221.307066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.319702] chnl_net:caif_netlink_parms(): no params data found [ 221.356808] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.421428] device hsr_slave_0 entered promiscuous mode [ 221.478642] device hsr_slave_1 entered promiscuous mode [ 221.520871] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 221.531350] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 221.541267] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 221.559762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 221.567312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 221.575270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 221.583056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 221.602266] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 221.650035] chnl_net:caif_netlink_parms(): no params data found [ 221.672904] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.679452] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.686395] device bridge_slave_0 entered promiscuous mode [ 221.696551] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.703349] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.710948] device bridge_slave_1 entered promiscuous mode [ 221.721105] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 221.727254] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 221.770468] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.782856] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 221.818474] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.863089] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.881629] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.888152] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.895101] device bridge_slave_0 entered promiscuous mode [ 221.903525] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.909968] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.917318] device bridge_slave_1 entered promiscuous mode [ 221.949066] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.964726] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.973302] chnl_net:caif_netlink_parms(): no params data found [ 221.993804] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.002121] team0: Port device team_slave_0 added [ 222.013702] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.021256] team0: Port device team_slave_1 added [ 222.044303] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.059076] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 222.082373] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.151110] device hsr_slave_0 entered promiscuous mode [ 222.188268] device hsr_slave_1 entered promiscuous mode [ 222.228955] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.236159] team0: Port device team_slave_0 added [ 222.241968] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.249440] team0: Port device team_slave_1 added [ 222.262827] audit: type=1400 audit(1546475070.678:38): avc: denied { associate } for pid=8506 comm="syz-executor0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 222.289710] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.296323] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.304247] device bridge_slave_0 entered promiscuous mode [ 222.314419] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 222.326721] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.349269] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.355718] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.364705] device bridge_slave_1 entered promiscuous mode [ 222.372104] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 222.390232] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.401354] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 222.408485] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.423629] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.458437] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 222.467018] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 222.492394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.500020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 00:24:30 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0x2, 0x0, 0x0, @ipv4={[], [], @loopback}}}, 0x65) [ 222.531725] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 222.538077] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.550322] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready 00:24:31 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0x2, 0x0, 0x0, @ipv4={[], [], @loopback}}}, 0x65) [ 222.591148] device hsr_slave_0 entered promiscuous mode [ 222.619013] device hsr_slave_1 entered promiscuous mode 00:24:31 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0x2, 0x0, 0x0, @ipv4={[], [], @loopback}}}, 0x65) [ 222.638904] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 222.646169] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 222.658600] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 222.668609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.675551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 00:24:31 executing program 0: setrlimit(0x8, &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x2, &(0x7f0000000140)=@raw=[@call], &(0x7f00000001c0)='GPL\x00', 0x0, 0x1c, &(0x7f0000000200)=""/28}, 0x48) [ 222.685970] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 222.693800] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.715424] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.725712] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 222.760143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.778367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.784126] audit: type=1400 audit(1546475071.198:39): avc: denied { prog_load } for pid=8539 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:24:31 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f00000000c0)=[{0x4, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, 0x0}}], 0x1c) r1 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc05c5340, &(0x7f0000dc5f98)) [ 222.786051] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.814485] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.829592] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.853930] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 00:24:31 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f00000000c0)=[{0x4, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, 0x0}}], 0x1c) r1 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc05c5340, &(0x7f0000dc5f98)) [ 222.882730] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 222.900699] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.916020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.925151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 00:24:31 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f00000000c0)=[{0x4, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, 0x0}}], 0x1c) r1 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc05c5340, &(0x7f0000dc5f98)) [ 222.940063] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.946433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.966635] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 222.987612] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.995832] team0: Port device team_slave_0 added [ 223.001938] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 223.010117] team0: Port device team_slave_1 added [ 223.024928] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 223.048161] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.056790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.068529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.077244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.085126] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.091522] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.101610] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 223.119146] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.126474] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 223.133688] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.141675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.150074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.158025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.165566] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.171960] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.182036] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 223.193524] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 223.207309] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 223.217217] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 223.259724] device hsr_slave_0 entered promiscuous mode [ 223.298229] device hsr_slave_1 entered promiscuous mode [ 223.348228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.356309] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.364665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.372850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.380733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 223.388684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.396070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.404050] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.417294] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 223.425681] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 223.433383] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 223.446495] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 223.454623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.465079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.473100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.491920] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 223.498095] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 223.511239] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 223.525584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.533582] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.557706] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.567057] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 223.578915] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 223.590191] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.601040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.611827] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.622546] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.634055] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 223.642710] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 223.656513] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.665631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 223.673606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.685379] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 223.696347] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 223.705370] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.715738] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 223.723714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.731448] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.739516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.746421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.756054] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 223.763589] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 223.772219] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 223.783822] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 223.790159] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.798584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.805533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.835426] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 223.842602] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.855617] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 223.870162] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.891662] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.899062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.906828] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.915654] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.922081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.923098] hrtimer: interrupt took 30473 ns [ 223.929693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.941830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.949821] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.956180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.966568] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.980979] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 00:24:32 executing program 1: syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x40, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) close(r2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000280)={0x1, 0x0, {0x0, 0x1c, 0x12, 0x7, 0x0, 0x5, 0x2}}) getpeername(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(r0, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) lstat(0x0, 0x0) [ 223.989103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.996347] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.003986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.021757] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.030567] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.036930] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.044737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.052743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.062150] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.068587] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.082203] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 224.116531] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 224.136155] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 224.146807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 224.157103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 224.172388] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 224.203236] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 224.229634] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.235856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.247731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.275139] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 224.289518] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 224.302435] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 224.310258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.328220] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.337386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.344599] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 224.352256] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.375198] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 224.385828] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 224.395887] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 224.404714] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 224.414646] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 224.422889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 224.432150] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.443225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 224.451954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.460159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.467250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.477520] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 224.494832] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 224.506489] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 224.514808] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.522053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 224.531198] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.539435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 224.547181] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.564626] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 224.574671] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 224.592691] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 224.605602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 224.616673] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.625168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 224.633544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.641249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.649404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.657016] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.663445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.672432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.691918] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 224.716846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.725124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.734021] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.740459] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.753412] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 224.765920] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 224.773236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 224.785619] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 224.796389] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 224.809377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.819889] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 224.830653] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 224.844416] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 224.859094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.874187] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.882690] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 224.899937] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 224.908217] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 224.917141] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.934634] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 224.941654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 224.950482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.967400] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 224.997505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 225.014383] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 225.044480] tc_dump_action: action bad kind [ 225.051599] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 225.057643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 225.064948] sctp: Trying to GSO but underlying device doesn't support it. [ 225.116370] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 225.138511] 8021q: adding VLAN 0 to HW filter on device batadv0 00:24:33 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') write$apparmor_exec(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f00000001c0)=0x1, 0x4) listen(r2, 0x0) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280), &(0x7f00000002c0)=0x8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) 00:24:33 executing program 1: syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x40, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) close(r2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000280)={0x1, 0x0, {0x0, 0x1c, 0x12, 0x7, 0x0, 0x5, 0x2}}) getpeername(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(r0, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) lstat(0x0, 0x0) 00:24:33 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f00000000c0)=[{0x4, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, 0x0}}], 0x1c) r1 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc05c5340, &(0x7f0000dc5f98)) [ 225.377490] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:24:34 executing program 5: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = epoll_create(0xe29f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000200)) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r1) bpf$MAP_CREATE(0x0, 0x0, 0xfffffee9) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) 00:24:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000700)={0x0, @in, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x10000000011}, 0x98) sendto$inet6(r0, &(0x7f0000000180), 0xfff9, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) 00:24:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@gettaction={0x20, 0x32, 0x601, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x20}}, 0x0) 00:24:34 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') write$apparmor_exec(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f00000001c0)=0x1, 0x4) listen(r2, 0x0) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280), &(0x7f00000002c0)=0x8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) 00:24:34 executing program 1: syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x40, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) close(r2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000280)={0x1, 0x0, {0x0, 0x1c, 0x12, 0x7, 0x0, 0x5, 0x2}}) getpeername(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(r0, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) lstat(0x0, 0x0) [ 225.741370] tc_dump_action: action bad kind 00:24:34 executing program 1: syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x40, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) close(r2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000280)={0x1, 0x0, {0x0, 0x1c, 0x12, 0x7, 0x0, 0x5, 0x2}}) getpeername(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(r0, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) lstat(0x0, 0x0) [ 225.784254] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:24:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000700)={0x0, @in, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x10000000011}, 0x98) sendto$inet6(r0, &(0x7f0000000180), 0xfff9, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) 00:24:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@gettaction={0x20, 0x32, 0x601, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x20}}, 0x0) [ 226.059455] tc_dump_action: action bad kind 00:24:34 executing program 1: syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x40, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) close(r2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000280)={0x1, 0x0, {0x0, 0x1c, 0x12, 0x7, 0x0, 0x5, 0x2}}) getpeername(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(r0, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) lstat(0x0, 0x0) 00:24:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@gettaction={0x20, 0x32, 0x601, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x20}}, 0x0) 00:24:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000700)={0x0, @in, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x10000000011}, 0x98) sendto$inet6(r0, &(0x7f0000000180), 0xfff9, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) 00:24:34 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') write$apparmor_exec(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f00000001c0)=0x1, 0x4) listen(r2, 0x0) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280), &(0x7f00000002c0)=0x8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) [ 226.467019] tc_dump_action: action bad kind [ 226.607711] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:24:35 executing program 5: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = epoll_create(0xe29f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000200)) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r1) bpf$MAP_CREATE(0x0, 0x0, 0xfffffee9) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) 00:24:35 executing program 1: syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x40, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) close(r2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000280)={0x1, 0x0, {0x0, 0x1c, 0x12, 0x7, 0x0, 0x5, 0x2}}) getpeername(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(r0, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) lstat(0x0, 0x0) 00:24:35 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f00000000c0)=[{0x4, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, 0x0}}], 0x1c) r1 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc05c5340, &(0x7f0000dc5f98)) 00:24:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x0, 0x0) 00:24:35 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') write$apparmor_exec(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f00000001c0)=0x1, 0x4) listen(r2, 0x0) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280), &(0x7f00000002c0)=0x8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) [ 226.957196] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 227.015972] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:24:35 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f00000000c0)=[{0x4, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, 0x0}}], 0x1c) r1 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc05c5340, &(0x7f0000dc5f98)) 00:24:35 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00006dbffc)=0x1, 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000280)=@can, 0x80, 0x0, 0x0, &(0x7f0000000480)=""/2, 0x2}, 0x0) 00:24:35 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f00000000c0)=[{0x4, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, 0x0}}], 0x1c) r1 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc05c5340, &(0x7f0000dc5f98)) [ 227.235363] audit: type=1400 audit(1546475075.648:40): avc: denied { prog_run } for pid=8642 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:24:35 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000004000), 0x0, &(0x7f0000003b80)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000001840)=""/18, 0x12}, &(0x7f0000003b00)=[{&(0x7f0000002ac0)=""/4096, 0x20004000}, {&(0x7f0000003ac0)=""/41, 0x29}], 0x2}}], 0x48}, 0x0) 00:24:35 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00006dbffc)=0x1, 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000280)=@can, 0x80, 0x0, 0x0, &(0x7f0000000480)=""/2, 0x2}, 0x0) 00:24:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x4000000000000027, &(0x7f0000000000)={@multicast1, @loopback, @remote}, 0xc) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0x100000001, {{0x2, 0x0, @multicast1}}, 0x0, 0x3, [{{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}}, {{0x2, 0x4e23, @multicast1}}, {{0x2, 0x0, @dev}}]}, 0x210) 00:24:36 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') write$apparmor_exec(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f00000001c0)=0x1, 0x4) listen(r2, 0x0) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280), &(0x7f00000002c0)=0x8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) [ 227.792797] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:24:36 executing program 5: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = epoll_create(0xe29f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000200)) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r1) bpf$MAP_CREATE(0x0, 0x0, 0xfffffee9) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) 00:24:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) close(r4) write$binfmt_elf32(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="d5"], 0x1) 00:24:36 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00006dbffc)=0x1, 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000280)=@can, 0x80, 0x0, 0x0, &(0x7f0000000480)=""/2, 0x2}, 0x0) 00:24:36 executing program 3: r0 = socket(0x1e, 0x5, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r0, &(0x7f0000afb000)=@generic={0x1e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) r1 = socket(0x1e, 0x5, 0x0) sendmsg(r1, &(0x7f0000316000)={&(0x7f0000dd7000)=@generic={0x10000000001e, "010000000000000400000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 00:24:36 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') write$apparmor_exec(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f00000001c0)=0x1, 0x4) listen(r2, 0x0) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280), &(0x7f00000002c0)=0x8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) [ 228.127058] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:24:36 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00006dbffc)=0x1, 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000280)=@can, 0x80, 0x0, 0x0, &(0x7f0000000480)=""/2, 0x2}, 0x0) 00:24:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x400000, 0x4) 00:24:36 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x800452d3, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x3000) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r3, 0x5) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = accept4(r3, 0x0, 0x0, 0x0) listen(r3, 0x101) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x54}, 0x98) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x4, 0x3}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100)=0x1000, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') rt_sigpending(0x0, 0xb6) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000004c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x1) [ 228.371851] l2tp_ppp: tunl 4: set debug=464c457f [ 228.410780] l2tp_core: tunl 4: closing all sessions... [ 228.449201] l2tp_core: tunl 4: closing... 00:24:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000200000000000000002800000850000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r0}, @call], &(0x7f0000000280)='GPL\x00', 0x1, 0xa7, &(0x7f00000004c0)=""/167}, 0x48) 00:24:36 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x2, @local, 'batadv0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) [ 228.587621] audit: type=1400 audit(1546475076.998:41): avc: denied { map_create } for pid=8718 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:24:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000200081ae00060c00000f000002000000000000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 00:24:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f00000000c0), 0x4) [ 228.788887] audit: type=1400 audit(1546475077.028:42): avc: denied { map_read map_write } for pid=8718 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 228.864460] netlink: 7 bytes leftover after parsing attributes in process `syz-executor2'. [ 228.969485] audit: type=1400 audit(1546475077.088:43): avc: denied { create } for pid=8712 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 229.006717] syz-executor0 (8691) used greatest stack depth: 17864 bytes left [ 229.102393] audit: type=1400 audit(1546475077.088:44): avc: denied { write } for pid=8712 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 229.172875] netlink: 7 bytes leftover after parsing attributes in process `syz-executor2'. [ 229.198217] audit: type=1400 audit(1546475077.098:45): avc: denied { read } for pid=8712 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:24:37 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, 0x0) 00:24:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000200081ae00060c00000f000002000000000000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 00:24:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f0255123f3188a070") r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000004940)={0x0, 0x0, &(0x7f0000004900)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)={0x14, 0x22, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 00:24:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x16, 0x0, 0x2, 0x6, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x18) 00:24:37 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x800452d3, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x3000) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r3, 0x5) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = accept4(r3, 0x0, 0x0, 0x0) listen(r3, 0x101) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x54}, 0x98) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x4, 0x3}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100)=0x1000, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') rt_sigpending(0x0, 0xb6) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000004c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x1) [ 229.405457] netlink: 7 bytes leftover after parsing attributes in process `syz-executor2'. 00:24:37 executing program 3: r0 = timerfd_create(0x0, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/190, 0xbe}], 0x1) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x80000003, 0x8031, 0xffffffffffffffff, 0x0) mlockall(0x1) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:24:37 executing program 0: r0 = timerfd_create(0x100000000000008, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timerfd_settime(r0, 0x0, &(0x7f0000016fe0)={{0x0, 0x1c9c380}, {0x0, 0x5f6c}}, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(r0, 0x0, &(0x7f0000000080)={{}, {0x0, r2+10000000}}, 0x0) 00:24:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000200081ae00060c00000f000002000000000000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) [ 229.558681] overlayfs: filesystem on './file0' not supported as upperdir 00:24:38 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x2, @local, 'batadv0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) [ 229.598954] audit: type=1400 audit(1546475078.018:46): avc: denied { wake_alarm } for pid=8763 comm="syz-executor0" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 00:24:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0xc}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 00:24:38 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=@setlink={0x28, 0x13, 0x309, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 00:24:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000200081ae00060c00000f000002000000000000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) [ 229.878845] netlink: 7 bytes leftover after parsing attributes in process `syz-executor2'. [ 229.952052] device bridge_slave_0 left promiscuous mode 00:24:38 executing program 0: r0 = socket(0x10, 0x4000000000000002, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000040)="1f0000000104fffffd3b54c007110000f30501000b000300000048000000cf", 0x1f) 00:24:38 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x800452d3, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x3000) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r3, 0x5) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = accept4(r3, 0x0, 0x0, 0x0) listen(r3, 0x101) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x54}, 0x98) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x4, 0x3}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100)=0x1000, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') rt_sigpending(0x0, 0xb6) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000004c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x1) [ 229.998276] bridge0: port 1(bridge_slave_0) entered disabled state 00:24:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="285474dae6badf3ab85f04000000d2eb", 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000200)={'#! ', './file0', [{0x20, 'vmac64(aes-generic)\x00'}], 0xa, "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"}, 0x6ce) [ 230.163935] audit: type=1400 audit(1546475078.578:47): avc: denied { create } for pid=8799 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 230.176120] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 00:24:38 executing program 5: syz_open_dev$sg(0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', 0x0, 0x18}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) 00:24:38 executing program 2: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x8000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x4000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x2000000000000000, 0x0, 0x0, 0x0, 0x6]}}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) semtimedop(0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, r1+30000000}) connect$l2tp(0xffffffffffffffff, &(0x7f00000003c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x4, 0x0, 0x0, {0xa, 0x4e20, 0x4, @mcast2, 0x6}}}, 0xfffffff7) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) rt_sigtimedwait(&(0x7f0000000580), 0x0, &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000280)={@loopback}) setsockopt$inet6_int(r0, 0x29, 0x38, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) wait4(r3, &(0x7f0000000380), 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x8f, 0x0, &(0x7f0000000080)) [ 230.283475] audit: type=1400 audit(1546475078.578:48): avc: denied { write } for pid=8799 comm="syz-executor0" path="socket:[30266]" dev="sockfs" ino=30266 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 230.313694] netlink: 'syz-executor0': attribute type 3 has an invalid length. [ 230.390743] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 230.435116] netlink: 'syz-executor0': attribute type 3 has an invalid length. 00:24:39 executing program 0: r0 = socket(0x10, 0x4000000000000002, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000040)="1f0000000104fffffd3b54c007110000f30501000b000300000048000000cf", 0x1f) 00:24:39 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x800452d3, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x3000) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r3, 0x5) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = accept4(r3, 0x0, 0x0, 0x0) listen(r3, 0x101) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x54}, 0x98) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x4, 0x3}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100)=0x1000, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') rt_sigpending(0x0, 0xb6) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000004c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x1) 00:24:39 executing program 5: syz_open_dev$sg(0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', 0x0, 0x18}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) 00:24:39 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x2, @local, 'batadv0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) 00:24:39 executing program 2: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x8000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x4000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x2000000000000000, 0x0, 0x0, 0x0, 0x6]}}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) semtimedop(0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, r1+30000000}) connect$l2tp(0xffffffffffffffff, &(0x7f00000003c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x4, 0x0, 0x0, {0xa, 0x4e20, 0x4, @mcast2, 0x6}}}, 0xfffffff7) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) rt_sigtimedwait(&(0x7f0000000580), 0x0, &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000280)={@loopback}) setsockopt$inet6_int(r0, 0x29, 0x38, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) wait4(r3, &(0x7f0000000380), 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x8f, 0x0, &(0x7f0000000080)) 00:24:39 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x8000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x4000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x2000000000000000, 0x0, 0x0, 0x0, 0x6]}}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) semtimedop(0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, r1+30000000}) connect$l2tp(0xffffffffffffffff, &(0x7f00000003c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x4, 0x0, 0x0, {0xa, 0x4e20, 0x4, @mcast2, 0x6}}}, 0xfffffff7) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) rt_sigtimedwait(&(0x7f0000000580), 0x0, &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000280)={@loopback}) setsockopt$inet6_int(r0, 0x29, 0x38, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) wait4(r3, &(0x7f0000000380), 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x8f, 0x0, &(0x7f0000000080)) 00:24:39 executing program 0: r0 = socket(0x10, 0x4000000000000002, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000040)="1f0000000104fffffd3b54c007110000f30501000b000300000048000000cf", 0x1f) [ 231.108812] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 231.127430] netlink: 'syz-executor0': attribute type 3 has an invalid length. 00:24:39 executing program 5: syz_open_dev$sg(0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', 0x0, 0x18}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) [ 231.310999] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 00:24:39 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x8000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x4000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x2000000000000000, 0x0, 0x0, 0x0, 0x6]}}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) semtimedop(0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, r1+30000000}) connect$l2tp(0xffffffffffffffff, &(0x7f00000003c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x4, 0x0, 0x0, {0xa, 0x4e20, 0x4, @mcast2, 0x6}}}, 0xfffffff7) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) rt_sigtimedwait(&(0x7f0000000580), 0x0, &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000280)={@loopback}) setsockopt$inet6_int(r0, 0x29, 0x38, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) wait4(r3, &(0x7f0000000380), 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x8f, 0x0, &(0x7f0000000080)) [ 231.367989] netlink: 'syz-executor0': attribute type 3 has an invalid length. 00:24:39 executing program 5: syz_open_dev$sg(0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', 0x0, 0x18}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) 00:24:40 executing program 0: r0 = socket(0x10, 0x4000000000000002, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000040)="1f0000000104fffffd3b54c007110000f30501000b000300000048000000cf", 0x1f) 00:24:40 executing program 2: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x8000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x4000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x2000000000000000, 0x0, 0x0, 0x0, 0x6]}}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) semtimedop(0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, r1+30000000}) connect$l2tp(0xffffffffffffffff, &(0x7f00000003c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x4, 0x0, 0x0, {0xa, 0x4e20, 0x4, @mcast2, 0x6}}}, 0xfffffff7) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) rt_sigtimedwait(&(0x7f0000000580), 0x0, &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000280)={@loopback}) setsockopt$inet6_int(r0, 0x29, 0x38, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) wait4(r3, &(0x7f0000000380), 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x8f, 0x0, &(0x7f0000000080)) 00:24:40 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)={0x83, 0x3, 0x6105e01}, 0xfe7e) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000000)) [ 231.695757] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 231.799815] netlink: 'syz-executor0': attribute type 3 has an invalid length. 00:24:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000740)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x800, 'ifb0\x00', 'dummy0\x00', 'ip_vti0\x00', 'ip6tnl0\x00', @remote, [], @broadcast, [], 0xf0, 0xf0, 0x128, [@ip={'ip\x00', 0x20, {{@loopback, @dev}}}, @realm={'realm\x00', 0x10}]}}, @snat={'snat\x00', 0x10, {{@dev}}}}]}]}, 0x230) 00:24:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, 0x0) write$input_event(0xffffffffffffffff, 0x0, 0x0) [ 231.969898] x_tables: eb_tables: realm match: used from hooks POSTROUTING, but only valid from INPUT/FORWARD/OUTPUT/POSTROUTING 00:24:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$P9_RVERSION(r2, &(0x7f00000002c0)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 00:24:40 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x2, @local, 'batadv0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) [ 232.199313] x_tables: eb_tables: realm match: used from hooks POSTROUTING, but only valid from INPUT/FORWARD/OUTPUT/POSTROUTING 00:24:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000740)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x800, 'ifb0\x00', 'dummy0\x00', 'ip_vti0\x00', 'ip6tnl0\x00', @remote, [], @broadcast, [], 0xf0, 0xf0, 0x128, [@ip={'ip\x00', 0x20, {{@loopback, @dev}}}, @realm={'realm\x00', 0x10}]}}, @snat={'snat\x00', 0x10, {{@dev}}}}]}]}, 0x230) 00:24:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x1a0ffffffff}]}, &(0x7f0000f6bffb)='GPL\x00', 0xffffffffffffffff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 00:24:40 executing program 2: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x8000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x4000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x2000000000000000, 0x0, 0x0, 0x0, 0x6]}}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) semtimedop(0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, r1+30000000}) connect$l2tp(0xffffffffffffffff, &(0x7f00000003c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x4, 0x0, 0x0, {0xa, 0x4e20, 0x4, @mcast2, 0x6}}}, 0xfffffff7) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) rt_sigtimedwait(&(0x7f0000000580), 0x0, &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000280)={@loopback}) setsockopt$inet6_int(r0, 0x29, 0x38, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) wait4(r3, &(0x7f0000000380), 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x8f, 0x0, &(0x7f0000000080)) 00:24:40 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x8000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x4000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x2000000000000000, 0x0, 0x0, 0x0, 0x6]}}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) semtimedop(0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, r1+30000000}) connect$l2tp(0xffffffffffffffff, &(0x7f00000003c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x4, 0x0, 0x0, {0xa, 0x4e20, 0x4, @mcast2, 0x6}}}, 0xfffffff7) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) rt_sigtimedwait(&(0x7f0000000580), 0x0, &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000280)={@loopback}) setsockopt$inet6_int(r0, 0x29, 0x38, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) wait4(r3, &(0x7f0000000380), 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x8f, 0x0, &(0x7f0000000080)) 00:24:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, 0x0) write$input_event(0xffffffffffffffff, 0x0, 0x0) 00:24:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x4) clone(0x4002102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x55f5}, 0x14) 00:24:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, 0x0) write$input_event(0xffffffffffffffff, 0x0, 0x0) [ 232.719653] x_tables: eb_tables: realm match: used from hooks POSTROUTING, but only valid from INPUT/FORWARD/OUTPUT/POSTROUTING 00:24:41 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000800)='./file0\x00', &(0x7f0000000700)='configfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) close(r0) 00:24:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, 0x0) write$input_event(0xffffffffffffffff, 0x0, 0x0) 00:24:41 executing program 1: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client0\x00', 0xffffffff80000002, "6ca7df8b9382563e", "e5971769361707560c67a176d87a1a1844698406f99d5251ccc62229d9f25d97", 0x100000001, 0xffffffffffffff31}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x0, 0x5}}, 0x15) [ 232.938016] sched: DL replenish lagged too much 00:24:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\xdf\xcf\x00', 0x3001}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$apparmor_current(r1, &(0x7f0000000600)=@profile={'changeprofile ', 'nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&'}, 0x678d) 00:24:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000740)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x800, 'ifb0\x00', 'dummy0\x00', 'ip_vti0\x00', 'ip6tnl0\x00', @remote, [], @broadcast, [], 0xf0, 0xf0, 0x128, [@ip={'ip\x00', 0x20, {{@loopback, @dev}}}, @realm={'realm\x00', 0x10}]}}, @snat={'snat\x00', 0x10, {{@dev}}}}]}]}, 0x230) [ 233.190916] device nr0 entered promiscuous mode 00:24:41 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0x0, 0x8000000000011, r0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000040), 0xc) 00:24:41 executing program 2: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RGETLOCK(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1e"], 0x1) r4 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) fcntl$setpipe(r2, 0x407, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x1004000000016) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYPTR], 0x8) 00:24:41 executing program 1: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client0\x00', 0xffffffff80000002, "6ca7df8b9382563e", "e5971769361707560c67a176d87a1a1844698406f99d5251ccc62229d9f25d97", 0x100000001, 0xffffffffffffff31}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x0, 0x5}}, 0x15) 00:24:41 executing program 4: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client0\x00', 0xffffffff80000002, "6ca7df8b9382563e", "e5971769361707560c67a176d87a1a1844698406f99d5251ccc62229d9f25d97", 0x100000001, 0xffffffffffffff31}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x0, 0x5}}, 0x15) [ 233.325659] audit: type=1400 audit(1546475081.738:49): avc: denied { map } for pid=8943 comm="syz-executor4" path="socket:[30515]" dev="sockfs" ino=30515 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tcp_socket permissive=1 [ 233.344789] x_tables: eb_tables: realm match: used from hooks POSTROUTING, but only valid from INPUT/FORWARD/OUTPUT/POSTROUTING 00:24:41 executing program 3: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client0\x00', 0xffffffff80000002, "6ca7df8b9382563e", "e5971769361707560c67a176d87a1a1844698406f99d5251ccc62229d9f25d97", 0x100000001, 0xffffffffffffff31}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x0, 0x5}}, 0x15) 00:24:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000740)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x800, 'ifb0\x00', 'dummy0\x00', 'ip_vti0\x00', 'ip6tnl0\x00', @remote, [], @broadcast, [], 0xf0, 0xf0, 0x128, [@ip={'ip\x00', 0x20, {{@loopback, @dev}}}, @realm={'realm\x00', 0x10}]}}, @snat={'snat\x00', 0x10, {{@dev}}}}]}]}, 0x230) 00:24:42 executing program 4: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client0\x00', 0xffffffff80000002, "6ca7df8b9382563e", "e5971769361707560c67a176d87a1a1844698406f99d5251ccc62229d9f25d97", 0x100000001, 0xffffffffffffff31}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x0, 0x5}}, 0x15) [ 233.783347] x_tables: eb_tables: realm match: used from hooks POSTROUTING, but only valid from INPUT/FORWARD/OUTPUT/POSTROUTING 00:24:42 executing program 3: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client0\x00', 0xffffffff80000002, "6ca7df8b9382563e", "e5971769361707560c67a176d87a1a1844698406f99d5251ccc62229d9f25d97", 0x100000001, 0xffffffffffffff31}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x0, 0x5}}, 0x15) 00:24:42 executing program 5: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client0\x00', 0xffffffff80000002, "6ca7df8b9382563e", "e5971769361707560c67a176d87a1a1844698406f99d5251ccc62229d9f25d97", 0x100000001, 0xffffffffffffff31}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x0, 0x5}}, 0x15) 00:24:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\xdf\xcf\x00', 0x3001}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$apparmor_current(r1, &(0x7f0000000600)=@profile={'changeprofile ', 'nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&'}, 0x678d) 00:24:42 executing program 2: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client0\x00', 0xffffffff80000002, "6ca7df8b9382563e", "e5971769361707560c67a176d87a1a1844698406f99d5251ccc62229d9f25d97", 0x100000001, 0xffffffffffffff31}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x0, 0x5}}, 0x15) [ 234.390039] device nr0 entered promiscuous mode 00:24:42 executing program 1: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client0\x00', 0xffffffff80000002, "6ca7df8b9382563e", "e5971769361707560c67a176d87a1a1844698406f99d5251ccc62229d9f25d97", 0x100000001, 0xffffffffffffff31}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x0, 0x5}}, 0x15) 00:24:42 executing program 4: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client0\x00', 0xffffffff80000002, "6ca7df8b9382563e", "e5971769361707560c67a176d87a1a1844698406f99d5251ccc62229d9f25d97", 0x100000001, 0xffffffffffffff31}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x0, 0x5}}, 0x15) 00:24:43 executing program 3: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client0\x00', 0xffffffff80000002, "6ca7df8b9382563e", "e5971769361707560c67a176d87a1a1844698406f99d5251ccc62229d9f25d97", 0x100000001, 0xffffffffffffff31}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x0, 0x5}}, 0x15) 00:24:43 executing program 5: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client0\x00', 0xffffffff80000002, "6ca7df8b9382563e", "e5971769361707560c67a176d87a1a1844698406f99d5251ccc62229d9f25d97", 0x100000001, 0xffffffffffffff31}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x0, 0x5}}, 0x15) 00:24:43 executing program 2: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client0\x00', 0xffffffff80000002, "6ca7df8b9382563e", "e5971769361707560c67a176d87a1a1844698406f99d5251ccc62229d9f25d97", 0x100000001, 0xffffffffffffff31}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x0, 0x5}}, 0x15) 00:24:43 executing program 1: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client0\x00', 0xffffffff80000002, "6ca7df8b9382563e", "e5971769361707560c67a176d87a1a1844698406f99d5251ccc62229d9f25d97", 0x100000001, 0xffffffffffffff31}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x0, 0x5}}, 0x15) 00:24:43 executing program 4: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client0\x00', 0xffffffff80000002, "6ca7df8b9382563e", "e5971769361707560c67a176d87a1a1844698406f99d5251ccc62229d9f25d97", 0x100000001, 0xffffffffffffff31}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x0, 0x5}}, 0x15) 00:24:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\xdf\xcf\x00', 0x3001}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$apparmor_current(r1, &(0x7f0000000600)=@profile={'changeprofile ', 'nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&'}, 0x678d) 00:24:44 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0xf91, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r0, &(0x7f00000000c0), 0x59, 0x40002000, &(0x7f0000000100)={0x0, 0x1c9c380}) 00:24:44 executing program 2: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client0\x00', 0xffffffff80000002, "6ca7df8b9382563e", "e5971769361707560c67a176d87a1a1844698406f99d5251ccc62229d9f25d97", 0x100000001, 0xffffffffffffff31}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x0, 0x5}}, 0x15) [ 235.752649] device nr0 entered promiscuous mode 00:24:44 executing program 5: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client0\x00', 0xffffffff80000002, "6ca7df8b9382563e", "e5971769361707560c67a176d87a1a1844698406f99d5251ccc62229d9f25d97", 0x100000001, 0xffffffffffffff31}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x0, 0x5}}, 0x15) 00:24:44 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x8000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x2) gettid() ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000001c0)={r0, 0x0, 0x9, 0x0, 0x9}) set_tid_address(&(0x7f0000000240)) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f00000002c0), 0x4cc, 0x20007ffc) memfd_create(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000340)='./bus\x00', 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x8001, 0x4) fcntl$setstatus(r3, 0x4, 0x44000) io_setup(0x0, 0x0) write$P9_RCLUNK(r1, 0x0, 0x0) r4 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000140)={0x0, 0x4, 0x80000001, &(0x7f0000000100)=0x3}) keyctl$assume_authority(0x10, r4) r5 = creat(0x0, 0x0) ftruncate(r5, 0xbb1) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) 00:24:44 executing program 4: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client0\x00', 0xffffffff80000002, "6ca7df8b9382563e", "e5971769361707560c67a176d87a1a1844698406f99d5251ccc62229d9f25d97", 0x100000001, 0xffffffffffffff31}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x0, 0x5}}, 0x15) 00:24:44 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r2, &(0x7f0000002600)={0x0, 0x0, 0x0}, 0x20000800) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x5411, 0x20400207) 00:24:44 executing program 2: r0 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000040)=@nfc={0x27, 0x9}, 0x80, &(0x7f0000002740)=[{&(0x7f0000001740)="c7ae8dab8cd39597d975fc02db9ee9c5df0425e38fe287a89f5603681a3abafbf4fb19548b0eda38f3bf14012c0a44884f259c0919ea41f13422b9b605aaae23d33246b72c56601b48274ef255cddc1b90b866bffa8f06777330af959149987684d61476c8de3aea52e3f636d4e766e8f6ba9f3570a373528780b3ee40275ff00b9e95ac9b90bffba612b7407bed9820fe3275142c687959c4d9a4f3e3a4b45ccf2055504689198a33ecf3f082986dbfcae3cb334bf4e7a2156a86fe15c6cf6ee00a500f2cf2f138c37051bb8b75460ef01f12bcab28b4453854e9fcb1b315d505578c1da21d0c02c9ba11df5c8f48b1a1fde7dcec326227aae5cd62f9f54afc8a911cbe2af955e7d42ca61ea68ecbea94105c9e1c61a739c117a3c2a9780819f2a0cee5bb3cf4984de8438b2f4e8b5b8fdbc4b18503eafe2540e97c7daf40f3c4ed357b8644472940435f934ec900a41daa8d407702745f5f07016164744fb86b41247cb85e6ebabe6893dda942405f621d321a9501da65aa6bd29ace4b731ed1a7059443ad4b8b979f11e07e8bf58e37e0635d141643657212dafb0e7b1f93dd8ae2d1309dd8c18c088b821e54550c0f60fae089e43d2f67ee3838cf57600e16f36e1541528b1f3c6fd52fc922337ae137cd319680e5475d2247f08716446b102f21086333ba8358ed4fdd540c1b584a41bc4b8a544ac3c84546f4bd4e70c5c06759841a3081de7fd90a819b538231db451b09c7f079dac33cf4f6d61119ef2c882d3ad793a1c3ad7ca225df2c294038eabb0ad716aa4dbd0acb287db5b817b0d311478932f27f2586a3ba555d40aea0189010bf35a05fe60d9086526ae2c753aa5619140d9a4ed45c09dcff4e392ebc9025b45f3f070e10c1d0ae18643d355b7b72be297039ce24be6cfea512d4c2446eb11f7e859f7fae5055168b2daec9c07d9890b375318c8dc10530c8eb97b04c434adc6037154bf23c9d1dccb7cbdae224d7c3bfc3ce90135d250d20354056c8b528deb8b5a5129ff05e165628123e1976e369c2557c8b591462c2dd1f37439d85444d71dd8c7e5dfde032810968eb79a09102d5a4df7db0bb36c98c2b0e3aa98b9ba47801d2964806d820486ac2623c2b5447fbb8283c4a15f8806b1c1f090e3f44d8628cd9da18977953d9f4022f98c5085d27e4197408cfe927b8c6665a1498affe7aec599d64f3e99caf9f5aca40bdd7ba09141c758c8c2c36141d5576d7af49737bbb475b65781eb25508672ccf8a75e0f053d854f6544d00fca3bfcd101f2df8c1136e5e0f0d3aeaaee50698b07ae93763c6afdfc30de4a4e08bd2cc744ebe109328d490938e2269a418a302f270c0023bcff2d3b48619475f0c162df8153f6dc4992979fbe5f8f358935411fece496c8c03403cb2b1d0dda14cb64a1f7cd4f87f06baef9e3310713efdb314cd805675eb4a9f1987e880ff87d715784c74811be713d3476ce8f30520ec3a252e17a0dcf604200f061e35a1427be5a39a0a5ceac8e1ff865e92057f96af882f393048a80c1c0f32c76874cd5ff44d4c70541193b271a8e2ba4ec4a776288c27c16d1cc92efbcad8776f7584f032d135105bc79eaa83efdfb1808202472e0d82ff05ea21061c7ff5d8079dfddf7f48a0178a954df79aa1965ec17dcab5b5ba70a12167b72ab39294e5b2c89048ee94a7b1408aa96c042595ed5393360ec2532577ca67d21d2d76a8ed9d6b21b7de47609317251f4242dd0395853432ab9d4272a96bd368ddfd674d3867e49e062d55997fafedc8f22c83ef8d08c75c0a501577c8b70d886db09248b0a363d95cd5aeff57185cb7ad0095915525064cb653b2f89d233740deb5a3e7a491f5133b604302da56f659929b17bfff64348cca55b9fe1a7e731f40446c589bc154e39fcdf225b57d7eba85999b6c2fa89bf6d6c8dfc7ec0157e63792ef589df01750d3846336b35c1295cb019213df4f8fbdefb2940e6064a3c257d3bf3af4aa00ee1f66371cc143de4caddff7978c515b77f2e1aee0651fe8bc31100fa96548e93591", 0x5ad}], 0x1}}], 0x1, 0x0) 00:24:45 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x7ffffffff002, 0x3, &(0x7f0000c87000/0x2000)=nil) [ 236.541932] audit: type=1804 audit(1546475084.958:50): pid=9031 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir025141068/syzkaller.5Khzt8/19/bus" dev="sda1" ino=16590 res=1 00:24:45 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000004c0)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, 0x0) 00:24:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\xdf\xcf\x00', 0x3001}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$apparmor_current(r1, &(0x7f0000000600)=@profile={'changeprofile ', 'nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&'}, 0x678d) 00:24:45 executing program 4: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client0\x00', 0xffffffff80000002, "6ca7df8b9382563e", "e5971769361707560c67a176d87a1a1844698406f99d5251ccc62229d9f25d97", 0x100000001, 0xffffffffffffff31}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x0, 0x5}}, 0x15) 00:24:45 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/softnet_stat\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000480), 0x100000000000026e, 0x0) 00:24:45 executing program 5: r0 = socket(0x848000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f00000000c0)=""/13, &(0x7f0000000000)=0x32) 00:24:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000001c0)=@srh={0xff, 0x2, 0x4, 0x1, 0x302, 0x40, 0x0, [@mcast1]}, 0x18) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r1, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) msgget(0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) [ 237.166558] device nr0 entered promiscuous mode 00:24:45 executing program 5: r0 = socket(0x848000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f00000000c0)=""/13, &(0x7f0000000000)=0x32) [ 237.244716] audit: type=1804 audit(1546475085.658:51): pid=9064 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir025141068/syzkaller.5Khzt8/19/bus" dev="sda1" ino=16590 res=1 [ 237.470570] audit: type=1804 audit(1546475085.748:52): pid=9069 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir025141068/syzkaller.5Khzt8/19/bus" dev="sda1" ino=16590 res=1 00:24:46 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x8000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x2) gettid() ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000001c0)={r0, 0x0, 0x9, 0x0, 0x9}) set_tid_address(&(0x7f0000000240)) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f00000002c0), 0x4cc, 0x20007ffc) memfd_create(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000340)='./bus\x00', 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x8001, 0x4) fcntl$setstatus(r3, 0x4, 0x44000) io_setup(0x0, 0x0) write$P9_RCLUNK(r1, 0x0, 0x0) r4 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000140)={0x0, 0x4, 0x80000001, &(0x7f0000000100)=0x3}) keyctl$assume_authority(0x10, r4) r5 = creat(0x0, 0x0) ftruncate(r5, 0xbb1) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) 00:24:46 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x280100, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000440)=""/195) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000140)) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000180), 0xfffffffffffffeb0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80000000000045, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XT\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZ') syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x6, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r4, 0x4) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) sendto$inet6(r5, &(0x7f0000e33fe0)='X', 0x1, 0xfffffffffffffffe, 0x0, 0x0) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001200)) r6 = accept4(r4, 0x0, &(0x7f0000000040), 0x0) mq_timedreceive(r3, &(0x7f0000000080)=""/51, 0x33, 0x1, 0x0) r7 = add_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f00000012c0)="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", 0x1000, 0xfffffffffffffffb) keyctl$get_keyring_id(0x0, r7, 0x100) dup3(r2, r6, 0x0) sendfile(r1, r2, &(0x7f0000000280)=0x1, 0x8402) 00:24:46 executing program 5: r0 = socket(0x848000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f00000000c0)=""/13, &(0x7f0000000000)=0x32) 00:24:46 executing program 5: r0 = socket(0x848000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f00000000c0)=""/13, &(0x7f0000000000)=0x32) 00:24:46 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000180)={0x7f, 0x0, [0x140]}) 00:24:46 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x23}}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 237.943409] audit: type=1804 audit(1546475086.358:53): pid=9088 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir025141068/syzkaller.5Khzt8/20/bus" dev="sda1" ino=16593 res=1 [ 238.146371] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 00:24:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000001c0)=@srh={0xff, 0x2, 0x4, 0x1, 0x302, 0x40, 0x0, [@mcast1]}, 0x18) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r1, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) msgget(0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 00:24:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000001c0)=@srh={0xff, 0x2, 0x4, 0x1, 0x302, 0x40, 0x0, [@mcast1]}, 0x18) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r1, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) msgget(0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 00:24:46 executing program 0: r0 = shmget$private(0x0, 0x13000, 0x0, &(0x7f0000feb000/0x13000)=nil) r1 = shmat(r0, &(0x7f0000ff7000/0x1000)=nil, 0x7000) mremap(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffa000/0x1000)=nil) shmdt(r1) [ 238.497989] protocol 88fb is buggy, dev hsr_slave_0 [ 238.503277] protocol 88fb is buggy, dev hsr_slave_1 00:24:47 executing program 0: r0 = shmget$private(0x0, 0x13000, 0x0, &(0x7f0000feb000/0x13000)=nil) r1 = shmat(r0, &(0x7f0000ff7000/0x1000)=nil, 0x7000) mremap(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffa000/0x1000)=nil) shmdt(r1) 00:24:47 executing program 3: memfd_create(&(0x7f0000000000)='\x00\x00\x00\x00\x00\x00\x1c\x00\x00\x00C\x00\x00\x00\x00', 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000000)) [ 238.742872] protocol 88fb is buggy, dev hsr_slave_0 [ 238.748034] protocol 88fb is buggy, dev hsr_slave_1 [ 238.750228] protocol 88fb is buggy, dev hsr_slave_0 [ 238.759728] protocol 88fb is buggy, dev hsr_slave_1 00:24:47 executing program 0: r0 = shmget$private(0x0, 0x13000, 0x0, &(0x7f0000feb000/0x13000)=nil) r1 = shmat(r0, &(0x7f0000ff7000/0x1000)=nil, 0x7000) mremap(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffa000/0x1000)=nil) shmdt(r1) 00:24:47 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x8000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x2) gettid() ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000001c0)={r0, 0x0, 0x9, 0x0, 0x9}) set_tid_address(&(0x7f0000000240)) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f00000002c0), 0x4cc, 0x20007ffc) memfd_create(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000340)='./bus\x00', 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x8001, 0x4) fcntl$setstatus(r3, 0x4, 0x44000) io_setup(0x0, 0x0) write$P9_RCLUNK(r1, 0x0, 0x0) r4 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000140)={0x0, 0x4, 0x80000001, &(0x7f0000000100)=0x3}) keyctl$assume_authority(0x10, r4) r5 = creat(0x0, 0x0) ftruncate(r5, 0xbb1) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) 00:24:47 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x10001}, 0xffffff43) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$tipc(r1, &(0x7f0000000640)={&(0x7f0000000380), 0x10, 0x0}, 0x0) 00:24:47 executing program 0: r0 = shmget$private(0x0, 0x13000, 0x0, &(0x7f0000feb000/0x13000)=nil) r1 = shmat(r0, &(0x7f0000ff7000/0x1000)=nil, 0x7000) mremap(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffa000/0x1000)=nil) shmdt(r1) 00:24:47 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) eventfd2(0x4, 0x6f1d6eb313bb0d25) r0 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x8010000101) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x1) 00:24:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='nfs\x00\x1f#B\xbe;\x84\xbf\x88\x05 \b\xb5o\xc2\x1f\xd1\x14J$u\x9c\x02e\xba\xde\x89\xe1\x8c\xa7\x83\x023-.\xe4\b\xfb\xf50\x90\xd6\x14\x8a\xf4\f\xb3\xe3\xc3\xd4\xb4\xacE8\xb0\x99\x0f`\x90x;\xde\xf9\x9d\xe1\x10V\xa4O~k\xcf\xb3\xa9\xeb\xe9E\x90\x01\x84\xb9\x16\xa8J\xbe\xa8ao\xfby\xb0\x11\x98\x9bM>;\xa2-\x81y\xc7I\xd5\x1d\\N*\xc0\xa7\xec\x00\x9d\xb0\x96\xe7_G\x1aq\xdb\b\xf9!8v\xd2N\xf0I\xe3\x16r\x90\xfa\xec\xab\xc7I\x97hg\xda\xad\xff\x86>b\b\xba@5Gd\xe4\x05\xff)\x0f\'\x9f\x858h \x10h\f;@\"\xa7\xd0\x97\xb0\x9d06\xb9^\xee#\x99=\'M\xc5\xc9\'\xd0~\x1d\x003r>;\xcaq\xd4\\\x99\xcc3Xz/\xc6\xdf\xa6\xb0K\xaf\xf6\xbcH\xe1\v\x13:\xcb\x91h/\xd0x\x9a\xce\x1d\x8b\xd6\xbdf\xca\xae^\xea?\x97\x86\xca^\x0f\xad[Fy\xb1\x1f\x97\vf\xb2O\xd5$\\z%,\x1f\xba\xa2\xc4\xa4z\x1c]\x02\xa5\xf9\xe8+\xa1.P\xf9{\x1b<\xa1\xa1Z\"\x1f`', 0x0, &(0x7f0000000000)) [ 239.239233] audit: type=1804 audit(1546475087.658:54): pid=9139 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir025141068/syzkaller.5Khzt8/21/bus" dev="sda1" ino=16533 res=1 00:24:47 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x227c, 0x0) 00:24:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000001c0)=@srh={0xff, 0x2, 0x4, 0x1, 0x302, 0x40, 0x0, [@mcast1]}, 0x18) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r1, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) msgget(0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 00:24:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000001c0)=@srh={0xff, 0x2, 0x4, 0x1, 0x302, 0x40, 0x0, [@mcast1]}, 0x18) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r1, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) msgget(0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 00:24:48 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) close(r2) 00:24:48 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x227c, 0x0) [ 239.721945] audit: type=1400 audit(1546475088.138:55): avc: denied { name_bind } for pid=9156 comm="syz-executor0" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 239.850441] audit: type=1400 audit(1546475088.138:56): avc: denied { node_bind } for pid=9156 comm="syz-executor0" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 00:24:48 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2={0xff, 0x6}, 0x20}, 0x1c) 00:24:48 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x227c, 0x0) [ 239.896362] dccp_close: ABORT with 1061 bytes unread [ 239.996179] audit: type=1400 audit(1546475088.178:57): avc: denied { name_connect } for pid=9156 comm="syz-executor0" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 00:24:48 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x8000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x2) gettid() ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000001c0)={r0, 0x0, 0x9, 0x0, 0x9}) set_tid_address(&(0x7f0000000240)) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f00000002c0), 0x4cc, 0x20007ffc) memfd_create(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000340)='./bus\x00', 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x8001, 0x4) fcntl$setstatus(r3, 0x4, 0x44000) io_setup(0x0, 0x0) write$P9_RCLUNK(r1, 0x0, 0x0) r4 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000140)={0x0, 0x4, 0x80000001, &(0x7f0000000100)=0x3}) keyctl$assume_authority(0x10, r4) r5 = creat(0x0, 0x0) ftruncate(r5, 0xbb1) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) 00:24:48 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x227c, 0x0) 00:24:48 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket(0x11, 0x802, 0x0) setns(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) semget(0xffffffffffffffff, 0x0, 0x285) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000400)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x00\xff', 0x4bfd}) 00:24:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc) 00:24:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f000000afc0)=[{{0x0, 0x0, &(0x7f0000006940)=[{0x0}], 0x37c, 0x0, 0x8}}], 0x400000000000293, 0xe803, 0x0) 00:24:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc67a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) r1 = syz_open_dev$adsp(&(0x7f0000000640)='/dev/adsp#\x00', 0x80000001, 0x40202) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) io_setup(0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000900)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') arch_prctl$ARCH_SET_GS(0x1001, 0x101) r3 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) getsockopt$inet6_udp_int(r3, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000200)=0x4) sendfile(r3, r2, 0x0, 0x1000) getsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000240), &(0x7f00000002c0)=0x4) fcntl$setstatus(r3, 0x4, 0x86100) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) syz_open_dev$adsp(&(0x7f0000000540)='/dev/adsp#\x00', 0x7fff, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000180), 0x100000005) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendto$inet(r0, &(0x7f0000000980), 0x0, 0x800, 0x0, 0x0) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) [ 240.601063] audit: type=1804 audit(1546475089.018:58): pid=9191 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir025141068/syzkaller.5Khzt8/22/bus" dev="sda1" ino=16610 res=1 00:24:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000001c0)=@srh={0xff, 0x2, 0x4, 0x1, 0x302, 0x40, 0x0, [@mcast1]}, 0x18) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r1, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) msgget(0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 00:24:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000001c0)=@srh={0xff, 0x2, 0x4, 0x1, 0x302, 0x40, 0x0, [@mcast1]}, 0x18) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r1, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) msgget(0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 00:24:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc67a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) r1 = syz_open_dev$adsp(&(0x7f0000000640)='/dev/adsp#\x00', 0x80000001, 0x40202) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) io_setup(0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000900)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') arch_prctl$ARCH_SET_GS(0x1001, 0x101) r3 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) getsockopt$inet6_udp_int(r3, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000200)=0x4) sendfile(r3, r2, 0x0, 0x1000) getsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000240), &(0x7f00000002c0)=0x4) fcntl$setstatus(r3, 0x4, 0x86100) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) syz_open_dev$adsp(&(0x7f0000000540)='/dev/adsp#\x00', 0x7fff, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000180), 0x100000005) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendto$inet(r0, &(0x7f0000000980), 0x0, 0x800, 0x0, 0x0) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) 00:24:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc67a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) r1 = syz_open_dev$adsp(&(0x7f0000000640)='/dev/adsp#\x00', 0x80000001, 0x40202) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) io_setup(0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000900)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') arch_prctl$ARCH_SET_GS(0x1001, 0x101) r3 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) getsockopt$inet6_udp_int(r3, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000200)=0x4) sendfile(r3, r2, 0x0, 0x1000) getsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000240), &(0x7f00000002c0)=0x4) fcntl$setstatus(r3, 0x4, 0x86100) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) syz_open_dev$adsp(&(0x7f0000000540)='/dev/adsp#\x00', 0x7fff, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000180), 0x100000005) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendto$inet(r0, &(0x7f0000000980), 0x0, 0x800, 0x0, 0x0) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) 00:24:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000fe3)="441f08e30700000000000000fe36cef3e26def23000200000011000013", 0x1d) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)=""/37, &(0x7f0000000040)=0x25) [ 241.797521] device team0 entered promiscuous mode 00:24:50 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rfkill\x00', 0x101006, 0x0) r1 = memfd_create(&(0x7f0000000200)='em1\x00', 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="040056ca0002"], 0x6) write$P9_RWRITE(r1, &(0x7f00000000c0)={0xb, 0x77, 0xfffffffffffffffc}, 0xb) sendfile(r0, r1, &(0x7f0000000000), 0x800) [ 241.844397] device team_slave_0 entered promiscuous mode [ 241.858691] device team_slave_1 entered promiscuous mode [ 241.871222] 8021q: adding VLAN 0 to HW filter on device team0 00:24:50 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000140)={@my=0x0}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x0) dup3(r1, r0, 0x0) [ 242.147846] kasan: CONFIG_KASAN_INLINE enabled [ 242.148215] kasan: CONFIG_KASAN_INLINE enabled [ 242.152473] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 242.157050] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 242.164400] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 242.177965] CPU: 1 PID: -1861588088 Comm: R [ 242.177965] Not tainted 4.20.0+ #6 [ 242.185744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.195182] RIP: 0010:rb_erase+0x7b0/0x3550 [ 242.199497] Code: 89 a7 a0 fb ff ff 80 3c 1f 00 0f 85 25 23 00 00 48 c1 e9 03 48 89 c7 4d 89 66 10 48 c1 ef 03 c6 04 19 f8 4c 89 e1 48 83 c9 01 <80> 3c 1f 00 0f 85 54 23 00 00 48 89 08 4c 89 e1 48 c1 e9 03 80 3c [ 242.218390] RSP: 0018:ffff8880ae707698 EFLAGS: 00010082 [ 242.223746] RAX: 1c47e888753ca400 RBX: dffffc0000000000 RCX: ffff88807ccb78d9 [ 242.231018] RDX: 1ffff11015ce0edb RSI: ffffed1015ce0f07 RDI: 0388fd110ea79480 [ 242.238286] RBP: ffff8880ae707c00 R08: ffff88807ccb78e0 R09: ffff8880a9427470 [ 242.245551] R10: fffffbfff16d4c6d R11: ffffffff8b6a636b R12: ffff88807ccb78d8 [ 242.252812] R13: ffff8880ae725e00 R14: ffff8880a9427460 R15: ffff8880ae707bd8 [ 242.260097] FS: 0000000000000000(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 242.268315] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 242.274186] CR2: 0000000000000068 CR3: 00000000a48e9000 CR4: 00000000001406e0 [ 242.281450] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 242.288712] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 242.296158] Call Trace: [ 242.298729] [ 242.300900] ? __rb_erase_color+0x2780/0x2780 [ 242.305390] ? __lock_acquire+0x572/0x4a30 [ 242.309619] ? print_usage_bug+0xd0/0xd0 [ 242.313685] ? __cpu_to_node+0x7e/0xa0 [ 242.317574] ? mark_held_locks+0x100/0x100 [ 242.321826] ? lock_acquire+0x1db/0x570 [ 242.325801] ? print_usage_bug+0xd0/0xd0 [ 242.329860] ? pvclock_read_flags+0x160/0x160 [ 242.334354] ? trace_hardirqs_on_caller+0x310/0x310 [ 242.339369] ? print_usage_bug+0xd0/0xd0 [ 242.343426] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 242.348437] ? ktime_get+0x2d4/0x410 [ 242.352145] ? print_usage_bug+0xd0/0xd0 [ 242.356201] ? __lock_acquire+0x572/0x4a30 [ 242.360430] ? debug_object_activate+0x2b0/0x550 [ 242.365182] ? __lock_acquire+0x572/0x4a30 [ 242.369418] ? debug_object_deactivate+0x1d7/0x4b0 [ 242.374417] ? __asan_report_load4_noabort+0x14/0x20 [ 242.379528] ? _raw_spin_unlock_irqrestore+0x64/0xe0 [ 242.384633] ? __asan_report_load4_noabort+0x14/0x20 [ 242.389732] ? lockdep_hardirqs_off+0x273/0x2d0 [ 242.394404] ? trace_hardirqs_off+0xb8/0x310 [ 242.398810] ? kasan_check_read+0x11/0x20 [ 242.402953] ? do_raw_spin_unlock+0xa0/0x330 [ 242.407356] ? trace_hardirqs_on_caller+0x310/0x310 [ 242.412371] ? do_raw_spin_trylock+0x270/0x270 [ 242.416951] ? add_lock_to_list.isra.0+0x450/0x450 [ 242.421881] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 242.427474] ? debug_object_deactivate+0x1d7/0x4b0 [ 242.432397] ? clockevents_program_event+0x15f/0x380 [ 242.437494] ? debug_stats_show+0x100/0x100 [ 242.441813] ? clockevents_program_event+0x15f/0x380 [ 242.446947] timerqueue_del+0x86/0x150 [ 242.450832] __remove_hrtimer+0xa8/0x1c0 [ 242.454906] __hrtimer_run_queues+0x311/0x1050 [ 242.459495] ? hrtimer_start_range_ns+0xda0/0xda0 [ 242.464334] ? kvm_clock_read+0x18/0x30 [ 242.468306] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 242.473317] ? ktime_get_update_offsets_now+0x3d5/0x5e0 [ 242.478682] ? do_timer+0x50/0x50 [ 242.482134] ? rcu_softirq_qs+0x20/0x20 [ 242.486124] hrtimer_interrupt+0x314/0x770 [ 242.490370] smp_apic_timer_interrupt+0x18d/0x760 [ 242.495211] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 242.500052] ? smp_call_function_single_interrupt+0x640/0x640 [ 242.505932] ? trace_hardirqs_off+0x310/0x310 [ 242.510438] ? task_prio+0x50/0x50 [ 242.513979] ? check_preemption_disabled+0x48/0x290 [ 242.518993] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 242.523835] apic_timer_interrupt+0xf/0x20 [ 242.528060] [ 242.530287] Modules linked in: [ 242.533474] [ 242.533479] ====================================================== [ 242.533484] WARNING: possible circular locking dependency detected [ 242.533488] 4.20.0+ #6 Not tainted [ 242.533493] ------------------------------------------------------ [ 242.533498] syz-executor1/8509 is trying to acquire lock: [ 242.533501] 00000000dbbab0d5 ((console_sem).lock){-.-.}, at: down_trylock+0x13/0x70 [ 242.533515] [ 242.533518] but task is already holding lock: [ 242.533521] 00000000e947a71e (&obj_hash[i].lock){-.-.}, at: debug_object_deactivate+0x101/0x4b0 [ 242.533535] [ 242.533540] which lock already depends on the new lock. [ 242.533542] [ 242.533545] [ 242.533549] the existing dependency chain (in reverse order) is: [ 242.533552] [ 242.533554] -> #3 (&obj_hash[i].lock){-.-.}: [ 242.533567] _raw_spin_lock_irqsave+0x95/0xcd [ 242.533571] __debug_object_init+0xf6/0x12d0 [ 242.533575] debug_object_init+0x16/0x20 [ 242.533579] hrtimer_init+0x97/0x480 [ 242.533583] init_dl_task_timer+0x1b/0x50 [ 242.533586] __sched_fork+0x2bf/0x5b0 [ 242.533590] init_idle+0x75/0x670 [ 242.533594] sched_init+0xb10/0xbe8 [ 242.533597] start_kernel+0x445/0x8bd [ 242.533601] x86_64_start_reservations+0x29/0x2b [ 242.533605] x86_64_start_kernel+0x77/0x7b [ 242.533609] secondary_startup_64+0xa4/0xb0 [ 242.533612] [ 242.533614] -> #2 (&rq->lock){-.-.}: [ 242.533627] _raw_spin_lock+0x2f/0x40 [ 242.533630] task_fork_fair+0xb5/0x7a0 [ 242.533634] sched_fork+0x437/0xb90 [ 242.533638] copy_process+0x1ff6/0x8730 [ 242.533641] _do_fork+0x1a9/0x1170 [ 242.533645] kernel_thread+0x34/0x40 [ 242.533648] rest_init+0x28/0x37b [ 242.533652] arch_call_rest_init+0xe/0x1b [ 242.533656] start_kernel+0x882/0x8bd [ 242.533660] x86_64_start_reservations+0x29/0x2b [ 242.533664] x86_64_start_kernel+0x77/0x7b [ 242.533668] secondary_startup_64+0xa4/0xb0 [ 242.533670] [ 242.533672] -> #1 (&p->pi_lock){-.-.}: [ 242.533686] _raw_spin_lock_irqsave+0x95/0xcd [ 242.533689] try_to_wake_up+0xb9/0x1480 [ 242.533693] wake_up_process+0x10/0x20 [ 242.533697] __up.isra.0+0x1c0/0x2a0 [ 242.533700] up+0x13e/0x1c0 [ 242.533704] __up_console_sem+0xb7/0x1c0 [ 242.533708] console_unlock+0x778/0x11e0 [ 242.533711] vprintk_emit+0x370/0x960 [ 242.533715] dev_vprintk_emit+0x25d/0x560 [ 242.533719] dev_printk_emit+0xbb/0xf0 [ 242.533722] __dev_printk+0xa9/0x110 [ 242.533726] _dev_warn+0x10a/0x160 [ 242.533730] _request_firmware+0xe6b/0x15c0 [ 242.533734] request_firmware_work_func+0xf1/0x2f0 [ 242.533738] process_one_work+0xd0c/0x1ce0 [ 242.533742] worker_thread+0x143/0x14a0 [ 242.533745] kthread+0x357/0x430 [ 242.533749] ret_from_fork+0x3a/0x50 [ 242.533751] [ 242.533754] -> #0 ((console_sem).lock){-.-.}: [ 242.533774] lock_acquire+0x1db/0x570 [ 242.533778] _raw_spin_lock_irqsave+0x95/0xcd [ 242.533782] down_trylock+0x13/0x70 [ 242.533786] __down_trylock_console_sem+0xa8/0x210 [ 242.533790] console_trylock+0x15/0xa0 [ 242.533793] vprintk_emit+0x351/0x960 [ 242.533797] vprintk_default+0x28/0x30 [ 242.533801] vprintk_func+0x7e/0x189 [ 242.533804] printk+0xba/0xed [ 242.533808] kasan_die_handler.cold+0x11/0x23 [ 242.533812] notifier_call_chain+0x179/0x380 [ 242.533816] atomic_notifier_call_chain+0x96/0x190 [ 242.533820] notify_die+0x1b2/0x270 [ 242.533824] do_general_protection+0x13d/0x300 [ 242.533828] general_protection+0x1e/0x30 [ 242.533832] debug_object_deactivate+0x16c/0x4b0 [ 242.533836] __hrtimer_run_queues+0x225/0x1050 [ 242.533840] hrtimer_interrupt+0x314/0x770 [ 242.533845] smp_apic_timer_interrupt+0x18d/0x760 [ 242.533849] apic_timer_interrupt+0xf/0x20 [ 242.533853] _raw_spin_unlock_irq+0x54/0x90 [ 242.533857] finish_task_switch+0x1e9/0xac0 [ 242.533860] __schedule+0x89f/0x1e90 [ 242.533864] schedule+0xfe/0x350 [ 242.533868] do_nanosleep+0x208/0x750 [ 242.533871] hrtimer_nanosleep+0x2e4/0x640 [ 242.533875] __x64_sys_nanosleep+0x1e0/0x280 [ 242.533879] do_syscall_64+0x1a3/0x800 [ 242.533884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.533886] [ 242.533890] other info that might help us debug this: [ 242.533892] [ 242.533895] Chain exists of: [ 242.533898] (console_sem).lock --> &rq->lock --> &obj_hash[i].lock [ 242.533914] [ 242.533918] Possible unsafe locking scenario: [ 242.533920] [ 242.533924] CPU0 CPU1 [ 242.533928] ---- ---- [ 242.533931] lock(&obj_hash[i].lock); [ 242.533939] lock(&rq->lock); [ 242.533948] lock(&obj_hash[i].lock); [ 242.533956] lock((console_sem).lock); [ 242.533963] [ 242.533966] *** DEADLOCK *** [ 242.533968] [ 242.533972] 3 locks held by syz-executor1/8509: [ 242.533975] #0: 00000000df9a0e7b (hrtimer_bases.lock){-.-.}, at: hrtimer_interrupt+0xff/0x770 [ 242.533991] #1: 00000000e947a71e (&obj_hash[i].lock){-.-.}, at: debug_object_deactivate+0x101/0x4b0 [ 242.534007] #2: 0000000064b5e2dd (rcu_read_lock){....}, at: atomic_notifier_call_chain+0x0/0x190 [ 242.534023] [ 242.534026] stack backtrace: [ 242.534031] CPU: 0 PID: 8509 Comm: syz-executor1 Not tainted 4.20.0+ #6 [ 242.534038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.534041] Call Trace: [ 242.534044] [ 242.534047] dump_stack+0x1db/0x2d0 [ 242.534052] ? dump_stack_print_info.cold+0x20/0x20 [ 242.534055] ? print_stack_trace+0x77/0xb0 [ 242.534059] ? vprintk_func+0x86/0x189 [ 242.534064] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 242.534067] __lock_acquire+0x3014/0x4a30 [ 242.534071] ? mark_held_locks+0x100/0x100 [ 242.534076] ? __update_load_avg_blocked_se+0x670/0x670 [ 242.534080] ? update_load_avg+0x2f8/0x23b0 [ 242.534084] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 242.534088] ? add_lock_to_list.isra.0+0x450/0x450 [ 242.534093] ? pvclock_read_flags+0x160/0x160 [ 242.534096] lock_acquire+0x1db/0x570 [ 242.534100] ? down_trylock+0x13/0x70 [ 242.534104] ? lock_release+0xc40/0xc40 [ 242.534108] ? trace_hardirqs_on_caller+0x310/0x310 [ 242.534112] ? trace_hardirqs_off+0xb8/0x310 [ 242.534116] _raw_spin_lock_irqsave+0x95/0xcd [ 242.534120] ? down_trylock+0x13/0x70 [ 242.534123] ? vprintk_emit+0x351/0x960 [ 242.534127] down_trylock+0x13/0x70 [ 242.534131] ? vprintk_emit+0x351/0x960 [ 242.534135] __down_trylock_console_sem+0xa8/0x210 [ 242.534139] console_trylock+0x15/0xa0 [ 242.534142] vprintk_emit+0x351/0x960 [ 242.534146] ? wake_up_klogd+0x180/0x180 [ 242.534150] ? __enqueue_entity+0x14f/0x230 [ 242.534154] ? print_usage_bug+0xd0/0xd0 [ 242.534158] ? add_lock_to_list.isra.0+0x450/0x450 [ 242.534162] vprintk_default+0x28/0x30 [ 242.534165] vprintk_func+0x7e/0x189 [ 242.534169] printk+0xba/0xed [ 242.534173] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 242.534177] ? print_usage_bug+0xd0/0xd0 [ 242.534181] ? kasan_die_handler.cold+0x5/0x23 [ 242.534185] ? kasan_die_handler+0x1a/0x31 [ 242.534189] kasan_die_handler.cold+0x11/0x23 [ 242.534193] notifier_call_chain+0x179/0x380 [ 242.534197] ? unregister_die_notifier+0x30/0x30 [ 242.534200] ? rcu_softirq_qs+0x20/0x20 [ 242.534204] ? rcu_softirq_qs+0x20/0x20 [ 242.534208] atomic_notifier_call_chain+0x96/0x190 [ 242.534212] notify_die+0x1b2/0x270 [ 242.534217] ? __atomic_notifier_call_chain+0x1a0/0x1a0 [ 242.534221] ? debug_object_deactivate+0x16c/0x4b0 [ 242.534225] ? debug_object_deactivate+0x16c/0x4b0 [ 242.534229] ? search_exception_tables+0x49/0x50 [ 242.534233] ? fixup_exception+0xad/0xe0 [ 242.534237] do_general_protection+0x13d/0x300 [ 242.534241] general_protection+0x1e/0x30 [ 242.534246] RIP: 0010:debug_object_deactivate+0x16c/0x4b0 [ 242.534257] Code: c1 ea 03 42 80 3c 2a 00 0f 85 49 02 00 00 4d 8b 24 24 4d 85 e4 0f 84 d1 00 00 00 49 8d 7c 24 18 83 c3 01 48 89 fa 48 c1 ea 03 <42> 80 3c 2a 00 0f 85 fa 01 00 00 49 3b 4c 24 18 75 c0 49 8d 7c 24 [ 242.534262] RSP: 0018:ffff8880ae607b80 EFLAGS: 00010006 [ 242.534274] RAX: 1ffffffff16dbb64 RBX: 0000000000000004 RCX: ffff8880ae626620 [ 242.534280] RDX: 0000000000000003 RSI: 0000000000000004 RDI: 0000000000000019 [ 242.534286] RBP: ffff8880ae607c70 R08: 1ffff11015cc0f5c R09: ffffffff899ad160 [ 242.534291] R10: 0000000000000086 R11: 0000000000000003 R12: 0000000000000001 [ 242.534297] R13: dffffc0000000000 R14: 1ffff11015cc0f74 R15: ffffffff8b6ddb28 [ 242.534301] ? clockevents_program_event+0x15f/0x380 [ 242.534305] ? debug_stats_show+0x100/0x100 [ 242.534309] ? __lock_is_held+0xb6/0x140 [ 242.534313] __hrtimer_run_queues+0x225/0x1050 [ 242.534317] ? trace_hardirqs_on_caller+0x310/0x310 [ 242.534321] ? hrtimer_start_range_ns+0xda0/0xda0 [ 242.534325] ? kvm_clock_read+0x18/0x30 [ 242.534329] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 242.534334] ? ktime_get_update_offsets_now+0x3d5/0x5e0 [ 242.534337] ? do_timer+0x50/0x50 [ 242.534341] ? rcu_softirq_qs+0x20/0x20 [ 242.534345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.534349] hrtimer_interrupt+0x314/0x770 [ 242.534354] smp_apic_timer_interrupt+0x18d/0x760 [ 242.534358] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 242.534362] ? smp_call_function_single_interrupt+0x640/0x640 [ 242.534367] ? trace_hardirqs_off+0x310/0x310 [ 242.534370] ? task_prio+0x50/0x50 [ 242.534375] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 242.534379] ? check_preemption_disabled+0x48/0x290 [ 242.534383] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 242.534387] apic_timer_interrupt+0xf/0x20 [ 242.534390] [ 242.534394] RIP: 0010:_raw_spin_unlock_irq+0x54/0x90 [ 242.534406] Code: c0 40 4f 92 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 33 48 83 3d 85 5b 9f 01 00 74 20 fb 66 0f 1f 44 00 00 01 00 00 00 e8 82 c3 64 f9 65 8b 05 fb f9 0e 78 85 c0 74 06 41 [ 242.534410] RSP: 0018:ffff888093957888 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 242.534419] RAX: 1ffffffff13249e8 RBX: 1ffff1101272af1a RCX: 0000000000000000 [ 242.534425] RDX: dffffc0000000000 RSI: 0000000000000001 RDI: ffff8880979fac7c [ 242.534430] RBP: ffff888093957890 R08: ffff8880979fa400 R09: 0000000000000000 [ 242.534436] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880ae62ce00 [ 242.534441] R13: ffff88809df9c040 R14: ffff88807ab06780 R15: ffff888093957950 [ 242.534445] ? _raw_spin_unlock_irq+0x28/0x90 [ 242.534449] finish_task_switch+0x1e9/0xac0 [ 242.534453] ? finish_task_switch+0x1a8/0xac0 [ 242.534457] ? __switch_to_asm+0x34/0x70 [ 242.534459] ? __swit [ 242.534466] Lost 50 message(s)! [ 243.546224] ---[ end trace e47dcfc1ee5ed8ea ]--- [ 243.546236] general protection fault: 0000 [#2] PREEMPT SMP KASAN [ 243.546251] CPU: 0 PID: 8509 Comm: syz-executor1 Tainted: G D 4.20.0+ #6 [ 243.550996] RIP: 0010:rb_erase+0x7b0/0x3550 [ 243.557214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.565344] Code: 89 a7 a0 fb ff ff 80 3c 1f 00 0f 85 25 23 00 00 48 c1 e9 03 48 89 c7 4d 89 66 10 48 c1 ef 03 c6 04 19 f8 4c 89 e1 48 83 c9 01 <80> 3c 1f 00 0f 85 54 23 00 00 48 89 08 4c 89 e1 48 c1 e9 03 80 3c [ 243.569657] RIP: 0010:debug_object_deactivate+0x16c/0x4b0 [ 243.578982] RSP: 0018:ffff8880ae707698 EFLAGS: 00010082 [ 243.597885] Code: c1 ea 03 42 80 3c 2a 00 0f 85 49 02 00 00 4d 8b 24 24 4d 85 e4 0f 84 d1 00 00 00 49 8d 7c 24 18 83 c3 01 48 89 fa 48 c1 ea 03 <42> 80 3c 2a 00 0f 85 fa 01 00 00 49 3b 4c 24 18 75 c0 49 8d 7c 24 [ 243.603414] RAX: 1c47e888753ca400 RBX: dffffc0000000000 RCX: ffff88807ccb78d9 [ 243.608773] RSP: 0018:ffff8880ae607b80 EFLAGS: 00010006 [ 243.627662] RDX: 1ffff11015ce0edb RSI: ffffed1015ce0f07 RDI: 0388fd110ea79480 [ 243.634917] RAX: 1ffffffff16dbb64 RBX: 0000000000000004 RCX: ffff8880ae626620 [ 243.640264] RBP: ffff8880ae707c00 R08: ffff88807ccb78e0 R09: ffff8880a9427470 [ 243.647531] RDX: 0000000000000003 RSI: 0000000000000004 RDI: 0000000000000019 [ 243.654787] R10: fffffbfff16d4c6d R11: ffffffff8b6a636b R12: ffff88807ccb78d8 [ 243.662039] RBP: ffff8880ae607c70 R08: 1ffff11015cc0f5c R09: ffffffff899ad160 [ 243.669296] R13: ffff8880ae725e00 R14: ffff8880a9427460 R15: ffff8880ae707bd8 [ 243.676548] R10: 0000000000000086 R11: 0000000000000003 R12: 0000000000000001 [ 243.683807] FS: 0000000000000000(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 243.691060] R13: dffffc0000000000 R14: 1ffff11015cc0f74 R15: ffffffff8b6ddb28 [ 243.698312] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 243.706522] FS: 000000000267c940(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 243.713776] CR2: 0000000000000068 CR3: 00000000a48e9000 CR4: 00000000001406e0 [ 243.713786] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 243.719653] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 243.727860] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 243.735118] CR2: 00007f678ca7b000 CR3: 0000000096054000 CR4: 00000000001406f0 [ 243.742371] Kernel panic - not syncing: Fatal exception in interrupt [ 243.748237] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 243.776482] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 243.783742] Call Trace: [ 243.786329] [ 243.788478] ? clockevents_program_event+0x15f/0x380 [ 243.793585] ? debug_stats_show+0x100/0x100 [ 243.797907] ? __lock_is_held+0xb6/0x140 [ 243.801974] __hrtimer_run_queues+0x225/0x1050 [ 243.806556] ? trace_hardirqs_on_caller+0x310/0x310 [ 243.811573] ? hrtimer_start_range_ns+0xda0/0xda0 [ 243.816418] ? kvm_clock_read+0x18/0x30 [ 243.820392] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 243.825403] ? ktime_get_update_offsets_now+0x3d5/0x5e0 [ 243.830775] ? do_timer+0x50/0x50 [ 243.834225] ? rcu_softirq_qs+0x20/0x20 [ 243.838194] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.843733] hrtimer_interrupt+0x314/0x770 [ 243.847984] smp_apic_timer_interrupt+0x18d/0x760 [ 243.852825] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 243.857663] ? smp_call_function_single_interrupt+0x640/0x640 [ 243.863540] ? trace_hardirqs_off+0x310/0x310 [ 243.868030] ? task_prio+0x50/0x50 [ 243.871567] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 243.877101] ? check_preemption_disabled+0x48/0x290 [ 243.882114] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 243.886957] apic_timer_interrupt+0xf/0x20 [ 243.891179] [ 243.893413] RIP: 0010:_raw_spin_unlock_irq+0x54/0x90 [ 243.898522] Code: c0 40 4f 92 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 33 48 83 3d 85 5b 9f 01 00 74 20 fb 66 0f 1f 44 00 00 01 00 00 00 e8 82 c3 64 f9 65 8b 05 fb f9 0e 78 85 c0 74 06 41 [ 243.917421] RSP: 0018:ffff888093957888 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 243.925125] RAX: 1ffffffff13249e8 RBX: 1ffff1101272af1a RCX: 0000000000000000 [ 243.932386] RDX: dffffc0000000000 RSI: 0000000000000001 RDI: ffff8880979fac7c [ 243.939648] RBP: ffff888093957890 R08: ffff8880979fa400 R09: 0000000000000000 [ 243.946910] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880ae62ce00 [ 243.954177] R13: ffff88809df9c040 R14: ffff88807ab06780 R15: ffff888093957950 [ 243.961464] ? _raw_spin_unlock_irq+0x28/0x90 [ 243.965956] finish_task_switch+0x1e9/0xac0 [ 243.970272] ? finish_task_switch+0x1a8/0xac0 [ 243.974780] ? __switch_to_asm+0x34/0x70 [ 243.978841] ? __switch_to_asm+0x40/0x70 [ 243.982899] ? __switch_to_asm+0x34/0x70 [ 243.986986] ? preempt_notifier_register+0x200/0x200 [ 243.992083] ? __switch_to_asm+0x34/0x70 [ 243.996137] ? __switch_to_asm+0x40/0x70 [ 244.000221] ? __switch_to_asm+0x34/0x70 [ 244.004294] ? __switch_to_asm+0x34/0x70 [ 244.008359] ? __switch_to_asm+0x34/0x70 [ 244.012412] ? __switch_to_asm+0x40/0x70 [ 244.016465] ? __switch_to_asm+0x34/0x70 [ 244.020518] ? __switch_to_asm+0x40/0x70 [ 244.024576] ? __switch_to_asm+0x34/0x70 [ 244.028637] ? __switch_to_asm+0x40/0x70 [ 244.032698] __schedule+0x89f/0x1e90 [ 244.036407] ? lockdep_hardirqs_on+0x415/0x5d0 [ 244.041022] ? pci_mmcfg_check_reserved+0x170/0x170 [ 244.046044] ? lock_hrtimer_base.isra.0+0x75/0x130 [ 244.050969] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.056506] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 244.061623] schedule+0xfe/0x350 [ 244.064999] ? __hrtimer_get_remaining+0x1e0/0x1e0 [ 244.069925] ? __schedule+0x1e90/0x1e90 [ 244.073904] ? debug_object_free+0x5f0/0x5f0 [ 244.078314] do_nanosleep+0x208/0x750 [ 244.082115] ? schedule_timeout_idle+0x90/0x90 [ 244.086691] ? lock_downgrade+0x910/0x910 [ 244.090843] ? memset+0x32/0x40 [ 244.094117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.099651] ? __hrtimer_init+0xe1/0x250 [ 244.103713] hrtimer_nanosleep+0x2e4/0x640 [ 244.107945] ? nanosleep_copyout+0x110/0x110 [ 244.112376] ? clock_was_set_work+0x30/0x30 [ 244.116694] ? __schedule+0x1e90/0x1e90 [ 244.120667] ? do_syscall_64+0x8c/0x800 [ 244.124637] ? do_syscall_64+0x8c/0x800 [ 244.128616] __x64_sys_nanosleep+0x1e0/0x280 [ 244.133022] ? hrtimer_nanosleep+0x640/0x640 [ 244.137436] do_syscall_64+0x1a3/0x800 [ 244.141331] ? syscall_return_slowpath+0x5f0/0x5f0 [ 244.146262] ? prepare_exit_to_usermode+0x232/0x3b0 [ 244.151279] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 244.156130] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.161311] RIP: 0033:0x485540 [ 244.164501] Code: 00 00 48 c7 c0 d4 ff ff ff 64 c7 00 16 00 00 00 31 c0 eb be 66 0f 1f 44 00 00 83 3d 11 12 5d 00 00 75 14 b8 23 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 c4 e0 f8 ff c3 48 83 ec 08 e8 3a 55 fd ff [ 244.183399] RSP: 002b:00007ffe0aa7bba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000023 [ 244.191100] RAX: ffffffffffffffda RBX: 000000000003b1ad RCX: 0000000000485540 [ 244.198371] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007ffe0aa7bbb0 [ 244.205632] RBP: 0000000000000042 R08: 0000000000000001 R09: 000000000267c940 [ 244.212893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 244.220155] R13: 000000000003b15c R14: 0000000000000019 R15: 0000000000000001 [ 244.227433] Modules linked in: [ 244.230626] ---[ end trace e47dcfc1ee5ed8eb ]--- [ 244.235388] RIP: 0010:rb_erase+0x7b0/0x3550 [ 244.239719] Code: 89 a7 a0 fb ff ff 80 3c 1f 00 0f 85 25 23 00 00 48 c1 e9 03 48 89 c7 4d 89 66 10 48 c1 ef 03 c6 04 19 f8 4c 89 e1 48 83 c9 01 <80> 3c 1f 00 0f 85 54 23 00 00 48 89 08 4c 89 e1 48 c1 e9 03 80 3c [ 244.258633] RSP: 0018:ffff8880ae707698 EFLAGS: 00010082 [ 244.263992] RAX: 1c47e888753ca400 RBX: dffffc0000000000 RCX: ffff88807ccb78d9 [ 244.271255] RDX: 1ffff11015ce0edb RSI: ffffed1015ce0f07 RDI: 0388fd110ea79480 [ 244.278522] RBP: ffff8880ae707c00 R08: ffff88807ccb78e0 R09: ffff8880a9427470 [ 244.285792] R10: fffffbfff16d4c6d R11: ffffffff8b6a636b R12: ffff88807ccb78d8 [ 244.293067] R13: ffff8880ae725e00 R14: ffff8880a9427460 R15: ffff8880ae707bd8 [ 244.300787] FS: 000000000267c940(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 244.309007] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 244.314884] CR2: 00007f678ca7b000 CR3: 0000000096054000 CR4: 00000000001406f0 [ 244.322147] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 244.329413] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 244.889874] Shutting down cpus with NMI [ 244.894929] Kernel Offset: disabled [ 244.898552] Rebooting in 86400 seconds..