[ 37.033441][ T26] audit: type=1800 audit(1550668996.761:26): pid=7655 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 37.059762][ T26] audit: type=1800 audit(1550668996.771:27): pid=7655 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 37.092681][ T26] audit: type=1800 audit(1550668996.771:28): pid=7655 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 37.853718][ T26] audit: type=1800 audit(1550668997.621:29): pid=7655 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.194' (ECDSA) to the list of known hosts. 2019/02/20 13:23:26 fuzzer started 2019/02/20 13:23:29 dialing manager at 10.128.0.26:33245 2019/02/20 13:23:29 syscalls: 1 2019/02/20 13:23:29 code coverage: enabled 2019/02/20 13:23:29 comparison tracing: enabled 2019/02/20 13:23:29 extra coverage: extra coverage is not supported by the kernel 2019/02/20 13:23:29 setuid sandbox: enabled 2019/02/20 13:23:29 namespace sandbox: enabled 2019/02/20 13:23:29 Android sandbox: /sys/fs/selinux/policy does not exist 2019/02/20 13:23:29 fault injection: enabled 2019/02/20 13:23:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/02/20 13:23:29 net packet injection: enabled 2019/02/20 13:23:29 net device setup: enabled 13:26:14 executing program 0: syzkaller login: [ 214.719608][ T7821] IPVS: ftp: loaded support on port[0] = 21 13:26:14 executing program 1: [ 214.860947][ T7821] chnl_net:caif_netlink_parms(): no params data found [ 214.952118][ T7824] IPVS: ftp: loaded support on port[0] = 21 [ 214.965216][ T7821] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.979488][ T7821] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.988574][ T7821] device bridge_slave_0 entered promiscuous mode [ 215.011203][ T7821] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.018811][ T7821] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.026927][ T7821] device bridge_slave_1 entered promiscuous mode 13:26:14 executing program 2: [ 215.079122][ T7821] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 215.089692][ T7821] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 215.148654][ T7821] team0: Port device team_slave_0 added [ 215.161500][ T7821] team0: Port device team_slave_1 added 13:26:15 executing program 3: [ 215.301147][ T7821] device hsr_slave_0 entered promiscuous mode [ 215.367509][ T7821] device hsr_slave_1 entered promiscuous mode [ 215.433994][ T7827] IPVS: ftp: loaded support on port[0] = 21 [ 215.462849][ T7821] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.470187][ T7821] bridge0: port 2(bridge_slave_1) entered forwarding state 13:26:15 executing program 4: [ 215.478141][ T7821] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.485228][ T7821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.496802][ T7829] IPVS: ftp: loaded support on port[0] = 21 [ 215.553174][ T7824] chnl_net:caif_netlink_parms(): no params data found [ 215.706630][ T7821] 8021q: adding VLAN 0 to HW filter on device bond0 13:26:15 executing program 5: [ 215.783643][ T7824] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.791547][ T7824] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.808805][ T7824] device bridge_slave_0 entered promiscuous mode [ 215.816523][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.830226][ T2986] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.841895][ T2986] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.851686][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 215.866318][ T7821] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.887824][ T7824] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.894924][ T7824] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.906999][ T7832] IPVS: ftp: loaded support on port[0] = 21 [ 215.917279][ T7824] device bridge_slave_1 entered promiscuous mode [ 216.015692][ T7824] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 216.026105][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.035058][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.043510][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.050578][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.064135][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.074103][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.082687][ T3479] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.089796][ T3479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.100010][ T7829] chnl_net:caif_netlink_parms(): no params data found [ 216.109017][ T7827] chnl_net:caif_netlink_parms(): no params data found [ 216.120908][ T7824] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.134193][ T7835] IPVS: ftp: loaded support on port[0] = 21 [ 216.147700][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.179955][ T7824] team0: Port device team_slave_0 added [ 216.212657][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.221619][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.230843][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.241501][ T7824] team0: Port device team_slave_1 added [ 216.276218][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.305824][ T7829] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.313462][ T7829] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.321759][ T7829] device bridge_slave_0 entered promiscuous mode [ 216.333606][ T7829] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.341495][ T7829] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.349849][ T7829] device bridge_slave_1 entered promiscuous mode [ 216.380696][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.391506][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.400610][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.409325][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.418613][ T7827] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.425687][ T7827] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.433874][ T7827] device bridge_slave_0 entered promiscuous mode [ 216.447648][ T7827] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.454736][ T7827] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.462856][ T7827] device bridge_slave_1 entered promiscuous mode [ 216.495838][ T7829] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 216.511445][ T7829] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.534283][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.542607][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.591169][ T7824] device hsr_slave_0 entered promiscuous mode [ 216.647665][ T7824] device hsr_slave_1 entered promiscuous mode [ 216.697056][ T7827] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 216.709813][ T7829] team0: Port device team_slave_0 added [ 216.716728][ T7827] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.765270][ T7829] team0: Port device team_slave_1 added [ 216.772561][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.788207][ T7827] team0: Port device team_slave_0 added [ 216.795267][ T7827] team0: Port device team_slave_1 added [ 216.824583][ T7832] chnl_net:caif_netlink_parms(): no params data found [ 216.890845][ T7829] device hsr_slave_0 entered promiscuous mode [ 216.937425][ T7829] device hsr_slave_1 entered promiscuous mode [ 217.058945][ T7827] device hsr_slave_0 entered promiscuous mode [ 217.117442][ T7827] device hsr_slave_1 entered promiscuous mode [ 217.227782][ T7835] chnl_net:caif_netlink_parms(): no params data found [ 217.259968][ T7832] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.267114][ T7832] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.275320][ T7832] device bridge_slave_0 entered promiscuous mode [ 217.299318][ T7821] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.322786][ T7832] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.333391][ T7832] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.341326][ T7832] device bridge_slave_1 entered promiscuous mode [ 217.422997][ T7832] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 217.445083][ T7835] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.463368][ T7835] bridge0: port 1(bridge_slave_0) entered disabled state 13:26:17 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) [ 217.471901][ T7835] device bridge_slave_0 entered promiscuous mode [ 217.486020][ T7835] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.493437][ T7835] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.501697][ T7835] device bridge_slave_1 entered promiscuous mode [ 217.517639][ T7832] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 217.540778][ T7824] 8021q: adding VLAN 0 to HW filter on device bond0 13:26:17 executing program 0: 13:26:17 executing program 0: [ 217.613827][ T7835] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 217.630771][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.642756][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.655967][ T7824] 8021q: adding VLAN 0 to HW filter on device team0 13:26:17 executing program 0: [ 217.676752][ T7827] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.696367][ T7832] team0: Port device team_slave_0 added [ 217.709987][ T7832] team0: Port device team_slave_1 added 13:26:17 executing program 0: [ 217.720335][ T7835] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 217.744626][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.760284][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.769228][ T2986] bridge0: port 1(bridge_slave_0) entered blocking state 13:26:17 executing program 0: [ 217.776302][ T2986] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.806655][ T7827] 8021q: adding VLAN 0 to HW filter on device team0 13:26:17 executing program 0: [ 217.855577][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.868030][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.878060][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.886665][ T2986] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.893813][ T2986] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.903295][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.911641][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.934111][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.947973][ T7835] team0: Port device team_slave_0 added [ 218.020572][ T7832] device hsr_slave_0 entered promiscuous mode [ 218.057425][ T7832] device hsr_slave_1 entered promiscuous mode [ 218.098596][ T7835] team0: Port device team_slave_1 added [ 218.111983][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.120973][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.129722][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.138378][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.145420][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.153070][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.161760][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.170606][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.178542][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.201453][ T7829] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.214894][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.224887][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.234270][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.241399][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.249329][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.258128][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.265693][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.278322][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.290619][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.304130][ T7829] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.315995][ T7824] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 218.326859][ T7824] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 218.365609][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.374256][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.383498][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.392241][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.401015][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.410603][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.419204][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.427615][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.435985][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.444804][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.452501][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.500050][ T7835] device hsr_slave_0 entered promiscuous mode [ 218.557583][ T7835] device hsr_slave_1 entered promiscuous mode [ 218.603041][ T7827] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 218.614296][ T7827] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 218.639723][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.648272][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.656493][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.664876][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.673160][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.690561][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.699242][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.707683][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.714721][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.722550][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.731004][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.739371][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.746404][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.754359][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.777468][ T7824] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.810826][ T7827] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.820996][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.830046][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.839708][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.848986][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.857446][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.883619][ T7832] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.898017][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.907039][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.916242][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.925032][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.947992][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.955729][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.980100][ T7829] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 218.998520][ T7829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 219.028859][ T7832] 8021q: adding VLAN 0 to HW filter on device team0 13:26:18 executing program 1: 13:26:18 executing program 2: [ 219.057380][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.065758][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.127088][ T7835] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.147761][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.172815][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.189875][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.196987][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.208002][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.216522][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.225757][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.232876][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.241489][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.250148][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.268442][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.276416][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.285800][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.294237][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.303190][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.311589][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.320694][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.331175][ T7829] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.344005][ T7832] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 219.356222][ T7832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 219.364524][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.372963][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.381655][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.390371][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.398802][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.419507][ T7835] 8021q: adding VLAN 0 to HW filter on device team0 13:26:19 executing program 3: [ 219.482341][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.503389][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.525853][ T2986] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.533047][ T2986] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.544065][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.553230][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.562323][ T2986] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.569434][ T2986] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.576986][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.585609][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.595822][ T7832] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.608553][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.616840][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.626294][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.648398][ T7835] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 219.659489][ T7835] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 219.671882][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.686490][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.697781][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.706106][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.715626][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.724670][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.733624][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.742774][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 13:26:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$describe(0x6, r0, &(0x7f0000000340)=""/184, 0xb8) [ 219.795525][ T7835] 8021q: adding VLAN 0 to HW filter on device batadv0 13:26:19 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f"], 0x1) sendto$inet(r0, &(0x7f00000001c0)="023938f7d62a0db6c5f5d205f1944a1987535e232123fd94b1176197c394e78131178c6a9486e389e48a142b2e89ed4c06ef8f089dfc7dd7ec56e716bc3a8f8a6d363f3fe543c1f27d364db696f05eada57b89e0518a9501ea877d24ff2c74dd030aac397ccdf36c15e3383e106db854c65b58ed0d8461de95c2979a0447e52509f78d1597412bb1571ec7e5c71c70b759af247ab81ca641edbe014e5bdc03301d232f598c589b0a369bc214ccf75a8059dbef64bf41f1625c37149919e7316f2eb2772aa97a82ba0cfcee5ccad85590", 0xd0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000500)=ANY=[], 0x389) 13:26:19 executing program 0: 13:26:19 executing program 1: 13:26:19 executing program 2: 13:26:19 executing program 3: unshare(0x600) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") ioctl$int_in(r0, 0x80001080044d76, &(0x7f0000000000)) [ 219.873977][ C0] hrtimer: interrupt took 52551 ns 13:26:19 executing program 4: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000040)=0x1e) 13:26:19 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0xa4ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x2, 0x3, 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}, 0x20) 13:26:19 executing program 2: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) listxattr(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000200)="b8010000000f01d965660faeb603000000b8358556370f23c80f21f8350400d0000f23f8640fc7ae02000000ea00600000fa00c4c18566220f20d835080000000f22d8360f01cf66baf80cb83bd30c85ef66bafc0cb06aee0fc7b49f0a000000", 0x60}], 0x1, 0x5, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000440)='/dev/bus/usb/00#/00#\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000380)=""/190) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:26:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x40000000000005, 0x80, 0x6c9f, 0x6, 0x0, 0x1}, 0xe) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x1e) socketpair$unix(0x1, 0x800000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x1e) 13:26:19 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregs(0xc, r1, 0x0, 0x0) 13:26:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="05"], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) [ 220.113001][ T7905] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 13:26:19 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x1a8, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x220) 13:26:19 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 13:26:20 executing program 0: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) 13:26:20 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',lowerdir=.:file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0xa88820, 0x0) [ 220.269351][ T7922] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 13:26:20 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x1a8, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x220) 13:26:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000302ff03000000080000000000000000"], 0x14}}, 0x0) 13:26:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f00000002c0), 0x182) 13:26:20 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) write$P9_RLOPEN(r2, &(0x7f00000000c0)={0x18}, 0x18) 13:26:20 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_wait(r1, &(0x7f00000004c0)=[{}], 0x1, 0x200) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x4000200d}) 13:26:20 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x1a8, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x220) [ 220.506946][ T7945] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 13:26:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f00000000c0)={0x60003}) ioctl$KVM_SMI(r3, 0xaeb7) ioctl$KVM_RUN(r3, 0xae80, 0x0) 13:26:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) [ 220.676419][ T7964] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 13:26:20 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x1a8, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x220) [ 220.861880][ T7980] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 13:26:20 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 13:26:20 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) 13:26:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f00000002c0), 0x182) 13:26:20 executing program 2: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@block={'block', 0x3d, 0x800}}]}) 13:26:20 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x1a8, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x220) 13:26:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000200)="4029450fc481b1dfe291f2260f053e6509099dc4a1fd11648063506350d9e4e4610dc2900400000089440f00050dc4e9fe16680666470fc026d452ab") remap_file_pages(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x3f, 0x12020) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x7fffd) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast}, 0x10) [ 221.136157][ T7994] BUG: assuming atomic context at kernel/seccomp.c:271 [ 221.175296][ T7994] in_atomic(): 0, irqs_disabled(): 0, pid: 7994, name: syz-executor.0 [ 221.195914][ T7994] no locks held by syz-executor.0/7994. [ 221.215474][ T7994] CPU: 0 PID: 7994 Comm: syz-executor.0 Not tainted 5.0.0-rc7-next-20190220 #39 [ 221.224552][ T7994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.234617][ T7994] Call Trace: [ 221.237940][ T7994] dump_stack+0x172/0x1f0 [ 221.242291][ T7994] __cant_sleep.cold+0xa3/0xbb [ 221.247078][ T7994] __seccomp_filter+0x12b/0x12b0 [ 221.252042][ T7994] ? seccomp_notify_release+0x280/0x280 [ 221.257618][ T7994] ? kasan_check_write+0x14/0x20 [ 221.262576][ T7994] ? _raw_spin_unlock_irq+0x28/0x90 [ 221.263267][ T7998] ISOFS: Unable to identify CD-ROM format. [ 221.267788][ T7994] ? do_seccomp+0xa5a/0x2250 [ 221.267806][ T7994] ? _raw_spin_unlock_irq+0x28/0x90 [ 221.267822][ T7994] ? lockdep_hardirqs_on+0x418/0x5d0 [ 221.267838][ T7994] ? trace_hardirqs_on+0x67/0x230 [ 221.267854][ T7994] ? kasan_check_read+0x11/0x20 [ 221.267871][ T7994] ? _raw_spin_unlock_irq+0x5e/0x90 [ 221.267885][ T7994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 221.267897][ T7994] ? do_seccomp+0x389/0x2250 [ 221.267937][ T7994] __secure_computing+0x101/0x360 [ 221.319696][ T7994] syscall_trace_enter+0x5bf/0xe10 [ 221.324821][ T7994] ? trace_event_raw_event_sys_exit+0x290/0x290 [ 221.331084][ T7994] ? lockdep_hardirqs_on+0x418/0x5d0 [ 221.336360][ T7994] ? trace_hardirqs_on+0x67/0x230 [ 221.341378][ T7994] do_syscall_64+0x479/0x610 [ 221.345964][ T7994] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.351845][ T7994] RIP: 0033:0x45ac8a [ 221.355731][ T7994] Code: 25 18 00 00 00 00 74 01 f0 48 0f b1 3d df ba 5f 00 48 39 c2 75 da f3 c3 0f 1f 84 00 00 00 00 00 48 63 ff b8 e4 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 06 f3 c3 0f 1f 40 00 48 c7 c2 d4 ff ff ff f7 [ 221.375324][ T7994] RSP: 002b:00007f2e7819fc58 EFLAGS: 00000246 ORIG_RAX: 00000000000000e4 [ 221.383725][ T7994] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045ac8a 13:26:21 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x4c, 0x0, &(0x7f0000000100)) 13:26:21 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) signalfd(0xffffffffffffffff, 0x0, 0x0) 13:26:21 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x1a8, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x220) 13:26:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) preadv(r0, &(0x7f0000000380)=[{0x0}, {0x0}], 0x2, 0x0) creat(&(0x7f00000003c0)='./bus\x00', 0x33) syz_open_procfs(0x0, &(0x7f0000000480)='smaps_rollup\x00') dup(r0) pipe2(&(0x7f0000000740), 0x80000) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x20000, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x40000, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000005c0)='mem\xc4,g\xac\x043\x00\x00\xff\xfc\xff\xff\xff\xff\xff\xff\xff\x00\xf6\xaf\xf5\xe8\xc7\xefs\x8ar\xa3\xfe\x8d\t\xdf\xda\x91\xc6\x90\x04\xdd5c\xce\x05\x1dU\xfc^\xa6\x97\xa9\xe5\xf5\\\x85\xf0\vo\x14\xac\x1d\x02', 0x0, 0x0) ioctl$BLKRESETZONE(r2, 0x40101283, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r4 = syz_open_procfs(r3, &(0x7f0000000500)='uid_map\x00') sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = creat(&(0x7f0000000200)='./bus\x00', 0x0) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0xffffffc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x10000000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tee(r5, r4, 0x7704611, 0x1) getuid() fstat(r7, &(0x7f0000000540)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, 0x0}, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r6, 0x800454e0, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) [ 221.391708][ T7994] RDX: 000000000000a244 RSI: 00007f2e7819fc60 RDI: 0000000000000001 [ 221.399677][ T7994] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 221.407647][ T7994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 221.415600][ T7994] R13: 00000000004c4cd5 R14: 00000000004d8890 R15: 00000000ffffffff 13:26:21 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x1a8, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x220) 13:26:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 221.569054][ T7998] ISOFS: Unable to identify CD-ROM format. [ 221.850551][ T8026] IPVS: ftp: loaded support on port[0] = 21 13:26:21 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 13:26:21 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) write$P9_RREAD(r0, &(0x7f00000000c0)={0x207, 0x75, 0x0, {0x1fc, "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"}}, 0x207) 13:26:21 executing program 2: request_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000140)={'syz'}, 0x0, 0xfffffffffffffffc) 13:26:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x1a8, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x220) 13:26:21 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x10) geteuid() r1 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) ioctl$sock_proto_private(0xffffffffffffffff, 0x89ea, 0x0) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000240)={0x0, 0x1, 0x40}) write$binfmt_script(r4, &(0x7f0000000a80)=ANY=[@ANYBLOB="2321202e2f66696c65300aea205486396972100d97c042b2cd9252689db19239e8a5606e6635ddee806b5f917ba77a9d73c005f1d65ab06dcefc57551c9d41fbc241e44552829a60768e93d001671f3effb1f1ef21e12e108339e01432fb49132d56cd027b2e1c17a9f416e5f982e0e6a5627c7c8622d30435d28ff9ac41074a89eb0a605441116a309995c5280c53b4ba8527106e7275ab7b1b7dfc2e916adc640c7a441cb0d319c93a8c46bf6b74171178be3dc9d4069c500000000000a6524126f1fdaf7dd82c4e83ec0d0ebe5be42ed339023388576a9a57c7b60600f45e9602e1d2ea4470ece86713678f239e277019b632afc6e09aa720c7620b36940af961f0ccc001f05d907ae86b75c3b9f26fcd4e9cdf9a941f3d3a5335b5cfa5697cbd85e5092ccf5a054450daf8a436f2ad8a00076381db30872f54d3d8be1c803cd3f0a3134ec8b4977cdb1f95e90d0294f2d9d53b70c425e0c0b175ffdb8a43ee659f31793971ee7b56b2141f1ea0da7f7bebc0a221234c5cf78bf9edae73082e8c2d16d443d7b0b515d7015bf19b844c202cb510ffff2158bc5e7a51432573c5d5842504bd6ac17200535a53ff3b2c8f6d88eca4a2644ac91970d1ca2db0e6361a19e9606bdaa3892320d499b2a82743d51374c501b3d0cbfa078883e070404db9f62b570ccce8c97b4734affa8da72fe3927026094ddaa41ee7b840ea941c99f795cef5e0b1d1168c2fa632a4105eaf445d0e0cd5248bad0bf5b73a8e2d53df88e5494ff6848fe9ccba0ea6b54d397195ba248b5c4090b82857dc1f69d92a7714dc0383e2bb157d0e31cff09c2b98f55761c08cf6d32c9cdb98494d7c56187514597f7bbc438ce3b55fb08d6437746343ebd89aec4a7f863c9865e2b27008bfbc4439a8478292b291ef7979590e0583d607cb899548c98610c645cf5848f1a1ea61277852e44473db56bff0dfd6f6752cf5c30600000000000000de8ce0505e8ab69b19fa7067c68a06a1eb32e23a79b9fa008fc3e75729acf724096b42a1d484dc5efdb00c39240c0b71b81c7636695a0caae6dd34dc573cf173afcb7889d5c14e6ed5338492f654f201817a77dadb046bace06e9eee9bea92cb87abcd83c41b2db3b45f174a7daaba729067ddb040ed96a4a533c600c8eb0042651150a50028bd8618e9f243728b129c4c0b52403edfa4ffa2aa53d4cc45703c0585a625f9e5242159275364a684460d0c076ec6e5c3b0381a10dc81c637eb157f32cdb431e829f405694750c3d616910918a51e93bfc3a7bb847709c20765c73895d94ad8747a1a1a5249e045622f5b2edd5adde47abf9d973c77c5042550559b7b23c55b145d6ffda9f4692624977868d78d9ebcb896a42ab095684e827e675fcb4af10d674b58bd3d46cc5e5183f4505f3b112cc361b44366739d6c01ad5316a5f08ec1003aed5dfcd165f583875cb5de8f3b0ced801068509ea6dcaa964473eaf708f65eadf211397de17c809630aed7faaef4f5eecc17ba112812bbbe2c7e2fd31158d88ff2b58d30e24585333e5300a72a6a3719eeb1711c907c101faf3df3b980899298e49066c396615a4352d394efc732d74bde0d5c6b21910ff48970dcee7f8318648324c45bc788d011122ab3827150096dcf9b39d7c4dd95faa5890a10689aa0fefecfcdd988b805aab3568156ccb800007a67612cdf72f456c6275102166e25e9f22fa40d92d3c12ded65cdcd66c3a082f0e3"], 0x4d5) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x0, 0x81, 0x7}}, 0x28) r5 = open(0x0, 0x941, 0x0) r6 = dup(r5) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) getsockname$packet(r6, 0x0, &(0x7f0000000340)) sendmsg$nl_route_sched(r2, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=@deltclass={0x74, 0x29, 0x413, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, {0xffff, 0xfff6}, {0xfff3}, {0x0, 0x3}}, [@tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x24, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0x800, 0x1, 0xfffffffffffffffa, 0x3f, 0x7, 0x6}}, @TCA_CBQ_RATE={0x10, 0x5, {0xfcc, 0x1, 0xffffffff, 0x20, 0x6, 0x3}}]}}, @TCA_RATE={0x8, 0x5, {0x8, 0x46}}, @tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8, 0x1, 0x5f}}}, @TCA_RATE={0x8, 0x5, {0x2, 0x20}}]}, 0x74}}, 0x4) pipe(0x0) write$binfmt_elf64(r4, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000540)={0x1, 0x325c, 0x4, 0x0, 0x1}) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') ptrace$getenv(0x4201, 0x0, 0x3, &(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000004c0)={0x100000001, 0x80, 0x4, 0xb}) 13:26:21 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_script(r1, &(0x7f00000014c0)=ANY=[@ANYBLOB='#'], 0x1) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 222.040865][ T8039] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 13:26:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x1a8, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x220) 13:26:22 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000000)='+'}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, 0x0}) 13:26:22 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x104) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2a2, 0x10400003) [ 222.386013][ T8063] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested [ 222.406089][ T8065] binder: 8061:8065 ioctl c018620b 0 returned -14 [ 222.471455][ T8069] binder: 8061:8069 transaction failed 29189/-22, size 24-8 line 2994 [ 222.503233][ T8032] IPVS: ftp: loaded support on port[0] = 21 13:26:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x1a8, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000000900000000000000000064756d6d7930100000000000000000007465616d5f736c6176655f300000000073797a6b616c6c657230000000000000726f7365300000000000000000000000aaaaaaaaaa000000000000000180c2000000000000000000000070000000e0000000180100006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ffffffff00000000736e61740000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ffffffff00000000736e61740000000000000000000000000000000000000000000000000000000010000000000000000000000000000000fdffffff00000000"]}, 0x220) 13:26:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) preadv(r0, &(0x7f0000000380)=[{0x0}, {0x0}], 0x2, 0x0) creat(&(0x7f00000003c0)='./bus\x00', 0x33) syz_open_procfs(0x0, &(0x7f0000000480)='smaps_rollup\x00') dup(r0) pipe2(&(0x7f0000000740), 0x80000) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x20000, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x40000, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000005c0)='mem\xc4,g\xac\x043\x00\x00\xff\xfc\xff\xff\xff\xff\xff\xff\xff\x00\xf6\xaf\xf5\xe8\xc7\xefs\x8ar\xa3\xfe\x8d\t\xdf\xda\x91\xc6\x90\x04\xdd5c\xce\x05\x1dU\xfc^\xa6\x97\xa9\xe5\xf5\\\x85\xf0\vo\x14\xac\x1d\x02', 0x0, 0x0) ioctl$BLKRESETZONE(r2, 0x40101283, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r4 = syz_open_procfs(r3, &(0x7f0000000500)='uid_map\x00') sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = creat(&(0x7f0000000200)='./bus\x00', 0x0) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0xffffffc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x10000000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tee(r5, r4, 0x7704611, 0x1) getuid() fstat(r7, &(0x7f0000000540)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, 0x0}, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r6, 0x800454e0, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) 13:26:22 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc6a1) unlink(&(0x7f00000000c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000100)='./file0\x00', 0x0, 0x2002, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 222.636103][ T8075] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested [ 222.821661][ T8079] IPVS: ftp: loaded support on port[0] = 21 13:26:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 13:26:22 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x1a8, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x220) 13:26:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x4000000000010, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/udp6\x00') sendfile(r1, r2, &(0x7f0000000000)=0xf3, 0x80000002) [ 223.094605][ T8087] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 13:26:22 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x1a8, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x220) [ 223.192212][ T8069] binder: 8061:8069 ioctl c018620b 0 returned -14 [ 223.213127][ T7838] binder: undelivered TRANSACTION_ERROR: 29189 13:26:23 executing program 4: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) link(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file1/file0\x00') rmdir(&(0x7f0000000080)='./file1\x00') chroot(&(0x7f0000000000)='./file2\x00') creat(&(0x7f0000000140)='./file2\x00', 0x0) 13:26:23 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="5500000018007f5300fe01b2a4a280930a06000000a84308910000003900090008000c00010000001900150006000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab6513", 0x55}], 0x1}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 223.327680][ T8100] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 13:26:23 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x1a8, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000000900000000000000000064756d6d7930100000000000000000007465616d5f736c6176655f300000000073797a6b616c6c657230000000000000726f7365300000000000000000000000aaaaaaaaaa000000000000000180c2000000000000000000000070000000e0000000180100006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ffffffff00000000736e61740000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ffffffff00000000736e61740000000000000000000000000000000000000000000000000000000010000000000000000000000000000000fdffffff00000000"]}, 0x220) [ 223.567359][ T8115] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 13:26:23 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x1a8, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x220) 13:26:23 executing program 0: 13:26:23 executing program 2: 13:26:23 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x1a8, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x220) 13:26:23 executing program 0: 13:26:23 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040), &(0x7f0000000140)=0x8) 13:26:23 executing program 2: syz_emit_ethernet(0x24b, &(0x7f00000001c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x3700b, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x8000000}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) 13:26:23 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x1a8, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000000900000000000000000064756d6d7930100000000000000000007465616d5f736c6176655f300000000073797a6b616c6c657230000000000000726f7365300000000000000000000000aaaaaaaaaa000000000000000180c2000000000000000000000070000000e0000000180100006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ffffffff00000000736e61740000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ffffffff00000000736e61740000000000000000000000000000000000000000000000000000000010000000000000000000000000000000fdffffff00000000"]}, 0x220) 13:26:23 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000500)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) r1 = dup2(r0, r0) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='Y'], 0x1) sendmmsg$unix(r1, &(0x7f0000005dc0)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 13:26:24 executing program 4: 13:26:24 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000003c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000080)) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) 13:26:24 executing program 0: 13:26:24 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x220) 13:26:24 executing program 3: 13:26:24 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x220) 13:26:24 executing program 3: 13:26:24 executing program 0: 13:26:24 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040), &(0x7f0000000140)=0x8) 13:26:24 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x220) 13:26:24 executing program 4: 13:26:24 executing program 2: 13:26:24 executing program 3: 13:26:24 executing program 0: 13:26:24 executing program 3: 13:26:24 executing program 2: 13:26:24 executing program 4: 13:26:24 executing program 0: 13:26:24 executing program 3: 13:26:24 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0}, 0x220) [ 225.030199][ T8204] kernel msg: ebtables bug: please report to author: Wrong len argument 13:26:25 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040), &(0x7f0000000140)=0x8) 13:26:25 executing program 2: 13:26:25 executing program 4: 13:26:25 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0}, 0x220) 13:26:25 executing program 0: 13:26:25 executing program 3: 13:26:25 executing program 2: 13:26:25 executing program 4: 13:26:25 executing program 3: 13:26:25 executing program 0: [ 225.778315][ T8220] kernel msg: ebtables bug: please report to author: Wrong len argument 13:26:25 executing program 2: 13:26:25 executing program 3: 13:26:26 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 13:26:26 executing program 4: 13:26:26 executing program 0: 13:26:26 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0}, 0x220) 13:26:26 executing program 2: 13:26:26 executing program 3: 13:26:26 executing program 0: 13:26:26 executing program 2: [ 226.597338][ T8241] kernel msg: ebtables bug: please report to author: Wrong len argument 13:26:26 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x800443d3, &(0x7f0000000080)) 13:26:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x620}], 0x1}}], 0x1, 0x0, 0x0) 13:26:26 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 13:26:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="73ec0979cf5aa455b81e672c468abd96a0a5b2907f1cf48e688115ef3b7b2fb677f68bfe31c7f78fdd73e2e3630ec5dba6c9de4aceb854e66148c373bfb3de60e036f292ffa3e33b1ca8", 0x4a, 0x8000, 0x0, 0x0) read(r0, &(0x7f0000000140)=""/116, 0xffffff3d) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYRES64], 0x8) 13:26:26 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[]}, 0x78) 13:26:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000200)) 13:26:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[]}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:26:26 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) [ 226.900161][ T8270] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 226.909320][ T8275] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:26:26 executing program 0: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040efc20ab57b42ab0dda25fc2c31f92d2251f43813df895f3367947c67e36da88c9b2891402834720000a54073c8c5f94f34548e2d271f"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r0, 0x0, 0x0) 13:26:26 executing program 1: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={r0}, &(0x7f0000000140)=0x8) 13:26:26 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[]}, 0x78) 13:26:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="73ec0979cf5aa455b81e672c468abd96a0a5b2907f1cf48e688115ef3b7b2fb677f68bfe31c7f78fdd73e2e3630ec5dba6c9de4aceb854e66148c373bfb3de60e036f292ffa3e33b1ca8", 0x4a, 0x8000, 0x0, 0x0) read(r0, &(0x7f0000000140)=""/116, 0xffffff3d) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYRES64], 0x8) 13:26:27 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[]}, 0x78) [ 227.239390][ T8300] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 227.420170][ T8320] kernel msg: ebtables bug: please report to author: Entries_size never zero 13:26:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x620}], 0x1}}], 0x1, 0x0, 0x0) 13:26:27 executing program 1: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={r0}, &(0x7f0000000140)=0x8) 13:26:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={'sit0\x00', {0x2, 0x0, @dev}}) 13:26:27 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]}, 0x78) 13:26:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="73ec0979cf5aa455b81e672c468abd96a0a5b2907f1cf48e688115ef3b7b2fb677f68bfe31c7f78fdd73e2e3630ec5dba6c9de4aceb854e66148c373bfb3de60e036f292ffa3e33b1ca8", 0x4a, 0x8000, 0x0, 0x0) read(r0, &(0x7f0000000140)=""/116, 0xffffff3d) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYRES64], 0x8) [ 227.547783][ T8334] kernel msg: ebtables bug: please report to author: Entries_size never zero 13:26:27 executing program 4: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) geteuid() pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r1, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000540)={0x1, 0x325c, 0x4, 0x0, 0x1}) 13:26:27 executing program 1: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={r0}, &(0x7f0000000140)=0x8) 13:26:27 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]}, 0x78) 13:26:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) msgctl$IPC_SET(0x0, 0x1, 0x0) 13:26:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="73ec0979cf5aa455b81e672c468abd96a0a5b2907f1cf48e688115ef3b7b2fb677f68bfe31c7f78fdd73e2e3630ec5dba6c9de4aceb854e66148c373bfb3de60e036f292ffa3e33b1ca8", 0x4a, 0x8000, 0x0, 0x0) read(r0, &(0x7f0000000140)=""/116, 0xffffff3d) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYRES64], 0x8) 13:26:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) [ 227.992179][ T8351] kernel msg: ebtables bug: please report to author: Entries_size never zero 13:26:27 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) [ 228.054860][ T8346] BUG: assuming atomic context at kernel/seccomp.c:271 [ 228.071097][ T8346] in_atomic(): 0, irqs_disabled(): 0, pid: 8346, name: syz-executor.3 13:26:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 13:26:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="73ec0979cf5aa455b81e672c468abd96a0a5b2907f1cf48e688115ef3b7b2fb677f68bfe31c7f78fdd73e2e3630ec5dba6c9de4aceb854e66148c373bfb3de60e036f292ffa3e33b1ca8", 0x4a, 0x8000, 0x0, 0x0) read(r0, &(0x7f0000000140)=""/116, 0xffffff3d) [ 228.103964][ T8346] no locks held by syz-executor.3/8346. 13:26:27 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]}, 0x78) [ 228.190547][ T26] kauditd_printk_skb: 1 callbacks suppressed [ 228.190561][ T26] audit: type=1326 audit(1550669187.961:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8364 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 [ 228.224402][ T8346] CPU: 0 PID: 8346 Comm: syz-executor.3 Tainted: G W 5.0.0-rc7-next-20190220 #39 [ 228.234831][ T8346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.244888][ T8346] Call Trace: [ 228.248207][ T8346] dump_stack+0x172/0x1f0 [ 228.252551][ T8346] __cant_sleep.cold+0xa3/0xbb [ 228.257322][ T8346] __seccomp_filter+0x12b/0x12b0 [ 228.262276][ T8346] ? seccomp_notify_release+0x280/0x280 [ 228.267828][ T8346] ? kasan_check_write+0x14/0x20 [ 228.272788][ T8346] ? _raw_spin_unlock_irq+0x28/0x90 [ 228.277999][ T8346] ? do_seccomp+0xa5a/0x2250 [ 228.282591][ T8346] ? _raw_spin_unlock_irq+0x28/0x90 [ 228.287799][ T8346] ? lockdep_hardirqs_on+0x418/0x5d0 [ 228.293100][ T8346] ? trace_hardirqs_on+0x67/0x230 [ 228.298127][ T8346] ? kasan_check_read+0x11/0x20 [ 228.302991][ T8346] ? _raw_spin_unlock_irq+0x5e/0x90 [ 228.308200][ T8346] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 228.314451][ T8346] ? do_seccomp+0x389/0x2250 [ 228.319053][ T8346] __secure_computing+0x101/0x360 [ 228.324097][ T8346] syscall_trace_enter+0x5bf/0xe10 [ 228.329226][ T8346] ? trace_event_raw_event_sys_exit+0x290/0x290 [ 228.335483][ T8346] ? lockdep_hardirqs_on+0x418/0x5d0 [ 228.340777][ T8346] ? trace_hardirqs_on+0x67/0x230 [ 228.345809][ T8346] do_syscall_64+0x479/0x610 [ 228.350416][ T8346] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.356314][ T8346] RIP: 0033:0x45ac8a [ 228.360218][ T8346] Code: 25 18 00 00 00 00 74 01 f0 48 0f b1 3d df ba 5f 00 48 39 c2 75 da f3 c3 0f 1f 84 00 00 00 00 00 48 63 ff b8 e4 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 06 f3 c3 0f 1f 40 00 48 c7 c2 d4 ff ff ff f7 [ 228.379832][ T8346] RSP: 002b:00007f1614fcec58 EFLAGS: 00000246 ORIG_RAX: 00000000000000e4 [ 228.388262][ T8346] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045ac8a [ 228.396248][ T8346] RDX: 0000000000020f54 RSI: 00007f1614fcec60 RDI: 0000000000000001 [ 228.404230][ T8346] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 228.412218][ T8346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 228.420205][ T8346] R13: 00000000004c4cd5 R14: 00000000004d8890 R15: 00000000ffffffff 13:26:28 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000003c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000080)) 13:26:28 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) [ 228.468657][ T8376] kernel msg: ebtables bug: please report to author: Entries_size never zero 13:26:28 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0xd4, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000000900000000000000000064756d6d7930100000000000000000007465616d5f736c6176655f300000000073797a6b616c6c657230000000000000726f7365300000000000"]}, 0x14c) 13:26:28 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0xd4, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000000900000000000000000064756d6d7930100000000000000000007465616d5f736c6176655f300000000073797a6b616c6c657230000000000000726f7365300000000000"]}, 0x14c) [ 228.575346][ T26] audit: type=1326 audit(1550669188.341:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8345 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 [ 228.611952][ T8386] kernel msg: ebtables bug: please report to author: entries_size too small 13:26:28 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0xd4, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000000900000000000000000064756d6d7930100000000000000000007465616d5f736c6176655f300000000073797a6b616c6c657230000000000000726f7365300000000000"]}, 0x14c) [ 228.683859][ T8393] kernel msg: ebtables bug: please report to author: entries_size too small [ 228.769050][ T26] audit: type=1326 audit(1550669188.541:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8345 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 [ 228.782553][ T8398] kernel msg: ebtables bug: please report to author: entries_size too small 13:26:28 executing program 3: 13:26:28 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 13:26:28 executing program 4: 13:26:28 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x13e, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000000900000000000000000064756d6d7930100000000000000000007465616d5f736c6176655f300000000073797a6b616c6c657230000000000000726f7365300000000000000000000000aaaaaaaaaa000000000000000180c2000000000000000000000070000000e0000000180100006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ffffffff00000000736e61740000"]}, 0x1b6) [ 228.900787][ T8406] kernel msg: ebtables bug: please report to author: entries_size too small [ 228.976178][ T26] audit: type=1326 audit(1550669188.741:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8364 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 13:26:28 executing program 0: 13:26:28 executing program 4: 13:26:28 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x13e, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x1b6) 13:26:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="73ec0979cf5aa455b81e672c468abd96a0a5b2907f1cf48e688115ef3b7b2fb677f68bfe31c7f78fdd73e2e3630ec5dba6c9de4aceb854e66148c373bfb3de60e036f292ffa3e33b1ca8", 0x4a, 0x8000, 0x0, 0x0) read(r0, &(0x7f0000000140)=""/116, 0xffffff3d) 13:26:28 executing program 3: 13:26:28 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 13:26:28 executing program 4: [ 229.139948][ T8421] kernel msg: ebtables bug: please report to author: entries_size too small 13:26:28 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x13e, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x1b6) 13:26:29 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 13:26:29 executing program 3: 13:26:29 executing program 0: 13:26:29 executing program 4: [ 229.314718][ T8437] kernel msg: ebtables bug: please report to author: entries_size too small 13:26:29 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x173, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000000900000000000000000064756d6d7930100000000000000000007465616d5f736c6176655f300000000073797a6b616c6c657230000000000000726f7365300000000000000000000000aaaaaaaaaa000000000000000180c2000000000000000000000070000000e0000000180100006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ffffffff00000000736e61740000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ffffffff00000000736e61"]}, 0x1eb) 13:26:29 executing program 3: 13:26:29 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) [ 229.500616][ T8452] kernel msg: ebtables bug: please report to author: entries_size too small 13:26:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="73ec0979cf5aa455b81e672c468abd96a0a5b2907f1cf48e688115ef3b7b2fb677f68bfe31c7f78fdd73e2e3630ec5dba6c9de4aceb854e66148c373bfb3de60e036f292ffa3e33b1ca8", 0x4a, 0x8000, 0x0, 0x0) read(r0, &(0x7f0000000140)=""/116, 0xffffff3d) 13:26:29 executing program 0: 13:26:29 executing program 4: 13:26:29 executing program 3: 13:26:29 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x173, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x1eb) 13:26:29 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 13:26:29 executing program 4: [ 229.965785][ T8464] kernel msg: ebtables bug: please report to author: entries_size too small 13:26:29 executing program 3: 13:26:29 executing program 0: 13:26:29 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 13:26:29 executing program 4: 13:26:29 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x173, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000000900000000000000000064756d6d7930100000000000000000007465616d5f736c6176655f300000000073797a6b616c6c657230000000000000726f7365300000000000000000000000aaaaaaaaaa000000000000000180c2000000000000000000000070000000e0000000180100006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ffffffff00000000736e61740000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ffffffff00000000736e61"]}, 0x1eb) [ 230.271959][ T8486] kernel msg: ebtables bug: please report to author: entries_size too small 13:26:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) read(r0, &(0x7f0000000140)=""/116, 0xffffff3d) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYRES64], 0x8) 13:26:30 executing program 3: 13:26:30 executing program 0: 13:26:30 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 13:26:30 executing program 4: 13:26:30 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x18e, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x206) 13:26:30 executing program 4: 13:26:30 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) [ 230.828901][ T8498] kernel msg: ebtables bug: please report to author: entries_size too small 13:26:30 executing program 0: 13:26:30 executing program 3: 13:26:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) read(r0, &(0x7f0000000140)=""/116, 0xffffff3d) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYRES64], 0x8) 13:26:30 executing program 5: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x18e, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x206) 13:26:30 executing program 4: 13:26:30 executing program 0: 13:26:30 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 13:26:30 executing program 3: [ 231.103479][ T8519] kernel msg: ebtables bug: please report to author: entries_size too small 13:26:30 executing program 0: