0000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 287.405589][ T38] audit: type=1804 audit(1627716594.005:32): pid=13451 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir826785980/syzkaller.ezW5aU/200/bus" dev="sda1" ino=14752 res=1 errno=0 07:29:54 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x32) 07:29:54 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_SCRNMAP(r0, 0x5413, 0x0) [ 287.616111][ T38] audit: type=1804 audit(1627716594.425:33): pid=13492 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/198/bus" dev="sda1" ino=14755 res=1 errno=0 [ 287.775652][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:29:54 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='oom_score_adj\x00') sendmsg$rds(r0, 0x0, 0x0) [ 288.007934][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 288.024504][ T38] audit: type=1804 audit(1627716594.565:34): pid=13499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/142/bus" dev="sda1" ino=14757 res=1 errno=0 07:29:55 executing program 0: socket(0x2, 0x2, 0x7) [ 288.709905][ T38] audit: type=1804 audit(1627716594.735:35): pid=13501 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/142/bus" dev="sda1" ino=14757 res=1 errno=0 07:29:55 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='oom_score_adj\x00') connect$rds(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) [ 288.978790][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 289.127612][ T38] audit: type=1804 audit(1627716595.065:36): pid=13496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/198/bus" dev="sda1" ino=14755 res=1 errno=0 [ 289.168422][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 289.763785][ T38] audit: type=1804 audit(1627716595.225:37): pid=13493 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir826785980/syzkaller.ezW5aU/201/bus" dev="sda1" ino=14741 res=1 errno=0 [ 290.264385][ T38] audit: type=1804 audit(1627716595.325:38): pid=13495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir514788949/syzkaller.ePXSK2/200/bus" dev="sda1" ino=14745 res=1 errno=0 [ 290.586744][ T38] audit: type=1804 audit(1627716596.175:39): pid=13514 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir826785980/syzkaller.ezW5aU/201/bus" dev="sda1" ino=14741 res=1 errno=0 [ 290.905718][ T38] audit: type=1804 audit(1627716596.395:40): pid=13517 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir514788949/syzkaller.ePXSK2/200/bus" dev="sda1" ino=14745 res=1 errno=0 07:29:58 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:29:58 executing program 0: sysfs$1(0x1, &(0x7f0000000240)='/dev/vbi#\x00') 07:29:58 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) accept(r0, 0x0, 0x0) 07:29:58 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000140), 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000400)={0x0, 0x0, "23ba7faa4c12c971c0f1ea7dcc1dcd9063789cc90df084143d516ba2e265b9cb"}) 07:29:58 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x7, &(0x7f0000000000)=ANY=[], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:29:58 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000040), 0x7, 0x2) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000140)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "10948e27"}}) 07:29:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000069c0)={&(0x7f0000005740), 0x6e, &(0x7f0000006900)=[{&(0x7f00000057c0)=""/184, 0xb8}], 0x1, &(0x7f0000006940)}, 0x2) sendmmsg$unix(r1, &(0x7f0000008f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 07:29:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 07:29:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r2) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0x3c, r3, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x14, 0x8, 0x0, 0x1, [{0x4, 0xc}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}]}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x3c}}, 0x0) [ 291.588209][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:29:58 executing program 0: syz_open_procfs(0x0, &(0x7f00000001c0)='timers\x00') 07:29:58 executing program 2: socket(0x0, 0x0, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000007c00)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) 07:29:58 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f00)={0x0, 0x0, 0x8}, 0x10) 07:29:58 executing program 4: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) [ 292.382434][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 292.532996][ T38] kauditd_printk_skb: 3 callbacks suppressed [ 292.533013][ T38] audit: type=1804 audit(1627716599.345:44): pid=13558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir826785980/syzkaller.ezW5aU/202/bus" dev="sda1" ino=14766 res=1 errno=0 07:29:59 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) 07:29:59 executing program 0: add_key$user(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 07:29:59 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/raw\x00') read$FUSE(r0, &(0x7f0000001400)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) [ 293.640077][ T38] audit: type=1804 audit(1627716600.455:45): pid=13571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/144/bus" dev="sda1" ino=14776 res=1 errno=0 [ 293.691869][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:01 executing program 1: keyctl$dh_compute(0x17, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000640)={0x0}) 07:30:01 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_ext={0x1c, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:30:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000007d80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @rights={{0x10}}], 0x30}}], 0x1, 0x0) 07:30:01 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_SCRNMAP(r0, 0x545d, 0x0) 07:30:01 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00'}, 0x10) clock_nanosleep(0xa, 0x0, 0x0, 0x0) 07:30:01 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) 07:30:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000008f80)=[{{0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000040)="d4", 0x1}], 0x2}}], 0x1, 0x0) 07:30:01 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x1, {0xa, 0x0, 0x0, @private0}}}, 0x32) [ 294.971985][ T38] audit: type=1804 audit(1627716601.785:46): pid=13590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/145/bus" dev="sda1" ino=14778 res=1 errno=0 07:30:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f000000c640)=[{{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}}], 0x1, 0x0) 07:30:01 executing program 1: keyctl$dh_compute(0x17, &(0x7f00000005c0), &(0x7f0000000a40)=""/4096, 0x1000, &(0x7f0000000640)={0x0}) [ 295.069293][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:01 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) socket$unix(0x1, 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='oom_score_adj\x00') r2 = fork() ioprio_set$pid(0x0, r2, 0x4004) ioctl$PTP_PIN_GETFUNC2(r1, 0xc0603d0f, 0x0) ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0x1, 0x2fd2, 0x4, 0x80000, r1}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r3, 0x111, 0x5, 0x0, 0x4) 07:30:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000069c0)={0x0, 0x0, &(0x7f0000006900)=[{&(0x7f00000057c0)=""/184, 0xb8}], 0x1}, 0x0) sendmmsg$unix(r1, &(0x7f0000008f80)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)='t', 0x1}], 0x1}}], 0x1, 0x0) 07:30:02 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x45a402, 0x0) write$tcp_congestion(r0, &(0x7f0000000100)='lp\x00', 0xfed8) 07:30:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000007d80)=[{{&(0x7f0000000000)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000bc0)=[@rights={{0x10}}], 0x10}}], 0x1, 0x0) 07:30:02 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000005a80), 0x10) 07:30:02 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000240)={0x0, 0x4c00, &(0x7f0000001c40)={&(0x7f0000000000)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="17090000000000000000010000600500070000000000080009000000000014001f000000000000000000000000000000000008000a00000000000600020001000000140020"], 0x5c}}, 0x0) 07:30:02 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) 07:30:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000540)={0x17, 0x0, 0x0, 0xf3836dad}, 0x40) 07:30:02 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000007c0), 0x2, 0x2) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000002880)) 07:30:02 executing program 4: inotify_add_watch(0xffffffffffffffff, 0x0, 0x50000021) 07:30:02 executing program 2: getresuid(&(0x7f0000008040), 0x0, 0x0) 07:30:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000026, 0x0, 0x3d}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:30:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000740)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0x28, 0x117, 0x2, 0x10, "7238f4f15a064c182f498998018af54a"}], 0x40}, 0x0) 07:30:02 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="183700000200000000000000000000000040fcfffcffffff8500000032000000850000009e0000007a883000010000009500"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x7f, &(0x7f0000000200)=""/127, 0x41100, 0x10, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f00000002c0), 0x8, 0x10, 0x0}, 0x78) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:02 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, 0x0) 07:30:02 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c80)={0x18, 0x5, &(0x7f0000000140)=@framed={{}, [@exit, @generic]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 296.216692][ T38] audit: type=1804 audit(1627716603.035:47): pid=13629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/146/bus" dev="sda1" ino=14799 res=1 errno=0 [ 296.266827][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x3c}}, 0x0) [ 296.544403][ T38] audit: type=1804 audit(1627716603.355:48): pid=13641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir125571229/syzkaller.4RgqhI/212/bus" dev="sda1" ino=14812 res=1 errno=0 [ 296.562262][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:03 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='net/l2cap\x00') [ 296.894329][ T38] audit: type=1804 audit(1627716603.685:49): pid=13646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir125571229/syzkaller.4RgqhI/212/bus" dev="sda1" ino=14812 res=1 errno=0 07:30:04 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:04 executing program 1: socket$pppl2tp(0x18, 0x1, 0x1) socket$unix(0x1, 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='oom_score_adj\x00') fork() ioprio_set$pid(0x0, 0x0, 0x4004) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, 0x0) ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0x1, 0x2fd2, 0x4, 0x0, r0}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x0, 0x4) 07:30:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) fspick(0xffffffffffffffff, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x33) 07:30:04 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000069c0)={0x0, 0x0, 0x0}, 0x0) sendmmsg$unix(r1, &(0x7f0000008f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000600)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x2, 0x0) 07:30:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000008f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002d00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}], 0x20}}], 0x2, 0x0) [ 297.529716][T13659] loop0: detected capacity change from 0 to 8 [ 297.638055][ T38] audit: type=1804 audit(1627716604.455:50): pid=13646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir125571229/syzkaller.4RgqhI/212/bus" dev="sda1" ino=14812 res=1 errno=0 07:30:04 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) fork() 07:30:04 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, 0x0) [ 298.019496][ T38] audit: type=1804 audit(1627716604.835:51): pid=13675 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/147/bus" dev="sda1" ino=14799 res=1 errno=0 [ 298.027993][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 298.252452][ T38] audit: type=1804 audit(1627716604.955:52): pid=13678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/147/bus" dev="sda1" ino=14799 res=1 errno=0 07:30:05 executing program 0: bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) 07:30:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000002bc0)={0x4, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:30:05 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) 07:30:05 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='oom_score_adj\x00') r2 = fork() ioprio_set$pid(0x0, r2, 0x0) ioctl$PTP_PIN_GETFUNC2(r1, 0xc0603d0f, 0x0) ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0x1, 0x2fd2, 0x4, 0x80000}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r3, 0x111, 0x5, 0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1}, 0x10) 07:30:05 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:05 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="183700000200000000000000000000000040fcfffcffffff8500000032000000850000009e0000007a883000010000009500"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x7f, &(0x7f0000000200)=""/127, 0x41100, 0x10, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f00000002c0), 0x8, 0x10, 0x0}, 0x78) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:05 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="183700000200000000000000000000000040fcfffcffffff8500000032000000850000009e0000007a883000010000009500"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x7f, &(0x7f0000000200)=""/127, 0x41100, 0x10, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f00000002c0), 0x8, 0x10, 0x0}, 0x78) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000002b80)={0x0, 0x0, &(0x7f0000002a80)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x1) 07:30:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c80)={0x18, 0x4, &(0x7f0000000140)=@framed={{}, [@exit]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 298.587421][ T38] audit: type=1804 audit(1627716605.405:53): pid=13695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/148/bus" dev="sda1" ino=14824 res=1 errno=0 [ 298.632137][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) [ 298.755604][ T38] audit: type=1804 audit(1627716605.535:54): pid=13700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/148/bus" dev="sda1" ino=14824 res=1 errno=0 07:30:05 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f00000000c0)={{0x0}, 0x0}, 0x20) 07:30:05 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:05 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='oom_score_adj\x00') recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 299.049920][ T38] audit: type=1804 audit(1627716605.795:55): pid=13707 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir125571229/syzkaller.4RgqhI/213/bus" dev="sda1" ino=14042 res=1 errno=0 [ 299.155930][T13710] overlayfs: missing 'lowerdir' [ 299.301081][T13714] overlayfs: missing 'lowerdir' [ 299.349653][ T38] audit: type=1804 audit(1627716606.065:56): pid=13704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/209/bus" dev="sda1" ino=14801 res=1 errno=0 [ 299.351170][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000008f80)=[{{0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000040)="d4", 0x1}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002d00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @rights={{0x10}}], 0x30}}], 0x2, 0x4000016) [ 299.527877][ T38] audit: type=1804 audit(1627716606.345:57): pid=13717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/149/bus" dev="sda1" ino=14832 res=1 errno=0 [ 299.531488][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000540)={0x17, 0x0, 0x9, 0xf3836dad}, 0x40) [ 299.689602][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:06 executing program 0: add_key$user(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)="d4", 0x1, 0xfffffffffffffffe) [ 300.007092][ T38] audit: type=1804 audit(1627716606.525:58): pid=13709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir125571229/syzkaller.4RgqhI/213/bus" dev="sda1" ino=14042 res=1 errno=0 07:30:07 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local, 0x3}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="fa", 0x1}], 0x1, &(0x7f0000000000)=[{0x18, 0x84, 0x7, 'w'}], 0x18}, 0xfc) [ 300.518213][ T38] audit: type=1804 audit(1627716606.635:59): pid=13721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/149/bus" dev="sda1" ino=14832 res=1 errno=0 07:30:09 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="183700000200000000000000000000000040fcfffcffffff8500000032000000850000009e0000007a883000010000009500"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x7f, &(0x7f0000000200)=""/127, 0x41100, 0x10, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f00000002c0), 0x8, 0x10, 0x0}, 0x78) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:09 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="183700000200000000000000000000000040fcfffcffffff8500000032000000850000009e0000007a883000010000009500"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x7f, &(0x7f0000000200)=""/127, 0x41100, 0x10, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f00000002c0), 0x8, 0x10, 0x0}, 0x78) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.events\x00', 0x275a, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) 07:30:09 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:09 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000040)=@abs={0x1}, 0x6e) 07:30:09 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000007c0), 0x2, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2c901fae"}, 0x0, 0x0, @fd}) [ 302.676104][ T38] kauditd_printk_skb: 1 callbacks suppressed [ 302.676120][ T38] audit: type=1804 audit(1627716609.486:61): pid=13737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir125571229/syzkaller.4RgqhI/214/bus" dev="sda1" ino=14812 res=1 errno=0 [ 302.736081][T13743] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 302.905845][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:09 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001c00)=@bpf_tracing={0x1a, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffce477c2e130ea7, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:30:10 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_SCRNMAP(r0, 0x5427, 0x0) [ 303.319961][ T38] audit: type=1804 audit(1627716609.796:62): pid=13750 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/150/bus" dev="sda1" ino=14842 res=1 errno=0 07:30:10 executing program 2: pselect6(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100), 0x8}) [ 303.616613][ T38] audit: type=1804 audit(1627716609.886:63): pid=13742 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir125571229/syzkaller.4RgqhI/214/bus" dev="sda1" ino=14812 res=1 errno=0 07:30:10 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:10 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 07:30:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f00000097c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 304.006204][ T38] audit: type=1804 audit(1627716610.066:64): pid=13752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/150/bus" dev="sda1" ino=14842 res=1 errno=0 [ 304.221769][ T38] audit: type=1804 audit(1627716611.026:65): pid=13771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/151/bus" dev="sda1" ino=14837 res=1 errno=0 [ 304.278396][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 304.508331][ T38] audit: type=1804 audit(1627716611.276:66): pid=13755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/210/bus" dev="sda1" ino=14846 res=1 errno=0 [ 304.656796][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 305.009009][ T38] audit: type=1804 audit(1627716611.276:67): pid=13773 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/151/bus" dev="sda1" ino=14837 res=1 errno=0 [ 305.252829][ T38] audit: type=1804 audit(1627716611.736:68): pid=13775 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/210/bus" dev="sda1" ino=14846 res=1 errno=0 07:30:12 executing program 5: socket(0x1d, 0x0, 0x805) 07:30:13 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300), 0x41, 0x0) write$rfkill(r0, 0x0, 0x0) 07:30:13 executing program 2: r0 = socket(0x1, 0x5, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 07:30:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={0x0, @can, @generic={0x0, "159d0fa223d2d1fddbdfed4a7784"}, @nl=@unspec}) 07:30:13 executing program 5: getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) 07:30:13 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) sendmmsg$inet(r0, &(0x7f0000000300)=[{{&(0x7f0000000080)={0x2, 0x0, @local}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000140)='T', 0x1}, {&(0x7f00000001c0)='(', 0x1}], 0x2, &(0x7f00000005c0)=ANY=[], 0xb0}}], 0x1, 0x0) 07:30:13 executing program 1: r0 = socket(0x18, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240), r0) 07:30:13 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="183700000200000000000000000000000040fcfffcffffff8500000032000000850000009e0000007a883000010000009500"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x7f, &(0x7f0000000200)=""/127, 0x41100, 0x10, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f00000002c0), 0x8, 0x10, 0x0}, 0x78) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000600)={0x1, &(0x7f00000005c0)=[{}]}) 07:30:13 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 07:30:13 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f00000005c0)=[{0x60}]}) 07:30:13 executing program 0: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x80200000}, 0x8) 07:30:13 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 306.859459][ T38] audit: type=1804 audit(1627716613.676:69): pid=13807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/211/bus" dev="sda1" ino=14850 res=1 errno=0 [ 307.080765][ T38] audit: type=1804 audit(1627716613.856:70): pid=13809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/152/bus" dev="sda1" ino=14452 res=1 errno=0 [ 307.098588][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:15 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="183700000200000000000000000000000040fcfffcffffff8500000032000000850000009e0000007a883000010000009500"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x7f, &(0x7f0000000200)=""/127, 0x41100, 0x10, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f00000002c0), 0x8, 0x10, 0x0}, 0x78) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) 07:30:15 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) sendmmsg$inet(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[], 0xb0}}], 0x1, 0x0) 07:30:15 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000), 0x401, 0x0) 07:30:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 07:30:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000000000, 0x0, &(0x7f0000000600)={0x0, 0x0}) 07:30:15 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x4, 0x401, 0x409, 0x0, 0x1}, 0x40) clock_gettime(0x0, &(0x7f0000005200)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000005240)={0x0, r0+60000000}) syz_genetlink_get_family_id$batadv(&(0x7f0000000140), 0xffffffffffffffff) pipe2(&(0x7f0000000000), 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) 07:30:15 executing program 0: r0 = socket(0x26, 0x5, 0x0) sendmmsg$inet(r0, &(0x7f0000000480)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private}}}, @ip_retopts={{0x10}}], 0x30}}], 0x1, 0x0) 07:30:15 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000380), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f00000003c0)={0x0, 0x1, [{}]}) [ 308.944139][ T38] kauditd_printk_skb: 1 callbacks suppressed [ 308.944155][ T38] audit: type=1804 audit(1627716615.756:72): pid=13833 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/153/bus" dev="sda1" ino=14867 res=1 errno=0 [ 308.964970][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:16 executing program 2: syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x200600) [ 309.182840][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 309.189261][ T38] audit: type=1804 audit(1627716615.876:73): pid=13837 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/153/bus" dev="sda1" ino=14867 res=1 errno=0 07:30:16 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 309.420238][ T38] audit: type=1804 audit(1627716615.916:74): pid=13835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/212/bus" dev="sda1" ino=14305 res=1 errno=0 07:30:16 executing program 0: migrate_pages(0x0, 0x8, 0x0, &(0x7f00000000c0)=0x302c) [ 310.071905][ T38] audit: type=1804 audit(1627716616.886:75): pid=13854 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/154/bus" dev="sda1" ino=14306 res=1 errno=0 07:30:17 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="183700000200000000000000000000000040fcfffcffffff8500000032000000850000009e0000007a883000010000009500"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x7f, &(0x7f0000000200)=""/127, 0x41100, 0x10, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f00000002c0), 0x8, 0x10, 0x0}, 0x78) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) 07:30:17 executing program 5: getitimer(0x2, &(0x7f0000000140)) 07:30:17 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000009c0)={'ip6gre0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x700, 0x0, 0x3}}) 07:30:17 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000080)) 07:30:17 executing program 0: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 07:30:17 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:17 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg(r0, &(0x7f0000000880)={&(0x7f00000000c0)=@nl=@proc, 0x80, 0x0}, 0x0) 07:30:17 executing program 5: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x84601, 0x0) [ 310.578023][ T38] audit: type=1326 audit(1627716617.396:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13857 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 07:30:17 executing program 0: socket(0xa, 0x80003, 0x40) 07:30:17 executing program 2: getresuid(&(0x7f0000000440), 0x0, 0x0) [ 310.748474][ T38] audit: type=1804 audit(1627716617.556:77): pid=13876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/155/bus" dev="sda1" ino=14879 res=1 errno=0 07:30:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffefffffa, 0x31, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000340)=""/33, 0x21}], 0x1) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) [ 311.019853][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:17 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, 0x0) [ 311.065507][ T38] audit: type=1804 audit(1627716617.706:78): pid=13880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/213/bus" dev="sda1" ino=14846 res=1 errno=0 07:30:18 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg(r0, &(0x7f0000000880)={&(0x7f00000000c0)=@nl=@proc, 0x80, 0x0}, 0x81) 07:30:18 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:18 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f00000005c0)=[{0x15}]}) 07:30:18 executing program 1: memfd_create(&(0x7f00000002c0)='/dev/ocfs2_control\x00', 0x0) 07:30:18 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="183700000200000000000000000000000040fcfffcffffff8500000032000000850000009e0000007a883000010000009500"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x7f, &(0x7f0000000200)=""/127, 0x41100, 0x10, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f00000002c0), 0x8, 0x10, 0x0}, 0x78) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) 07:30:18 executing program 0: r0 = socket(0x2, 0x3, 0x9) syz_genetlink_get_family_id$batadv(&(0x7f0000001e00), r0) 07:30:18 executing program 0: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000380), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) 07:30:18 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000600)={0x0, 0x0}) 07:30:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000600)={0x0, 0x0}) 07:30:18 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) [ 312.075844][ T38] audit: type=1804 audit(1627716618.896:79): pid=13908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/156/bus" dev="sda1" ino=14884 res=1 errno=0 07:30:19 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 312.274312][ T38] audit: type=1804 audit(1627716619.086:80): pid=13914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/214/bus" dev="sda1" ino=14313 res=1 errno=0 07:30:19 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) sendmmsg$inet(r0, &(0x7f0000000300)=[{{&(0x7f0000000080)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=ANY=[], 0xb0}}], 0x1, 0x0) 07:30:19 executing program 2: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="04"], 0x8) 07:30:19 executing program 0: r0 = socket(0x26, 0x5, 0x0) getpeername(r0, 0x0, 0x0) 07:30:19 executing program 5: migrate_pages(0x0, 0x8, 0x0, 0x0) [ 312.674091][ T8498] Bluetooth: hci2: Received unexpected HCI Event 00000000 [ 312.681944][ T8498] Bluetooth: hci2: Received unexpected HCI Event 00000000 [ 312.695881][ T38] audit: type=1804 audit(1627716619.516:81): pid=13925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/157/bus" dev="sda1" ino=14886 res=1 errno=0 07:30:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ofb(tea)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)={'#! ', './file0', [{}], 0xa, '9'}, 0xd) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/200, 0xd}], 0x1, 0x0, 0x0, 0x2000000}}], 0x1, 0x0, 0x0) 07:30:19 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="183700000200000000000000000000000040fcfffcffffff8500000032000000850000009e0000007a883000010000009500"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x7f, &(0x7f0000000200)=""/127, 0x41100, 0x10, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f00000002c0), 0x8, 0x10, 0x0}, 0x78) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:19 executing program 0: r0 = socket(0x26, 0x5, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) 07:30:19 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000180)=[{}], 0x8) 07:30:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f00000005c0)=[{0x61}]}) 07:30:20 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:20 executing program 0: socket(0x2b, 0x1, 0x200000) 07:30:20 executing program 1: r0 = socket(0x26, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002800)={'sit0\x00', &(0x7f0000002780)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @private2}}) 07:30:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000080)=[{}, {0x3}, {}]}) 07:30:20 executing program 5: r0 = socket(0x26, 0x5, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:30:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r0, &(0x7f0000000000)=@alg, &(0x7f0000000140)=0xffffffffffffff35) [ 313.574813][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:30:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) 07:30:21 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="183700000200000000000000000000000040fcfffcffffff8500000032000000850000009e0000007a883000010000009500"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x7f, &(0x7f0000000200)=""/127, 0x41100, 0x10, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f00000002c0), 0x8, 0x10, 0x0}, 0x78) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000009c0)={'ip6gre0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}) 07:30:21 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000009c0)={'ip6gre0\x00', 0x0}) 07:30:21 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, &(0x7f0000000140)) 07:30:21 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f00000005c0)=[{}]}) 07:30:21 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f00000005c0)=[{0x94}]}) 07:30:21 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0), 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000200)={'syz0\x00'}, 0x45c) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 07:30:21 executing program 2: r0 = socket(0x26, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000024c0)={'ip6tnl0\x00', &(0x7f0000002440)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @mcast1}}) 07:30:21 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x200002, 0x0) [ 314.492972][ T38] kauditd_printk_skb: 5 callbacks suppressed [ 314.492989][ T38] audit: type=1804 audit(1627716621.306:87): pid=13984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/159/bus" dev="sda1" ino=14226 res=1 errno=0 07:30:21 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 314.651951][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 314.800893][ T38] audit: type=1804 audit(1627716621.326:88): pid=13984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/159/bus" dev="sda1" ino=14226 res=1 errno=0 07:30:21 executing program 2: syz_emit_vhci(&(0x7f0000000000)=ANY=[], 0x8) [ 315.180839][ T38] audit: type=1804 audit(1627716621.446:89): pid=13985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/216/bus" dev="sda1" ino=13910 res=1 errno=0 07:30:22 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="183700000200000000000000000000000040fcfffcffffff8500000032000000850000009e0000007a883000010000009500"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x7f, &(0x7f0000000200)=""/127, 0x41100, 0x10, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f00000002c0), 0x8, 0x10, 0x0}, 0x78) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:22 executing program 1: waitid(0x0, 0xffffffffffffffff, &(0x7f0000000180), 0x4, 0x0) 07:30:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="45000000eb4da9"], 0x54}}, 0x0) 07:30:22 executing program 0: socket(0x29, 0x5, 0x800) 07:30:22 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000300), 0x201, 0x0) write$rfkill(r0, 0x0, 0x0) 07:30:22 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 315.403734][ T38] audit: type=1804 audit(1627716621.626:90): pid=13994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/216/bus" dev="sda1" ino=13910 res=1 errno=0 [ 315.515799][ T38] audit: type=1804 audit(1627716621.936:91): pid=13999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/160/bus" dev="sda1" ino=14046 res=1 errno=0 07:30:22 executing program 2: r0 = socket(0x18, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 07:30:22 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000300)) 07:30:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ofb(tea)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000000c0)="d7119dbb886f03317b", 0x9}], 0x1, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/200, 0xfec8}], 0x1, 0x0, 0x0, 0x2000000}}], 0x1, 0x0, 0x0) 07:30:22 executing program 1: pselect6(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 07:30:22 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 315.780605][ T38] audit: type=1804 audit(1627716622.416:92): pid=14016 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/161/bus" dev="sda1" ino=14338 res=1 errno=0 [ 315.792377][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:22 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) [ 316.105489][ T38] audit: type=1804 audit(1627716622.546:93): pid=14017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/217/bus" dev="sda1" ino=13924 res=1 errno=0 [ 316.399257][ T38] audit: type=1804 audit(1627716622.886:94): pid=14028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/217/bus" dev="sda1" ino=13924 res=1 errno=0 [ 316.579669][ T38] audit: type=1804 audit(1627716623.086:95): pid=14031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/162/bus" dev="sda1" ino=13911 res=1 errno=0 07:30:23 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="183700000200000000000000000000000040fcfffcffffff8500000032000000850000009e0000007a883000010000009500"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x7f, &(0x7f0000000200)=""/127, 0x41100, 0x10, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f00000002c0), 0x8, 0x10, 0x0}, 0x78) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:23 executing program 0: socket(0x0, 0x500, 0x0) 07:30:23 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000008c0)) 07:30:23 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:23 executing program 2: r0 = socket(0x26, 0x5, 0x0) sendmmsg$inet(r0, &(0x7f0000000480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 07:30:23 executing program 5: migrate_pages(0x0, 0x8, &(0x7f0000000040), &(0x7f00000000c0)=0x302c) 07:30:23 executing program 0: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x7}, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 07:30:23 executing program 2: pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0}) 07:30:23 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000380), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f00000003c0)={0x0, 0x3, [{}, {}, {0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffee000}]}) [ 316.921619][ T38] audit: type=1804 audit(1627716623.736:96): pid=14047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/163/bus" dev="sda1" ino=14453 res=1 errno=0 [ 316.952860][ T3254] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.981337][ T3254] ieee802154 phy1 wpan1: encryption failed: -22 07:30:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="38000000000013"], 0x420}, 0x0) 07:30:23 executing program 0: r0 = socket(0x26, 0x5, 0x0) bind$can_raw(r0, 0x0, 0x0) [ 317.204828][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:24 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x20000040) 07:30:25 executing program 0: r0 = socket(0x26, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}}}}) 07:30:25 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 07:30:25 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg(r0, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x0) 07:30:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000000)=0x10000101, 0x2) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000140)="8cacd9a1979d9084272912defaf665df08defd447afdeab0ba793ca01639619fbf358f6b7e114836222314d4f265d40973bea15247c1a18772a8c73fb61cb3dd98d6c34f4afa61fda70b68a460ca00bcaee6d46e8681c83c5b6514b241483ce3154e1c9e65fb0fb4ddfb296d75be88cddbc44f68ef4016d90709d048690c844e1eaeb53c011e", 0x86, 0x4000001, &(0x7f00000000c0)={0xa, 0x0, 0x200, @mcast1}, 0x1c) clone(0x4412c580, 0x0, 0x0, 0x0, 0x0) 07:30:25 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:25 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="183700000200000000000000000000000040fcfffcffffff8500000032000000850000009e0000007a883000010000009500"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x7f, &(0x7f0000000200)=""/127, 0x41100, 0x10, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f00000002c0), 0x8, 0x10, 0x0}, 0x78) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x2, &(0x7f0000000000)=@raw=[@initr0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:30:25 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0}) 07:30:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) [ 318.514801][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:25 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 07:30:25 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x45a002, 0x0) pwritev(r0, &(0x7f0000000480)=[{&(0x7f0000000680)="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", 0x981}, {&(0x7f00000000c0)='W;', 0x2}, {&(0x7f0000000140)="0e", 0x1}, {&(0x7f0000000240)="bd", 0x1}], 0x4, 0x7fff, 0x0) [ 319.013134][ T9729] Bluetooth: hci2: command 0x0406 tx timeout [ 319.020245][ T9729] Bluetooth: hci4: command 0x0406 tx timeout [ 319.107786][ T9729] Bluetooth: hci5: command 0x0406 tx timeout 07:30:26 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x45a002, 0x0) pwritev(r0, &(0x7f0000001740)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}], 0x9, 0x0, 0x0) 07:30:26 executing program 1: r0 = memfd_create(&(0x7f0000000780)='\xa5\x80\x13_\f{+]n\xe3$Am\xf1*\xf27\x02\xd0\xef@C/\xc9\x12\xbas\xa7U\x15S\x0f\xfd]\xbb\xa3\x9c\xb2\xd2\xd9\x82\x1c\xdb\xa0\x8f\x934\x98\xd3|\x8ad\xbc\x94yhm\xb1PaU6\x84S\x98\xb3\x89{EG&\x96*\x130Z(M\xad}\xda\xcb6\xaa\xcf\t\xdcUV$\xf4\xc9\x8b\x89\xa0\xe3\xfe\xab\xa2\f\xec\xf5F\x0f\xb2~\xb8\x90\xe5', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) write(r0, &(0x7f0000000000)='l', 0x1) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000540)='./bus\x00') [ 319.167278][ T9729] Bluetooth: hci0: command 0x0406 tx timeout [ 319.230193][ T9729] Bluetooth: hci1: command 0x0406 tx timeout [ 319.277265][ T9729] Bluetooth: hci3: command 0x0406 tx timeout 07:30:26 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="183700000200000000000000000000000040fcfffcffffff8500000032000000850000009e0000007a883000010000009500"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x7f, &(0x7f0000000200)=""/127, 0x41100, 0x10, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f00000002c0), 0x8, 0x10, 0x0}, 0x78) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:26 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:26 executing program 0: r0 = memfd_create(&(0x7f0000000780)='\xa5\x80\x13_\f{+]n\xe3$Am\xf1*\xf27\x02\xd0\xef@C/\xc9\x12\xbas\xa7U\x15S\x0f\xfd]\xbb\xa3\x9c\xb2\xd2\xd9\x82\x1c\xdb\xa0\x8f\x934\x98\xd3|\x8ad\xbc\x94yhm\xb1PaU6\x84S\x98\xb3\x89{EG&\x96*\x130Z(M\xad}\xda\xcb6\xaa\xcf\t\xdcUV$\xf4\xc9\x8b\x89\xa0\xe3\xfe\xab\xa2\f\xec\xf5F\x0f\xb2~\xb8\x90\xe5', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) writev(r0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000001040)='%', 0x1}], 0x2) [ 319.649570][ T38] kauditd_printk_skb: 7 callbacks suppressed [ 319.649586][ T38] audit: type=1804 audit(1627716626.466:104): pid=14160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/166/bus" dev="sda1" ino=14905 res=1 errno=0 07:30:26 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000850000000f00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x78) bpf$MAP_CREATE(0x16, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 07:30:26 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) 07:30:26 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 319.872029][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 320.100166][ T38] audit: type=1804 audit(1627716626.606:105): pid=14164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/220/bus" dev="sda1" ino=14912 res=1 errno=0 07:30:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) shmctl$SHM_UNLOCK(0x0, 0xd) 07:30:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc1}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:30:27 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) [ 320.416178][ T38] audit: type=1804 audit(1627716626.786:106): pid=14165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/220/bus" dev="sda1" ino=14912 res=1 errno=0 07:30:27 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:27 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r1, &(0x7f0000002d00)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f00000000c0)={0x14, 0x28, 0x1, 0x0, 0x0, "", [@typed={0x4}]}, 0x14}], 0x1}, 0x0) [ 320.699135][ T38] audit: type=1804 audit(1627716627.316:107): pid=14184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/167/bus" dev="sda1" ino=14928 res=1 errno=0 07:30:27 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:27 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='sys_exit\x00'}, 0x78) bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:30:27 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000580)=@raw=[@exit], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:30:27 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) [ 320.986348][ T38] audit: type=1804 audit(1627716627.806:108): pid=14191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/221/bus" dev="sda1" ino=13928 res=1 errno=0 07:30:28 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x28}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:30:28 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) 07:30:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) 07:30:28 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000850000000f00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0xc8e, 0x1, 0x40}, 0x40) [ 321.374531][ T38] audit: type=1804 audit(1627716628.196:109): pid=14210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/168/bus" dev="sda1" ino=13923 res=1 errno=0 07:30:28 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) shmctl$SHM_UNLOCK(0xffffffffffffffff, 0xc) 07:30:28 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, 0x0, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) 07:30:28 executing program 5: timer_create(0x0, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000140)={0x0}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{}, {r0}}, 0x0) [ 321.704842][ T38] audit: type=1804 audit(1627716628.466:110): pid=14225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/222/bus" dev="sda1" ino=14924 res=1 errno=0 07:30:28 executing program 0: r0 = syz_io_uring_setup(0x550, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_REMOVE_BUFFERS, 0x0) io_uring_enter(r0, 0x450e, 0x0, 0x0, 0x0, 0xf5ffffff) 07:30:28 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, 0x0, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) [ 322.310852][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:29 executing program 5: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x0, 0x0) 07:30:29 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:29 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001780)={&(0x7f0000001740)='./file0\x00'}, 0x10) setsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000001a00), 0x4) 07:30:29 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, 0x0, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) 07:30:29 executing program 0: mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 07:30:29 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:29 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='sys_exit\x00'}, 0x78) bpf$MAP_CREATE(0x3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0xc8e, 0x1, 0x40}, 0x40) 07:30:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) 07:30:29 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) 07:30:29 executing program 1: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, 0x0) 07:30:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x6d) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r1, 0x1) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) [ 323.059190][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 323.112149][ T38] audit: type=1804 audit(1627716629.927:111): pid=14267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/223/bus" dev="sda1" ino=13840 res=1 errno=0 [ 323.152945][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 323.213155][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:30 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) [ 323.378024][ T38] audit: type=1804 audit(1627716630.157:112): pid=14272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/223/bus" dev="sda1" ino=13840 res=1 errno=0 07:30:30 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000850000000f00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0, r0}, 0x10) bpf$MAP_CREATE(0x9, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0xc8e, 0x1, 0x40}, 0x40) 07:30:30 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:30 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) shmctl$SHM_UNLOCK(0x0, 0xb) 07:30:30 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) 07:30:30 executing program 1: pipe2(&(0x7f0000001180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[], 0xffbf) write$9p(r1, &(0x7f0000000080)="2c5b97d7cb80cfa1d137421219bab4cfc299ce44f1bef6cb325d0a296bb0dfa0a5d43124e609b28a1ab8294c952be2349b6359fa37a6f1ef1e77aee9f93a43b74395", 0x42) readv(r0, &(0x7f0000000280)=[{&(0x7f00000011c0)=""/4096, 0x1000}], 0x1) 07:30:30 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) 07:30:30 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x45a002, 0x0) pwritev(r0, &(0x7f0000001500)=[{&(0x7f0000000040)="25420349e9b64364d7307d9e643362f47d875bd587b87cbeca215269ab3dc7d815592f94cc10be6bfb9ef97954f3f527b98a8681ef7af83be59bbc4601c1e356bf", 0x41}, {&(0x7f0000000140)="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", 0xfbe}, {&(0x7f0000001140)="e2", 0x1}, {&(0x7f0000001240)="90", 0x1}], 0x4, 0x800000, 0x0) 07:30:30 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') pread64(r0, &(0x7f0000000380)=""/102400, 0x10001, 0x1fcd) [ 324.065606][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:31 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) 07:30:31 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) [ 324.492636][ T38] audit: type=1804 audit(1627716631.307:113): pid=14305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/224/bus" dev="sda1" ino=13891 res=1 errno=0 07:30:31 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fb1(0xffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$FBIOBLANK(r0, 0x4611, 0x3) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) set_mempolicy(0x0, 0x0, 0x0) openat$cachefiles(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) mlock(&(0x7f0000480000/0x2000)=nil, 0x2000) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 324.705567][ T38] audit: type=1804 audit(1627716631.367:114): pid=14306 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/224/bus" dev="sda1" ino=13891 res=1 errno=0 07:30:31 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp6\x00') read$FUSE(r0, &(0x7f00000020c0)={0x2020}, 0x2020) 07:30:31 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) [ 324.944476][ T38] audit: type=1804 audit(1627716631.757:115): pid=14318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/172/bus" dev="sda1" ino=14114 res=1 errno=0 07:30:31 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:32 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(0x0, r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) [ 324.952760][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:32 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0x40046603, &(0x7f0000001dc0)) [ 325.026188][ T38] audit: type=1804 audit(1627716631.847:116): pid=14323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/172/bus" dev="sda1" ino=14114 res=1 errno=0 [ 325.335571][ T38] audit: type=1804 audit(1627716632.157:117): pid=14329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/225/bus" dev="sda1" ino=14919 res=1 errno=0 07:30:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/kexec_crash_size', 0x281, 0x0) [ 325.362412][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 325.399059][ T38] audit: type=1804 audit(1627716632.207:118): pid=14334 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/173/bus" dev="sda1" ino=14939 res=1 errno=0 [ 325.441429][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 325.525959][ T38] audit: type=1804 audit(1627716632.347:119): pid=14334 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/173/bus" dev="sda1" ino=14939 res=1 errno=0 [ 325.601844][ T38] audit: type=1804 audit(1627716632.417:120): pid=14339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/225/bus" dev="sda1" ino=14919 res=1 errno=0 07:30:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb1(0xffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$FBIOBLANK(r0, 0x4611, 0x3) ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) exit_group(0x0) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) 07:30:33 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(0x0, r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) 07:30:33 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000080), 0x4) 07:30:33 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fb1(0xffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$FBIOBLANK(r0, 0x4611, 0x3) openat$cachefiles(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f00002c1000/0x4000)=nil) 07:30:33 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:33 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) 07:30:33 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(0x0, r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) [ 326.399363][ T38] audit: type=1804 audit(1627716633.217:121): pid=14359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/174/bus" dev="sda1" ino=14960 res=1 errno=0 [ 326.402401][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 326.659617][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 326.681377][ T38] audit: type=1804 audit(1627716633.257:122): pid=14358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/174/bus" dev="sda1" ino=14960 res=1 errno=0 07:30:33 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:33 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb1(0xffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$FBIOBLANK(r0, 0x4611, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) openat$cachefiles(0xffffff9c, &(0x7f0000000000), 0x420800, 0x0) mlock(&(0x7f0000480000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f00002c1000/0x4000)=nil) shmat(r1, &(0x7f0000000000/0x13000)=nil, 0x4000) [ 327.067827][ T38] audit: type=1804 audit(1627716633.307:123): pid=14358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/174/bus" dev="sda1" ino=14960 res=1 errno=0 07:30:34 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) 07:30:34 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x40085503, &(0x7f0000000080)) [ 327.939150][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:35 executing program 0: pipe(0x0) ioprio_set$pid(0x3, 0x0, 0x6000) socket$packet(0x11, 0x0, 0x300) 07:30:35 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:35 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) 07:30:35 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x40085503, &(0x7f0000000080)) 07:30:35 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 328.752190][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:35 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x40085503, &(0x7f0000000080)) 07:30:35 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) 07:30:35 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:35 executing program 5: socketpair(0x28, 0x1, 0x0, &(0x7f0000000080)) 07:30:35 executing program 0: openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 07:30:35 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) [ 329.226364][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fb1(0xffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$FBIOBLANK(r0, 0x4611, 0x3) 07:30:36 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) 07:30:36 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:36 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/kexec_crash_size', 0x281, 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) 07:30:36 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) 07:30:36 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) 07:30:36 executing program 1: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x0, 0x3938700}) [ 329.715570][ T38] kauditd_printk_skb: 7 callbacks suppressed [ 329.715586][ T38] audit: type=1804 audit(1627716636.537:131): pid=14430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/178/bus" dev="sda1" ino=13935 res=1 errno=0 07:30:36 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) [ 329.834375][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:36 executing program 0: getpid() sched_setscheduler(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_triestat\x00') read$FUSE(r0, 0x0, 0x0) 07:30:36 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:36 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) [ 330.066212][ T38] audit: type=1804 audit(1627716636.677:132): pid=14434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/228/bus" dev="sda1" ino=14968 res=1 errno=0 07:30:37 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) 07:30:37 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, 0x0, 0x0) [ 330.366010][ T38] audit: type=1804 audit(1627716636.737:133): pid=14430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/178/bus" dev="sda1" ino=13935 res=1 errno=0 07:30:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@ipv6_newnexthop={0x2c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_ENCAP={0x14, 0x8, 0x0, 0x1, @LWTUNNEL_IP_OPTS={0x10, 0x8, 0x0, 0x1, @LWTUNNEL_IP_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, @LWTUNNEL_IP_OPT_VXLAN_GBP={0x8}}}}]}, 0x2c}}, 0x0) fork() socket$nl_netfilter(0x10, 0x3, 0xc) 07:30:37 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 330.489639][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:37 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) [ 330.557090][ T38] audit: type=1804 audit(1627716637.297:134): pid=14450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/179/bus" dev="sda1" ino=14641 res=1 errno=0 07:30:37 executing program 1: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000900)='$)(\x00', 0x4) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:30:37 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, 0x0, 0x0) 07:30:37 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 330.785967][ T38] audit: type=1804 audit(1627716637.417:135): pid=14455 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/179/bus" dev="sda1" ino=14641 res=1 errno=0 07:30:37 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) [ 331.124960][ T38] audit: type=1804 audit(1627716637.847:136): pid=14462 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/229/bus" dev="sda1" ino=13935 res=1 errno=0 07:30:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/kexec_crash_size', 0x281, 0x0) write$cgroup_pid(r0, 0x0, 0x0) 07:30:38 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 331.263119][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:38 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 07:30:38 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, 0x0, 0x0) [ 331.311587][ T38] audit: type=1804 audit(1627716638.067:137): pid=14472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/180/bus" dev="sda1" ino=13953 res=1 errno=0 07:30:38 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) 07:30:38 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 331.497437][ T38] audit: type=1804 audit(1627716638.227:138): pid=14472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/180/bus" dev="sda1" ino=13953 res=1 errno=0 07:30:38 executing program 1: unshare(0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="b702000002005532bfa300000000000007030000fdfdfff67a0af0ffd8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000000000006a0a00fe00000000850000000a000000b70000000000000095000020000000009c050000002c9fbc429adad5ff4c6fa026093e530cf08ee200000000000000076b2feb4b6fd3d5707bfd2d84aaa3b1d4e984c45aa7e2b347a36f5662403e1b2be4cc7c2683918a0d411a9872971c5c56c7060d1e86ac65b0a2cb9cde010000001b000000f32f257e6873eb953ab12bda45c65549"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) unshare(0x40000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = socket(0x0, 0x0, 0x0) r4 = socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r1, r5, 0x0, r1}, 0x10) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) accept4(0xffffffffffffffff, &(0x7f0000000340)=@alg, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4001000024000b0f000000000000f10febca0546", @ANYRES32=r6, @ANYBLOB="00000000fffffffee20000000a0001005c000000b00e00000000000000000000000074653f4dc78d2e31ed4661bb61708e9c25079bdb1dfd838271cf67854b9b5c8a49b6a3c736a479dd694403b1d4e9a002580b8d330bd41194ab7bf2c97ca32d00000088adcdfaf822f855453ec08b88cb0767a2b575a27f4835b190e1e91c7648c1d73d84b7"], 0x140}}, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r2, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000280)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0xc, 0xd844, r0, &(0x7f0000000680)="782b7f35dc2393f633169807452333c46f196fc837a01d7a52395621ed37f029517fc31b54fed25826f2ef9fe255b2a1a78775ec3f65111922afa0987b56ffe8f8071f1f33b7f1c8bb8d1c7ad73da5097ee9f8f299f78118a91845ce31737ade0a6dfeef43afcb57b68e9369d2c42c87a544171d11ec103d506683452a5f50e76c4a87eb238f2d6c30ce0e788090ac159277c7494179f0712ba6ce1317d8b425fb935f538af6dfdcf793fb61f0f6d5c4219a04110aac89a2fce9057011e1e6c823ad014ccd448070dcc30e1b0578bfe43fa1bedf1b9f9488fb8191d243ce7bb479262c9a523c6d83259a4d4d25dabfff9b7d54c55e65bfa46e7825fd44b44a300ba3c5a323154d2b80326ebf40260151bd53700f9fd69a72876a3aac259be11fe3b3a1df3525d2572bbbb1dd3892da6da56fff3b721851cecfc15666a643a190196674f761ae4a64077ffc39f1f2a6d3f35e8d470b8a43a473714f1bfe9a03826c7c6f2dc564078184bf89fd65a5711a8d7d5392f43a23b5550590785d7241bfedf1660903be47d8869003a8d747a7788481b32ce5319b415eae3993371707c40e8b1d5166f81c1ab37e65463bbf7a1da99da9789406aba94e220639e7f504ca2755befa23a48f535705c0607795945ebc73da6b7178e5889fdc43db2568aaaee973f4667c162331fa25a66729e01090c57a6f448458b66dc252262b4c266a4cd1fab9fa66effc53b6a46bc3a322fcbda4f118b95f2923386e9ae622458e1bbba214da428ab092eadd21d08f2a2377c68a25f769f70b339f9007508d27de4a2e2a8236ce7ef703c601ace5df96b200ff70267a26943a49f5467375d5ffacae1eff73936a6a9e8076bb0b78943f315f739bdc44a7cee3df5abadae1763555cec29a5199a791c79249a745a473ce1014e94662dda56e15d76a8826297efed630a07fa3a1e6e3d7fa56ce7b2911d1dc2186ad077eb648e810c532f84c97bab69d858aa78ced275f5e6138e18cd8fe137da90f3e73cfe733e1e0bada4aebbfc87c00a8435efefa9fe41657ad54c46bd27d3d26b1bd36e06d874fd8c938be40dd050c2324cdf93b6335ae01beb3172222ea8ce7d60cc4a6f091f83cbc147ca489eb1f6aa63de5fde09900fc7db6ec9b05725b5c60f4f6e11e388e6c6ff3135ea6d7f1ecb6bf4aa5648f593ade547568e6dee6ab7f4794333d9b723e26a92a94e0e20ba336ca9d3be166c928b533b5fc00fe6c726f833240051108e1f5b89d30205042263cbc7acda13b0a156cb7190910c37331998c0bc0e395620bfeab4bb670a12d50ba593f54b979dfea85601a71a4aa24fe0debac70267b6dc71e9727acd55f8e021d35441b50699485bcf6b13c2bd02a03dd3a81274b15b466c95ae94b40d26a9a7548778d2e0b6770be822133674001825b6f442f95e043c590418cdb73968cc84302232efc873bcd3d0f747dbafaaeaacc9c6200e70d83d007f79a0d26ec12e1a5d02f683644e8fefd1d8c1138e7a7934511af5ee36839dc3f58dc5445b35cce51c6710c055033b312d71cf36f369c6b5bfb43a25cd251ab600aa19cd332afe1657aad8430905217aae94d4d909e87fcbbef29c75f1ad4640ed7794317bca0814cb20ee3d3f0ee29b185e2c0a7e7db671ea6b3860040cc1265f9dff7533eeef568680a02c3a9960ff1de42fdb66f1154cae1ee7a9dafc0535f5a5fc61fc3a9989277554bf19d367940b2d6590b48fa6a47c50327faaa236f66332b070aee6a7c9c85cb48ba95bdfa0b3c29f95f2919cc781bb78c6598938e993d80f86408c0a42342531b29ecafbeefa21368fdf9449346fa4b0b3ec2ba3319d4c92a1a40855636bac4c15f4845655ddff6ae8ad0fc505575b7624a16fec348e8dd548e3990eaf2430b4e42f9bfe63104c4aed182d90d8b87a6de945428fcecd017faf87b5ac1395436a7d80ad3105f772cc3875f1986ed29209d1528cd0f2b268ed638b0092d3aa1ed0a605f16521afa727eb67318007543932d1b615c5d1cc5e4889898d39127684c1715597aaa66db62c5d53aea6e3cfc9b489e35e8bdb81b7223e0c212481e681ccfe067d77586145760c48b35191bc5b85b5cf97e2b31dde2f7aa4e6f3726c293a46305c090277f3c3bca7e200309a746aedd1da0bba556f2999a8d7ad426b76f7006448219eeb3ae25a28807cd8fcfb3799797b3cd55164ee9c88bfc62c88b169b74d348762acb11f5fb45436390b8e20fd713af0ebf462b3681f46a7299cc03e66eb286bc456a1c45958fbceb5a3773a12f86bf5028bddf37445e4b1d0fafb5a366cf22660c614dd2f5a725265e9b551db55bdbdb07f98453b09941bf561c9256e1fe27ca2cb838c7bee0434e3feaffd073993b55abf64fb832124169c7e64f987d4f156e3439b853bf34032f8d6b0ba8e96705dbb4087835f8851b4fe8ea80cbd8f04c92a7056802c168bfcd37472f7ceab5cbe64d00586f1c640d82cb2aa88b4b4b2330b1139e8ade85b68dded94893e52f1726890677907ab974886b13a90a57742c9299e854a909ace144b514320c20c798e2734e7acee84c219945e51aa416ce10f4802c705a32c2f54428ccb210469842aea955d21ce365c1e0e85c009da4940ebb4be9408a609ac0e38d5059687e024020f9c662804d5534df2ead539d8ddf44aef33c26dd3189f192185abaf46620023c3ad58b68127afe5ce1225db466fbc038bafda70e23adea96340e7fdc6de0c16fb30a0dc7014ecb36924b3842c933806d596fa4213b0c20cdf16ec5e3eda64b013e4c33b1ce19f63d84c413e3b3bd776453e1ccff94120b0879098896f4a50078b936dca1b2ca95fa6e245290db0007e5e0c07e0fe2356582c55f57c4eca7a940f5959c3622b217ddf52af15eed60da7e01ebcb4cca6427b185075c47404032e5ae0b0b346c1bf4ffadd2e41374f73c1ef7cbae3e5a1e653c5ffd41779e95f942d163241aa9a1fa1c06bb7116150628692ee6919d9a0369ca872f0adeba4550b4113d82db18da6ee79afdc15fad011b2fd3a7eb05085422c4afe127eb3441ad9ac44226ee682eebba1d2ef62fc8ae972c074cca87ae56dd8e14c33134c8160a807fe63428038e1f836337f4ee8ef39c07dacf4fa256bd3a256d06ec68c88983a92a39a7e97f86292f7ca6122bb2100c57628c1e2859f34054d8d9e1c83e8e987f5ed8357c99d6d262250c5f6a951c702d31f2fd9b81f619d5e46ef5c5291756b3dc2f78b022249e2c6915f8d4130116de79ade85c6b26e1a44900d3dbc5f33c8f867a21c4d2e6b40f9b05d334388dd2daeb170ecd9c2be92c47dc4ecec93fdd8a1e4f3acaa367a0316608898dc2c2c5ab5570ed03a05f2ed8f54f4f56452d2cb270a5760c560e8cd5de31396253e7d8e99c65e78c87f91f24fbcd0ae12745e38f7d4e76d45129ee67aaca863db945352dc6349d59b15e721386d03f3cc70b5d4182da68aeec7036c6ea1560d6c9d6d1556abf7094c3c371add4bca073f1cf1496cd3c4f9cf88b9d68d3c1a37a480c3777e65017d9727018428a379b784bb54c472deef531a3574f2176358d48c3ffc7537c06e65929836c0670a5e8cd4a578c23373eb9fee94d2dac201db0bef8aa84b0228150b3bc42f1909a2ef8e67b5f03552aad5eb776616465685ce386983c578f705279b5d6deef2e18239cc8da39068c10c7b8c19832255851996c29ced125be4a9d5f1dff08e96691bdcd75356b02ba40f2a610b5b73d2402e6ad3db71fab2e9e3cf241707dbf11dd3a7979a285cc86f5a89a53a77cf9ccf6dfe07ed96364da5b2b8cd0f2b7664d65eb4124d2b3870790eb4f46fbab7a79cff7e65443f0748b27147703b2563bbef5f5f41a1c198ae293ed9a896e32ab0caa961c4e740dfee83eb94258f11a4f4c4afaacd8bcf5a6fcb90d3e7f075e2a357080666327e3e25493f875a38780e664e5a86a565ecd804639b12feae74907d03e659477c0e65e66f387e110bb23739bb20c8578487c54aee9ca6ad039e6716e37ac59abf687b766e248d6b8aab6b53c3e4a25221530bbb667a6cf128ba840153a788d32e54b66377e0d623ab8b2070ac6465e9640248401eec24d81419e35527b8a92e1774b497c67294f1136975c8724d6c27330f3af32a9bf00c527258d5b16b16fb2067560b79d0476377f91a840a844aeaabdb7ee832a95f62f3793e9cd56ee7903e6975edd787deeefa6298370c81e4d2b816fa2e5319e20cd123e2b19ef2f584702f40327487a7922828d56a6dab4774394589d7b36b48d9382df82f917d038651df2226d315666efde7972b105b0bd2e6e8424652efca66213be47d07a457f332c3022ea06aa45f2ae59f6db8cdfd88646d57d2ca34223d99c598c465c5587cd857ff33afe00a3dd405229fca5d225a56143cee455d779790ffad82c72cc93e822dd8438bc4efff996f8afb1ba2345d789716f9e76380c4c87e55e282776055741c4d4a6823f760ac3332ecf8074700d407ba07329c6e0c5739afcc4e3075d5aaf88821f842275d7a31653a67fb3794aeb0c02707f56c50e6aa5e9fada156e7c7be275382089b2f53820f97a8b2364ae6ee9529ed01e8da3a6e34d8657765c054b2d9e412124df914ad24f095468a8fbcdce7af8cfe3ce219e7c594d86bb3251a7f833f8a7c284804be82de7e558f50b18a5fab358809d619b58f341a8ec04001ee30f4c79a5ff58b94e7c3dc66e609b4db613b5d8a033b4255966a071a82d4d9345bdbbe5e59b15f4eba6d641092d43c32c7bad473d80ab3b6b879a7c0c364c88449762ddcb7a01faf55fbdd4dc22f2b6a224bde9eb38e7429dc8ee174f9b06bee8d762265749c870fa801135adef4dd39573be71ed0fb0f135a2667cda206795f8e282bcff7e8b7c29d73b0f092a738b6b3eeac654350180e42b8e1e0de55e955244817ee2907ec071afb04039abaea1ffe464fa6e0bf4946d7375051e04dcf9b865b9c81f30c43a026a725c19e98cf8fa5f470021e907b6d72d65bac41aaf702d8618fc451a4db247bd02913465f008957b5d8d9df2bb1434b683d65e5cdca376827231476f438b1ec8bc60f6178670c1c841eb99731196e5686c6c1eb6628f50dd5b3051c2b6427cff4055e9ecc2a530c0f36f72781df476e5bda77a6e4b36e699ac04ae2d5e25ad1c8d4a393aa5d1ada9c65e842d8ec041c6d90354104f22d98d2a672fdee641387855cdefd5e1dc3b147aa44a30e521fc41dd67bc7b74ccc6d072bf14ca50021a314839a27f81aa64dd375a36788e8655554908a2f24c500fa4fa38c54dcbfa2f95e6b264e56fd004f1baba8a2e18631f9ad6274590ed7376a567a37178ce27c33df4e9752b45579a2c8e80a8e5a45f37c74e7aba7399157b1ae46a76f88d1e0a7dac19340f06bb739e056ec25484f29c419717ffb1e0d37ecd9ce740932adc0eaf41a73a0dcbc5f5155291bfeb1627d9a52032bcfb63b40e02ea65cb2bbde3e5eebdd4141983300a49ad3ffe7261329cc986fc873b93bbd92868b5f3f3c406225ecb169c8587f03099f22da10fc8b718efc5794e395989e1fa226c5edde7dd3d7e8c4763ef5e06358e66ca9be3033fa7d9eafefb3d682799f7f9603f5f24d1c7d382e695003ea0487318af40c006bb8ab4ae546fef08c542c6ba02d4387283e5132a262a94a8ef74cc8ee571ac8f69c31ead354d6ba357a767171103539e12e431cf8316936382e6351755b3216a04c929bace0addc13d391de88eff3362cd3673d658a42dfe055365e139a07779714999", 0x1000, 0x9, 0x0, 0x3}]) splice(r2, 0x0, r1, 0x0, 0x406f408, 0x0) 07:30:38 executing program 0: sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, r0) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, 0x0, 0x40000) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000680), r1) openat$null(0xffffffffffffff9c, &(0x7f0000000900), 0x10000, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r2, &(0x7f0000002ec0)={&(0x7f0000002e00)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000002e80)={0x0}}, 0x40000) syz_genetlink_get_family_id$ieee802154(&(0x7f0000002f00), 0xffffffffffffffff) 07:30:38 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 331.764988][ T38] audit: type=1804 audit(1627716638.577:139): pid=14488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/230/bus" dev="sda1" ino=13953 res=1 errno=0 07:30:38 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) [ 331.882327][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 331.986740][ T38] audit: type=1804 audit(1627716638.697:140): pid=14493 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/181/bus" dev="sda1" ino=14958 res=1 errno=0 07:30:38 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') write$ppp(r0, 0x0, 0x0) 07:30:39 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 07:30:39 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(0xffffffffffffffff, 0x80044d03, &(0x7f0000000080)) [ 332.463953][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:39 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x15000000) 07:30:39 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 07:30:39 executing program 3: r0 = open(0x0, 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 333.015440][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:42 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x15000000) 07:30:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(0xffffffffffffffff, 0x80044d03, &(0x7f0000000080)) 07:30:42 executing program 3: r0 = open(0x0, 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:42 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 07:30:42 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x15000000) 07:30:42 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 335.770576][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(0xffffffffffffffff, 0x80044d03, &(0x7f0000000080)) 07:30:42 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 07:30:42 executing program 3: r0 = open(0x0, 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 335.970333][ T38] kauditd_printk_skb: 6 callbacks suppressed [ 335.970350][ T38] audit: type=1804 audit(1627716642.787:147): pid=14609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/232/bus" dev="sda1" ino=14995 res=1 errno=0 07:30:42 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x15000000) 07:30:43 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) [ 336.248543][ T38] audit: type=1804 audit(1627716642.867:148): pid=14609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/232/bus" dev="sda1" ino=14995 res=1 errno=0 [ 336.356054][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:43 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 07:30:43 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:43 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x15000000) 07:30:43 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x15000000) 07:30:43 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) 07:30:43 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:43 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, 0x0, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) [ 336.820975][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:43 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:30:43 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) 07:30:43 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, 0x0, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) [ 337.096432][ T38] audit: type=1804 audit(1627716643.917:149): pid=14644 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/233/bus" dev="sda1" ino=14674 res=1 errno=0 [ 337.226656][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:44 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 337.271071][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:30:44 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:44 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) 07:30:44 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, 0x0, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) [ 337.572664][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 337.691592][ T38] audit: type=1804 audit(1627716644.507:150): pid=14667 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/234/bus" dev="sda1" ino=15004 res=1 errno=0 07:30:44 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x15000000) 07:30:44 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={0x0}}, 0x0) 07:30:44 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) 07:30:44 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r2, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) 07:30:44 executing program 3: open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r2, r0, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:44 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:44 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) 07:30:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x20001, 0x4) clone(0x20102180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) [ 338.107313][ T38] audit: type=1804 audit(1627716644.927:151): pid=14684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/189/bus" dev="sda1" ino=14956 res=1 errno=0 07:30:44 executing program 0: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000008f00), &(0x7f0000008f40)='./file0\x00', 0x0, 0x0, &(0x7f0000009180), 0x0, &(0x7f0000009200)) 07:30:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r2, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) [ 338.154892][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 338.261124][ T38] audit: type=1804 audit(1627716645.017:152): pid=14684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/189/bus" dev="sda1" ino=14956 res=1 errno=0 07:30:45 executing program 3: open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r2, r0, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:45 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) 07:30:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x20001, 0x4) clone(0x20102180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) 07:30:45 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 338.467351][T14693] FAT-fs (loop0): bogus number of reserved sectors [ 338.480583][ T38] audit: type=1804 audit(1627716645.087:153): pid=14688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/235/bus" dev="sda1" ino=13891 res=1 errno=0 [ 338.563126][T14693] FAT-fs (loop0): Can't find a valid FAT filesystem 07:30:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r2, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) 07:30:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x20001, 0x4) clone(0x20102180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) [ 338.658563][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[], 0x68}}, 0x0) 07:30:45 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) [ 338.707867][ T38] audit: type=1804 audit(1627716645.457:154): pid=14703 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/190/bus" dev="sda1" ino=15019 res=1 errno=0 07:30:45 executing program 3: open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r2, r0, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x20001, 0x4) clone(0x20102180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) [ 338.893256][ T38] audit: type=1804 audit(1627716645.497:155): pid=14703 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/190/bus" dev="sda1" ino=15019 res=1 errno=0 07:30:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x40, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x40}}, 0x0) 07:30:45 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) 07:30:45 executing program 1: syz_mount_image$vfat(&(0x7f0000008f00), &(0x7f0000008f40)='./file0\x00', 0x0, 0x1, &(0x7f0000009180)=[{0x0}], 0x40, &(0x7f0000009200)={[{@uni_xlateno}, {@utf8}, {@nonumtail}], [{@subj_user={'subj_user', 0x3d, 'ipvlan0\x00'}}, {@fowner_lt}]}) recvmsg$unix(0xffffffffffffffff, &(0x7f000000a840)={0x0, 0x0, &(0x7f000000a780)=[{0x0}, {&(0x7f0000009580)=""/85, 0x55}, {0x0}, {0x0}], 0x4, &(0x7f000000a800)}, 0x21) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f000000a880)) 07:30:46 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 339.125492][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:46 executing program 0: syz_open_dev$usbmon(&(0x7f0000002340), 0x0, 0x0) [ 339.205561][ T38] audit: type=1804 audit(1627716645.827:156): pid=14719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/236/bus" dev="sda1" ino=14974 res=1 errno=0 07:30:46 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x40, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x40}}, 0x0) 07:30:46 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:46 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) [ 339.321479][T14733] FAT-fs (loop1): Unrecognized mount option "nnonumtail=1" or missing value [ 339.413239][T14733] FAT-fs (loop1): Unrecognized mount option "nnonumtail=1" or missing value [ 339.550546][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:46 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x40, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x40}}, 0x0) 07:30:46 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000009180)=[{&(0x7f0000008f80)="b2", 0x1}, {&(0x7f0000009000)="aa", 0x1}], 0x0, 0x0) 07:30:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20102180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000001c0), 0x4) 07:30:46 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) 07:30:46 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:46 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getegid() syz_open_dev$usbmon(&(0x7f0000002340), 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) 07:30:46 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x40, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x40}}, 0x0) [ 340.110983][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:47 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:47 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) 07:30:47 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000002340), 0x0, 0x202000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 07:30:47 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f00000003c0)='GPL\x00', 0x400, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:30:47 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x40, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x40}}, 0x0) 07:30:47 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) 07:30:47 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='smbus_result\x00'}, 0x10) [ 340.495475][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:47 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x40, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x40}}, 0x0) 07:30:47 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:47 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000002bc0)=[{{&(0x7f0000001780), 0x10, &(0x7f0000002b00)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0) 07:30:47 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) 07:30:47 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:47 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000180)) [ 341.037845][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:47 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) 07:30:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000080), 0x4) 07:30:48 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:48 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) clone(0x20102180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000001c0), 0x4) clone(0x80000, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000200)) 07:30:48 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, &(0x7f0000000080)) [ 341.356446][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 341.400708][ T38] kauditd_printk_skb: 10 callbacks suppressed [ 341.400724][ T38] audit: type=1804 audit(1627716648.217:167): pid=14811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/239/bus" dev="sda1" ino=15030 res=1 errno=0 07:30:48 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:30:48 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) 07:30:48 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:48 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:48 executing program 1: msgsnd(0xffffffffffffffff, &(0x7f0000000480), 0x8, 0x0) 07:30:48 executing program 5: openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(0xffffffffffffffff, 0x80044d03, &(0x7f0000000080)) 07:30:48 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x18, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x48}}, 0x0) 07:30:48 executing program 0: syz_mount_image$vfat(&(0x7f0000008f00), &(0x7f0000008f40)='./file0\x00', 0x0, 0x0, &(0x7f0000009180), 0x0, &(0x7f0000009200)={[{@fat=@showexec}]}) [ 341.756044][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:48 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001300)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:30:48 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:48 executing program 5: openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(0xffffffffffffffff, 0x80044d03, &(0x7f0000000080)) 07:30:48 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x44, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x44}}, 0x0) [ 341.984440][ T38] audit: type=1804 audit(1627716648.807:168): pid=14839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/240/bus" dev="sda1" ino=15033 res=1 errno=0 07:30:48 executing program 1: connect$netlink(0xffffffffffffffff, &(0x7f0000000000)=@unspec, 0xc) r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001e80)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001e40)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000008f00), &(0x7f0000008f40)='./file0\x00', 0x81, 0x2, &(0x7f0000009180)=[{&(0x7f0000008f80)="b222fff78f727e410377c442c34b301ec9341c68a6c85b0f2c256a52417f1741f6896240fe7fdced3980696b31dd21cd6a3439f0bbbef2625de8f18c564de14844f6c013fdc478238d4cd08bd4623caf6542e3ec3643e46305aaa22b3de76868", 0x60, 0x4}, {&(0x7f0000009000)="aabb21a59840bf9105fe13ad0cecc328b136047fea118dc4b1cd9757619600e7a9d0150a37ee35052f6ef43ac4fbdaa89c0e4492ec35c3df94f5bb66777789a90c44aaec92a0da357aa06089a3584e434f5651c5b8b6a8f061f7bc5717e61a", 0x5f}], 0x40, &(0x7f0000009200)={[{@uni_xlateno}, {@utf8}, {@nonumtail}, {@fat=@showexec}], [{@subj_user={'subj_user', 0x3d, 'ipvlan0\x00'}}, {@subj_role={'subj_role', 0x3d, ']@.+)#)'}}, {@fowner_lt}]}) recvmsg$unix(0xffffffffffffffff, &(0x7f000000a840)={&(0x7f0000009480), 0x6e, 0x0}, 0x21) getegid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000080)=0x1f, 0x4) [ 342.103067][T14842] FAT-fs (loop0): bogus number of reserved sectors [ 342.165316][T14842] FAT-fs (loop0): Can't find a valid FAT filesystem [ 342.278202][T14842] FAT-fs (loop0): bogus number of reserved sectors 07:30:49 executing program 5: openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(0xffffffffffffffff, 0x80044d03, &(0x7f0000000080)) [ 342.317500][ T38] audit: type=1804 audit(1627716649.137:169): pid=14851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/198/bus" dev="sda1" ino=15056 res=1 errno=0 [ 342.324277][T14842] FAT-fs (loop0): Can't find a valid FAT filesystem 07:30:49 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x44, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x44}}, 0x0) [ 342.408577][T14855] FAT-fs (loop1): Unrecognized mount option "nnonumtail=1" or missing value [ 342.457313][ T38] audit: type=1804 audit(1627716649.177:170): pid=14851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/198/bus" dev="sda1" ino=15056 res=1 errno=0 [ 342.514033][T14855] FAT-fs (loop1): Unrecognized mount option "nnonumtail=1" or missing value 07:30:49 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:49 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:49 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB="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"]) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) 07:30:49 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000002cc0)={'wpan3\x00'}) 07:30:49 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x0, &(0x7f0000000080)) 07:30:49 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x44, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x44}}, 0x0) 07:30:49 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 342.801674][ T38] audit: type=1804 audit(1627716649.617:171): pid=14869 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/199/bus" dev="sda1" ino=15039 res=1 errno=0 [ 342.916224][T14870] loop0: detected capacity change from 0 to 3472 07:30:49 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x0, &(0x7f0000000080)) 07:30:49 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x2c}}, 0x0) [ 343.128737][ T38] audit: type=1804 audit(1627716649.947:172): pid=14886 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/200/bus" dev="sda1" ino=15057 res=1 errno=0 07:30:50 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:50 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:50 executing program 1: syz_mount_image$vfat(&(0x7f0000008f00), &(0x7f0000008f40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000009200)) [ 343.274125][ T38] audit: type=1804 audit(1627716649.997:173): pid=14887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/241/bus" dev="sda1" ino=15056 res=1 errno=0 07:30:50 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x20000000) 07:30:50 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x2c}}, 0x0) 07:30:50 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x0, &(0x7f0000000080)) [ 343.400936][ T38] audit: type=1804 audit(1627716650.007:174): pid=14886 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/200/bus" dev="sda1" ino=15057 res=1 errno=0 07:30:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="0003"], 0x68}}, 0x0) [ 343.565789][ T38] audit: type=1804 audit(1627716650.377:175): pid=14903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/201/bus" dev="sda1" ino=15055 res=1 errno=0 [ 343.756622][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:50 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x2c}}, 0x0) 07:30:50 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:50 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000f80)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000e40)=@framed, &(0x7f0000000ec0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:30:50 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, 0x0) 07:30:51 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:51 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x20000000) [ 344.239396][ T38] audit: type=1804 audit(1627716651.057:176): pid=14923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/202/bus" dev="sda1" ino=15064 res=1 errno=0 07:30:51 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:51 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x44, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x18, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x44}}, 0x0) 07:30:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x200000000000011, &(0x7f0000000280)=0x5, 0x4) 07:30:51 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, 0x0) 07:30:51 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x44, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x18, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x44}}, 0x0) 07:30:51 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000043fe0000070600000ee60000bf050000000000001f650000000000006507000002000000270700004c0000001f75000000000000bf5400000000000007040000f0fff8ffad430100000000009500000000000000050000000000000095000000000000001c0a7900009d3c2792432a4fa650c512aee994a5642cb064ecd5615f3196e3359aceb7556e7e60bd5d2e4b5992de991371274fdff6e79fc722f15659a7c85615c1b88bc894123cfe2314e887c1677fbefd35893d883a2c559b7a34db461b1974af360eace66cec40d92706d0bbcc5bf6fec345ae9606c3c1a348f9b395592c1018e5e4b41b13000c943b2e4f57f482063fba9ec035883e2791a9e9dff3e8bfc7d1be000000820102b1900000000000000000387a601e3a3412086dee84efd375f0645f3301f55d3b9efdfbed9b430bcf0418e100bdff1c8bcfc0c229874bc3d2418bab997c8bef9aa55841caa572ddff9220c67c9e17bee524c3dc747445763ecb0a7f2cd12bc34b0fc0271124cfb5279195f701000000f77c71294bbfd85878726c1d3689085967722da6cb884d1afe82f7f722e38397996271700241094d272dd8b754b2dd36d44f92991a7817450bc7921dd372e621dd447b86e7ffd1bdc198deb495cac0995ca3ef6c1affb693ae366b0f11db6ee4830db4713e5ce6cac6a27e29f171b8e9f172c3db24558d77b8bf18be45c50b3fc005fa7b134dfc948f6015e0389d7f34cb9c02cf517c8ed7a9b6159c1446ef1c2ccff2bde95aa860ed9b836d6b8fcab7663d9bd8415e6f90fdb007b8f3e08de3a638c4fdb8562eb85173720c1df1147c9f5013c82fc98604bd70cd56609a6b739437e3010000d9cf81bcb1d262845762f6b0a284cc463b42492bab0f7b25895cc3ba8bf0b5e0fc018463d03a73fa85429725545128b0e9b550a13d0dd35092250bbce4f618cad2375a34c7f15c3096f300004468cf1aba4a6f21ed0eb3681c696320d3251b7eab79ad8b126500419e25a94ce13a7a96deac79c90b8df10b1e364cf97eaa49fd22942a0fad0d814f230f954eec84ebb7e20594e2e6f2371dda9fb3977f33c516aadc9bc51f23b12f761c4a0335cce4fbe7baafc8d0a6c6d8d0ebc2a2e97f0629af75bcc83cada15d686de0a0bebb94491b4b655f94dfa2ce197dc845ad83ddbcd4c896639831b8e5f254db99752a86b576337ec250c6f83b8cc300f8ffffffffffffe9f5f4628de6563809cdbe2101399c00000000000000000000000000000000d041c283edaef472d000d169d827488760c8eaba70ba10633e1ec690ac69650b22e9"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x20000000) 07:30:51 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040), 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:51 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x80082, 0x0) [ 344.697282][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:51 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d03, 0x0) 07:30:51 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x44, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x18, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x44}}, 0x0) 07:30:52 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:52 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040), 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:52 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x16, 0x5, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x7e, &(0x7f0000000640)=""/126, 0x0, 0xe, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0xfff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x1200, 0x12, 0x0, &(0x7f0000000380)="263abd040e98ff4dc870bd6688a8640888a8", 0x0, 0x1c8}, 0x28) 07:30:52 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x34, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x8, 0xc, 0x0, 0x1, [{0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x34}}, 0x0) 07:30:52 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000900), 0x10000, 0x0) 07:30:52 executing program 5: syz_open_dev$usbmon(&(0x7f0000002340), 0x7, 0x0) 07:30:52 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040), 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 345.942770][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:53 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x34, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x8, 0xc, 0x0, 0x1, [{0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x34}}, 0x0) 07:30:53 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f000000f340)={&(0x7f000000f300)='xprtrdma_post_recv\x00'}, 0x10) 07:30:53 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:53 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000043fe0000070600000ee60000bf050000000000001f650000000000006507000002000000270700004c0000001f75000000000000bf5400000000000007040000f0fff8ffad430100000000009500000000000000050000000000000095000000000000001c0a7900009d3c2792432a4fa650c512aee994a5642cb064ecd5615f3196e3359aceb7556e7e60bd5d2e4b5992de991371274fdff6e79fc722f15659a7c85615c1b88bc894123cfe2314e887c1677fbefd35893d883a2c559b7a34db461b1974af360eace66cec40d92706d0bbcc5bf6fec345ae9606c3c1a348f9b395592c1018e5e4b41b13000c943b2e4f57f482063fba9ec035883e2791a9e9dff3e8bfc7d1be000000820102b1900000000000000000387a601e3a3412086dee84efd375f0645f3301f55d3b9efdfbed9b430bcf0418e100bdff1c8bcfc0c229874bc3d2418bab997c8bef9aa55841caa572ddff9220c67c9e17bee524c3dc747445763ecb0a7f2cd12bc34b0fc0271124cfb5279195f701000000f77c71294bbfd85878726c1d3689085967722da6cb884d1afe82f7f722e38397996271700241094d272dd8b754b2dd36d44f92991a7817450bc7921dd372e621dd447b86e7ffd1bdc198deb495cac0995ca3ef6c1affb693ae366b0f11db6ee4830db4713e5ce6cac6a27e29f171b8e9f172c3db24558d77b8bf18be45c50b3fc005fa7b134dfc948f6015e0389d7f34cb9c02cf517c8ed7a9b6159c1446ef1c2ccff2bde95aa860ed9b836d6b8fcab7663d9bd8415e6f90fdb007b8f3e08de3a638c4fdb8562eb85173720c1df1147c9f5013c82fc98604bd70cd56609a6b739437e3010000d9cf81bcb1d262845762f6b0a284cc463b42492bab0f7b25895cc3ba8bf0b5e0fc018463d03a73fa85429725545128b0e9b550a13d0dd35092250bbce4f618cad2375a34c7f15c3096f300004468cf1aba4a6f21ed0eb3681c696320d3251b7eab79ad8b126500419e25a94ce13a7a96deac79c90b8df10b1e364cf97eaa49fd22942a0fad0d814f230f954eec84ebb7e20594e2e6f2371dda9fb3977f33c516aadc9bc51f23b12f761c4a0335cce4fbe7baafc8d0a6c6d8d0ebc2a2e97f0629af75bcc83cada15d686de0a0bebb94491b4b655f94dfa2ce197dc845ad83ddbcd4c896639831b8e5f254db99752a86b576337ec250c6f83b8cc300f8ffffffffffffe9f5f4628de6563809cdbe2101399c00000000000000000000000000000000d041c283edaef472d000d169d827488760c8eaba70ba10633e1ec690ac69650b22e9"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x20000000) 07:30:53 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000002340), 0x0, 0x0) 07:30:53 executing program 4: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r1, 0x2007fff) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:53 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x34, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x8, 0xc, 0x0, 0x1, [{0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x34}}, 0x0) 07:30:53 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1a) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 07:30:53 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000002ec0)={0x0, 0x0, &(0x7f0000002e80)={0x0}}, 0x0) 07:30:53 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000009180), 0x0, 0x0) getegid() [ 346.631909][ T38] kauditd_printk_skb: 5 callbacks suppressed [ 346.645392][ T38] audit: type=1804 audit(1627716653.447:182): pid=14992 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/245/bus" dev="sda1" ino=14243 res=1 errno=0 07:30:53 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x40, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x14, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x40}}, 0x0) [ 346.717110][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:53 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0xe300, 0x0) 07:30:53 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 346.820416][T15004] ptrace attach of "/root/syz-executor.0"[15003] was attempted by "/root/syz-executor.0"[15004] 07:30:53 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f0000002680)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) write$UHID_DESTROY(r0, &(0x7f0000000180), 0x4) read(r0, &(0x7f00000000c0)=""/172, 0xac) 07:30:53 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000002b00)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0) 07:30:53 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x40, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x14, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x40}}, 0x0) [ 347.039451][ T38] audit: type=1804 audit(1627716653.538:183): pid=14998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/208/bus" dev="sda1" ino=14419 res=1 errno=0 [ 347.200884][ T9729] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 07:30:54 executing program 4: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r1, 0x2007fff) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:54 executing program 1: syz_mount_image$vfat(&(0x7f0000008f00), &(0x7f0000008f40)='./file0\x00', 0x0, 0x0, &(0x7f0000009180), 0x0, &(0x7f0000009200)) [ 347.246265][ T9729] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 347.296017][ T9729] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 347.312367][ T38] audit: type=1804 audit(1627716653.738:184): pid=15008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/245/bus" dev="sda1" ino=14243 res=1 errno=0 07:30:54 executing program 5: syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) [ 347.321219][ T9729] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 07:30:54 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x40, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x14, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x40}}, 0x0) 07:30:54 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 347.476077][ T9729] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 347.487565][T15032] FAT-fs (loop1): bogus number of reserved sectors [ 347.505169][ T38] audit: type=1804 audit(1627716654.058:185): pid=15023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/209/bus" dev="sda1" ino=14561 res=1 errno=0 [ 347.547419][ T9729] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 07:30:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0xc03012f3, &(0x7f0000000080)={0x20000, 0x1000000, 0x20000000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, "c48a6d3603d523a69ff90a17af519874a5382cc41c27546f1e8e7f211b83d78310a87c14ba9d21d142589596495d53a92cc887327b48ada14e86f500", "a905a0f353c2bffc0200000000000000d7ed14f482660832264ed467647d91be36b84a29764861efd7f6e7ad7a911c047886083250e850687579a515fc6c07fd", "2e4ab4f23733107eb7385ade89a6284bf64fa86a1ce393f3ff89048d714c42a5"}) getpid() sched_setscheduler(0x0, 0x5, 0x0) [ 347.577284][T15032] FAT-fs (loop1): Can't find a valid FAT filesystem [ 347.595838][ T9729] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 347.610723][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 347.640754][ T9729] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 07:30:54 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x40, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x14, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x40}}, 0x0) [ 347.690550][ T38] audit: type=1804 audit(1627716654.408:186): pid=15036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/246/bus" dev="sda1" ino=14530 res=1 errno=0 [ 347.728893][ T9729] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 347.782829][ T9729] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 [ 347.816638][ T38] audit: type=1804 audit(1627716654.498:187): pid=15040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/210/bus" dev="sda1" ino=14181 res=1 errno=0 07:30:54 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:54 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x545c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "d0921e0e53fcf1f8a55ae3a4ee6c100130a888"}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 347.912883][T15032] FAT-fs (loop1): bogus number of reserved sectors [ 347.923072][ T26] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 347.944576][T15032] FAT-fs (loop1): Can't find a valid FAT filesystem [ 347.990300][ T26] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 348.043638][ T26] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 348.045510][ T38] audit: type=1804 audit(1627716654.538:188): pid=15038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/246/bus" dev="sda1" ino=14530 res=1 errno=0 [ 348.075635][ T26] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 348.147215][ T26] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 348.147573][ T38] audit: type=1804 audit(1627716654.968:189): pid=15061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/211/bus" dev="sda1" ino=14181 res=1 errno=0 [ 348.173476][ T26] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 348.231429][ T26] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 348.247592][ T26] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 348.289826][ T26] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 348.314222][ T26] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 07:30:55 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x40, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x14, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x40}}, 0x0) 07:30:55 executing program 4: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r1, 0x2007fff) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:55 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000180)=0x8000000, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xfffffffffffffee0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 07:30:55 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f0000002680)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) write$UHID_DESTROY(r0, &(0x7f0000000180), 0x4) read(r0, &(0x7f00000000c0)=""/172, 0xac) 07:30:55 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 348.499511][ T38] audit: type=1804 audit(1627716655.318:190): pid=15074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/212/bus" dev="sda1" ino=14626 res=1 errno=0 07:30:55 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x40, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x14, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x40}}, 0x0) [ 348.542186][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 348.568403][ T9798] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 348.590843][ T9798] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 07:30:55 executing program 1: mmap(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./bus\x00', 0x7) io_setup(0xb, &(0x7f0000000000)=0x0) io_submit(r1, 0xf10, &(0x7f0000000540)=[&(0x7f00000000c0)={0x5000010, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 07:30:55 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 348.647139][ T9798] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 348.680121][ T38] audit: type=1804 audit(1627716655.318:191): pid=15076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/247/bus" dev="sda1" ino=14642 res=1 errno=0 [ 348.717870][ T9798] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 348.758992][ T9798] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 348.807070][ T9798] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 07:30:55 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x44, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x44}}, 0x0) 07:30:55 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x189, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00005c0000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, 0x0, 0x0, 0x4) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index, 0x0, {}, 0x80, 0x0, 0x0, {0x0, 0x0, r3}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0xc000) mremap(&(0x7f00005c0000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f00006d6000/0x2000)=nil) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000), 0x0) [ 348.907284][ T9798] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 348.972349][ T9798] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 349.069706][ T9798] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 07:30:56 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 349.133932][ T9798] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz1 07:30:56 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x44, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x44}}, 0x0) 07:30:56 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f0000002680)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) write$UHID_DESTROY(r0, &(0x7f0000000180), 0x4) read(r0, &(0x7f00000000c0)=""/172, 0xac) 07:30:56 executing program 1: mmap(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./bus\x00', 0x7) io_setup(0xb, &(0x7f0000000000)=0x0) io_submit(r1, 0xf10, &(0x7f0000000540)=[&(0x7f00000000c0)={0x5000010, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 349.457794][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:56 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:56 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 349.707598][ T9729] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 349.741668][ T9729] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 07:30:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x44, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x1c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x44}}, 0x0) [ 349.797187][ T9729] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 349.856278][ T9729] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 349.912675][ T9729] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 07:30:56 executing program 1: mmap(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./bus\x00', 0x7) io_setup(0xb, &(0x7f0000000000)=0x0) io_submit(r1, 0xf10, &(0x7f0000000540)=[&(0x7f00000000c0)={0x5000010, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 07:30:56 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x1b, 0x0, "0c7f70a167f6cc188cb61c00e740c14c32a9ab322fb8b57bba37c4d876ef58517c2cdde4c2a04a84ecfa7964b4f2f052f4a01d6fb697e016813b74913884da38", "941acb4e4d0917915e0930ccead6e91780ed6d9677f412287b88d52644d882c5", [0xffff8001, 0x64]}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 350.012145][ T9729] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 07:30:56 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 350.093963][ T9729] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 350.110797][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 350.147318][ T9729] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 07:30:57 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x189, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00005c0000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, 0x0, 0x0, 0x4) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index, 0x0, {}, 0x80, 0x0, 0x0, {0x0, 0x0, r3}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0xc000) mremap(&(0x7f00005c0000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f00006d6000/0x2000)=nil) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000), 0x0) 07:30:57 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 350.199379][ T9729] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 350.279401][ T9729] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz1 07:30:57 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) readv(r0, &(0x7f0000002680)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) write$UHID_DESTROY(r0, &(0x7f0000000180), 0x4) read(r0, &(0x7f00000000c0)=""/172, 0xac) 07:30:57 executing program 2: mmap(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x58003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./bus\x00', 0x7) io_setup(0xb, &(0x7f0000000000)=0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x4e24, 0x0, @rand_addr=' \x01\x00', 0x4a}, 0x1c) io_submit(r1, 0xf10, &(0x7f0000000540)=[&(0x7f00000000c0)={0x5000000, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 07:30:57 executing program 1: mmap(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./bus\x00', 0x7) io_setup(0xb, &(0x7f0000000000)=0x0) io_submit(r1, 0xf10, &(0x7f0000000540)=[&(0x7f00000000c0)={0x5000010, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 07:30:57 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 350.539397][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 350.655495][ T9729] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 350.676323][ T9729] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 07:30:57 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 350.743654][ T9729] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 350.794376][ T9729] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 350.876735][ T9729] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 07:30:57 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x189, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00005c0000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, 0x0, 0x0, 0x4) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index, 0x0, {}, 0x80, 0x0, 0x0, {0x0, 0x0, r3}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0xc000) mremap(&(0x7f00005c0000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f00006d6000/0x2000)=nil) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000), 0x0) 07:30:57 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:57 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8001}) perf_event_open(0x0, 0x0, 0x7, r0, 0x2) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000001400)="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", 0xe00) umount2(&(0x7f00000000c0)='./file0\x00', 0x4022b104ded556bf) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000100)=ANY=[@ANYBLOB]}) lseek(0xffffffffffffffff, 0x864, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4004240b, 0x0) sendfile(r0, r1, 0x0, 0x11c00) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1}, 0x1c) connect(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x4e21, @remote}, 0x80) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4000000000000d7, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb05) [ 350.961247][ T9729] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 350.995839][ T9729] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 351.044804][ T9729] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 351.064186][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 351.087662][ T9729] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 07:30:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800005, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r1, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10) listen(r1, 0x0) accept4$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x2711}, 0x10, 0x80000) 07:30:58 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 351.154408][ T9729] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz1 07:30:58 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) read$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5aba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x22060400) r2 = gettid() unshare(0x30000080) unshare(0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) clone(0x6cbaa500, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) wait4(0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 07:30:58 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x189, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00005c0000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, 0x0, 0x0, 0x4) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index, 0x0, {}, 0x80, 0x0, 0x0, {0x0, 0x0, r3}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0xc000) mremap(&(0x7f00005c0000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f00006d6000/0x2000)=nil) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000), 0x0) 07:30:58 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:30:58 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = inotify_init1(0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40046607, 0x0) [ 351.553634][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:58 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 351.785100][T15194] ptrace attach of "/root/syz-executor.0"[15188] was attempted by "/root/syz-executor.0"[15194] [ 351.868941][ T38] kauditd_printk_skb: 20 callbacks suppressed [ 351.868959][ T38] audit: type=1804 audit(1627716658.678:212): pid=15195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/219/bus" dev="sda1" ino=15081 res=1 errno=0 07:30:58 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 352.234987][ T38] audit: type=1804 audit(1627716658.718:213): pid=15195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/219/bus" dev="sda1" ino=15081 res=1 errno=0 07:30:59 executing program 2: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = socket$inet(0x2, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000001c0)=0x4, 0x1f) r2 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = open(&(0x7f0000000100)='./bus\x00', 0x11250c2, 0x0) r4 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000), 0x4) sendfile(r0, r3, 0x0, 0x8000fffffffe) [ 352.406249][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:30:59 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800005, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af60, 0x0) 07:30:59 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800005, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)='$\x00\x00\x00O\x00', 0x6}], 0x1}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xffffff2c) splice(r1, 0x0, r3, 0x0, 0x4ff60, 0x0) [ 352.648568][ T38] audit: type=1804 audit(1627716659.098:214): pid=15205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/253/bus" dev="sda1" ino=15088 res=1 errno=0 07:30:59 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) getpgid(0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r1, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:30:59 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800005, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000000)={'fscrypt:', @desc2}, &(0x7f0000000040)={0x0, "f3c0aa0a44beeb5e0100000000000000e55cc05afdb671d97089806be242a076b36569151e96082458e408005ec3868628da12ec965e243725e1b21000"}, 0x48, 0xffffffffffffffff) keyctl$chown(0x4, r1, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:30:59 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 352.945230][ T38] audit: type=1804 audit(1627716659.278:215): pid=15205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/253/bus" dev="sda1" ino=15088 res=1 errno=0 07:30:59 executing program 1: perf_event_open(&(0x7f0000003440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800005, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x12, &(0x7f0000000040)={@multicast2, @local}, 0xc) [ 353.107463][T15252] __nla_validate_parse: 4 callbacks suppressed [ 353.107485][T15252] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 07:31:00 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000a800000095"], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 353.296342][ T38] audit: type=1804 audit(1627716659.408:216): pid=15226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/220/bus" dev="sda1" ino=15082 res=1 errno=0 [ 353.337677][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:00 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:00 executing program 2: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000000140)) 07:31:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) write$binfmt_elf64(r0, &(0x7f0000002f40)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0xec1) [ 353.565113][ T38] audit: type=1804 audit(1627716659.428:217): pid=15223 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/220/bus" dev="sda1" ino=15082 res=1 errno=0 07:31:00 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) getpgid(0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r1, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 353.692442][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 353.771885][ T38] audit: type=1804 audit(1627716659.438:218): pid=15226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/220/bus" dev="sda1" ino=15082 res=1 errno=0 07:31:00 executing program 2: socket(0x11, 0xa, 0x7fffffff) 07:31:00 executing program 0: syz_io_uring_setup(0x681, &(0x7f0000001080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 07:31:00 executing program 1: syz_io_uring_setup(0x681, &(0x7f0000001080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xc) 07:31:00 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 353.914819][ T38] audit: type=1804 audit(1627716659.898:219): pid=15251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/221/bus" dev="sda1" ino=15090 res=1 errno=0 [ 354.029054][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:00 executing program 2: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x10) syz_io_uring_setup(0x450a, &(0x7f00000000c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000140)) [ 354.117127][ T38] audit: type=1804 audit(1627716659.908:220): pid=15249 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/221/bus" dev="sda1" ino=15090 res=1 errno=0 07:31:01 executing program 1: select(0x7, &(0x7f0000000000)={0x10}, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x77359400}) 07:31:01 executing program 0: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x2710}) [ 354.236118][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 354.328332][ T38] audit: type=1804 audit(1627716659.948:221): pid=15249 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/221/bus" dev="sda1" ino=15090 res=1 errno=0 07:31:01 executing program 5: clone3(&(0x7f0000000040)={0x12081900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:31:01 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) getpgid(0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r1, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:01 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000004c00)=[{{0x0, 0x0, &(0x7f0000004300)=[{&(0x7f0000002700)="852e6296c5b2a3473473391919bfd56b32a72a1f47294a449d3eb8602562dadafecbb29650ee2ec554abf4ed002515de95d916a88e4966ae5485673dc0ee8f03a971862bfb58805b38c681a27348d3e2fa7ebbf2ba4694bb3285282efc3151a494b6bcbdb97bef97ccc7b67d9d121d771c83b0ee02d5bb2aae214c9c508a7881c68db25ab47e51d7286622fe77bb72f7637457fdfc155793290a53c23d944f622deb85460adf335a50dea8c10879f965bedb4ce7d5d943998a3de68508ec2918734f38019e868451", 0xc8}, {&(0x7f0000003a80)="a02b90390003a8977de66daaaeb79af54533bdd074435cfb7528e4b1d469654bf54bc2f3fe457a6c8c59afd533a4420bf05e1dd59a98f427d3abddfc844f77c9e3b45ada4d9562c9", 0x48}, {&(0x7f0000003f00)="e46c710fa682a4a398dcedccf3546512b14401c5021ba347cc54f441e7ec6286df755a4a9814b7588aa0cd50fd663cb31e15fc154e8c7b2fb6df1ee475c2d562cd5c5b3364d59bd9e65652e912e620a0fff888d0015de0cb669e9d66eaac6107335aa78e87bb69", 0x67}, {&(0x7f0000000280)="85", 0x1}], 0x4}}, {{0x0, 0x0, &(0x7f0000004740)=[{&(0x7f0000007280)="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", 0x8b1}, {&(0x7f0000008c80)="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", 0x500}], 0x2}}], 0x2, 0x8040) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$alg(r1, &(0x7f0000003ec0)={0x0, 0x0, &(0x7f0000003e40)=[{&(0x7f00000000c0)="ad1ef6bc335e8fdef773020946e1", 0xe}, {&(0x7f0000000100)="448083bbe40171004ca049eb52df03ec4ef067c8f14a57c4ca2122b5de24effd245c45479c1594f7126137e528b283e55ed616a45bfe47c9d7b03547b33074098a93efdc9a7384c8fe88038ed14f21cbaab5a8e5e258d328ed7b74b11d3b030f6aba46672b49fc5ab06f99baf512fada99f08a25e85833bd40202a1502e33fe432b395c0cd094fa0d287009ed4b731c1148b56883b5a58af98f782e34e1a51243b691523fe95b5ff5b905ee9a04ff06af10caa6ac1cf3df275b6c4f195d71d5fa764075eceb0cd508dde4eede264fa1675aaf755d8d9caa2471d2f3b0ff6dd6fd39ed6511244dd54f647f08b4319ba979e0ba4", 0xf3}, {&(0x7f0000003b00)="c1b4fbcc306fb73992f9f4d0af692d33658fb5247505dc9eee636d1c3090b7a4a36c05732ca2d004508bcb037c19655dacf3e92b906059750d8c827f78db650e40c22f7162c27a019c394bf598e23134ebdcb0bb428a0865c7c55490874cae4b09b29d26593aa5a8fdd18ce428cd307aafffb3eb070c1cf9664e8501b111cb8b3fef037dfc8c4b6dd28b55905cf1c2943e2b8e9f07580a555e969a7a5fccf279387601ff7bc7ebd25f8a7ae3a88c90e0eab4564ba043d67d7f73d4526a37436273412a4e4deed368943aaef7aed534e393e34639d4fbca10dae1ac7b8679c6c091ef85a4f8b00da50566a3810ccd47557649e29a77", 0xf5}, {&(0x7f0000009740)="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", 0xffe}], 0x4, &(0x7f0000003c00)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000008940)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000028c0)=""/211, 0xd3}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 07:31:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010028bd7000ffdbdf250600000008"], 0x70}}, 0x0) 07:31:01 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x40081271, 0xffffffffffffffff) [ 355.083520][T15306] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.1'. 07:31:02 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x127b, 0xffffffffffffffff) [ 355.159843][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 355.178837][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:02 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVE(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0xe4, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xd0, 0x1, 'N\xb7\x00\x00\x00\x00\b\x82|\xa5\x1c*\xd1(\xa7\xa93\x04uK\xee\xb6-\xcb%\xde\x9b4,74#\x05\x14\xf4\xea\xffgj\x18\xa7\xa1Ih\xb9\x94\xbfL\x16|-w\x0e\x93\x9fLA\xa4>.\xbe\xf1\xe7l\x8a\x9e,\xeb\x17\x93\x1f\xb7\x16\xb6\xf6\x9a\xb1\xc0Y\xea\xbd+l\xb8\xce\x1bj\xe3_\\ff\x8a\xb6w#\x963X\xbf\x12\xfe\x0f?mU\xa7`\xc8NC\xb7\xf3\xbe}!\xd7\x97O3L\xceue\xae3\x11/bU\xd3)\x9b\xfb\xbd\xb2\xe2\xa5\x7fL\xa6\xdc\xc3\xeb\xc7\x1fK\x9fp[0\xf7\x9fH{nG\xc1\x01\x98\x1e\xd7\xa8\xd2\xe5?\xcdr\x11\xcd\x14\xc7l\xc8erA\vf\x84!n\x01 \xb8\xfd\x1cH\xac\xd6\x97\xf0L\xbe\xa8\x00\x00\x00\x00\x00\x00\x00\x00\x00'}]}, 0xe4}}, 0x0) 07:31:02 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0xf0}, 0x0) 07:31:02 executing program 5: r0 = syz_io_uring_setup(0x6459, &(0x7f0000000000), &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x10000000) 07:31:02 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:02 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r1, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000002980)={&(0x7f0000000340)=@proc={0x10, 0x0, 0x36000}, 0xc, &(0x7f0000002940)=[{&(0x7f0000000380)={0xec4, 0x0, 0x0, 0x0, 0x0, "", [@generic="d587eeeb911d09130ae18476d0087036d917906c6496b7d8946630471cbd081d0b4dc4454c76010383388ee0bccefb4ddb8cd909f2409e49", @generic="96b9c7f3d27ac1c9232061a7464af43adf030b7fc2a7e256e5042e20cb2fc48fed7faf9a838f5e4f69aaf47a9f17bce88da8be75f87f6adfeaab98cc3d524bb15dd19a024f14f2a829bc649e6cca9ed9731755bb7ae2c6ba02bec7093b29b044dbe59001644e72557651aa2e9b246cd5049906c522ad76f4b2e0fa10804af70a1231efa62b3127f8b36da3095d129772571ab1866518786cd8beb63bc3f515c1312600c1bcf64e50633cca56ad6481c2", @typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="5ec7c84cace7d3cb22923330c65fd57a701d138512618e85a74168add81f1cc60bd3af3eaa594ac9bff7bc813fe877c5c859905b8b32c824060f6466832eccba897edf13c928865021b8334c04c92c6dceecdd508d1c4c31c2c79f8df6c3020096dad7c0f30b86c7d315e8b2d54b01ec7f35224ac7f11b6b9070221e19aa7911ff94b5c0ccd00ac4cdfee82ce934194fc430a3d5e34b12c3adbeee433f78e572d4d81af542f4c8a28a9efa88d007a150d5", @typed={0x81, 0x0, 0x0, 0x0, @binary="d365167b2c9befb3362322b2ba66b7aa69d9446aa0e6039e932997e5777b7b81dfc79366ddf2a4f79b115c4ce99ce8f508635057ce1ae9bf0b3ee82fdd7ac7af9522b4fc911f4c55ccfddea05dee3d98e1809569dc401ed09d39544794e9b95bc9bf58e4e44f6b54959035e8c10dd7b272da07499b690a2475c8752818"}, @generic="885cfcbbfebeb8097a64fcfa5e45b2d9748d518bc25c3c9b4c3af3001f609807c2653e79ae6a3bd6d281126d940a71cdb3ef515f701c7faca94ee21c68bef49d406f0e0d3e926c94f35aacfa67470c4c704199d5c34b63162d7bdd80eee04297ab649e066b746af309e27e1e7cf1f1967ffc4c28f8f6c355cebe17bd8650eb58469ccf7a", @nested={0xc05, 0x0, 0x0, 0x1, [@generic="06cf9de1bceff00cb268083b7346b9b4d9acc7508d3552421954f4f61c4ee0bfb85ef95ad86688124c2cd1eef451bb1d8c3e355de917cb02e79db42e29791f3f964107adf7ee21a7e547ab126f3b950e6816830adc5ea5a7802bb2e370de4afdc7d72d544770acb72299e399dbc90691b85b88b293cbd57c35aa8bf20be701dac8723e82a584e62843523aacbd0d7a2521742556e5ee70cc139ac87a907dac8cd4c6cdff56aba384aaa02e", @typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="1f0400481a74d81885b0842204fd001036738aa2394f3926ac8ea1dd9c15e7f52b6ccf4d68eaaef4e93baba34bce1dcf69f462a119601cfca78c5ab4522c4555b1f194b8dfb16549b847200a18d19766f7d7975ecf81297d07104ea6", @typed={0xe5, 0x0, 0x0, 0x0, @binary="c89b1bac4b4c17bffdc3502d478cf537855c00353e197de51a9c51ba8d43fc7540c5410c69b44a30cea4f8989eba91c0d6a8f71c15b1db1cb212554ef0cccff76ad4a268589006911cbf1e37603c59f0407b7044d6df8fda261969d7017b2d7f4dfe6deb56bf3fa739fe6d4ac37c8d05c4e8204f0277db62bbe7e489ebe0052da89c19ea836a97721b8775dffced92634b3891d77a051a1dc78ddeb822c346672cc4264c23866cf2fbaf37f639707becb894dddd857863233adc91e9dc7f6e61c786abaefa8f41f29dc09ea5e96055cb82206102c04ceafa5f17157cf2d8685d56"}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@empty}, @generic="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"]}]}, 0x33fe0}], 0x1}, 0x0) 07:31:02 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100), r0) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r1, 0x301}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r0) 07:31:02 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000580)={&(0x7f0000000000)={0x2}, 0xc, &(0x7f0000000540)={0x0}}, 0x0) [ 355.650714][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:02 executing program 5: mlock(&(0x7f0000ff8000/0x2000)=nil, 0x2000) msync(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0) [ 355.764259][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:02 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:02 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000003940), 0x0, 0x0) lseek(r0, 0x1, 0x0) 07:31:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$netlink(r0, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000040)={0x10}, 0x10}, {&(0x7f0000000140)={0x10}, 0x10}], 0x2}, 0x0) 07:31:02 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r1, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000002240)={0x10, 0x10, 0x1}, 0x10}], 0x1}, 0x0) 07:31:02 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="d0000000", @ANYRES16=r2, @ANYBLOB="010025bd7000fedbdf2506000000080005000a01010208000400ac1414312800070073797374656d5f753a6f62"], 0xd0}}, 0x0) [ 356.139997][T15349] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15349 comm=syz-executor.2 [ 356.167155][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:03 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80104592, &(0x7f0000000100)=""/112) [ 356.222695][T15349] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15349 comm=syz-executor.2 [ 356.312125][T15355] netlink: 132 bytes leftover after parsing attributes in process `syz-executor.5'. [ 356.345632][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:03 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:03 executing program 1: futex(0x0, 0x9, 0x0, &(0x7f0000000040), 0x0, 0x0) 07:31:03 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x100) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r1, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:03 executing program 2: syz_open_dev$rtc(&(0x7f0000000000), 0x3, 0x200) 07:31:03 executing program 5: syz_open_dev$rtc(&(0x7f0000000000), 0xffffffffffffffff, 0x22a002) 07:31:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x30b2}, 0x0) 07:31:03 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, 0x0) 07:31:03 executing program 2: sysfs$2(0x2, 0x2, &(0x7f0000000000)=""/168) [ 356.707653][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 356.730985][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:03 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="fffff1ffbfff0000001003"], 0x14}}, 0x0) 07:31:03 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x1262, 0xffffffffffffffff) 07:31:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/protocols\x00') read$FUSE(r0, &(0x7f00000020c0)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 07:31:03 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x8000000) 07:31:03 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r1, 0x2007fff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 357.233261][ T38] kauditd_printk_skb: 27 callbacks suppressed [ 357.233278][ T38] audit: type=1804 audit(1627716664.058:249): pid=15391 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/228/bus" dev="sda1" ino=15101 res=1 errno=0 07:31:04 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x1260, 0xffffffffffffffff) [ 357.274409][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:04 executing program 0: r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000480)='./bus\x00', 0x4000, 0x0) sendfile(r0, r2, 0x0, 0x40d10) 07:31:04 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff7000/0x3000)=nil, 0x7ffffffff000, 0x0, 0x10, r0, 0x8000000) 07:31:04 executing program 1: syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x101101, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 07:31:04 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 357.419369][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 357.436273][ T38] audit: type=1804 audit(1627716664.108:250): pid=15391 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/228/bus" dev="sda1" ino=15101 res=1 errno=0 [ 357.670935][ T38] audit: type=1804 audit(1627716664.188:251): pid=15394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/260/bus" dev="sda1" ino=15102 res=1 errno=0 [ 357.816271][ T38] audit: type=1804 audit(1627716664.348:252): pid=15399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir198003399/syzkaller.eKreqG/325/bus" dev="sda1" ino=14212 res=1 errno=0 [ 357.967647][ T38] audit: type=1800 audit(1627716664.348:253): pid=15399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=14212 res=0 errno=0 [ 358.023669][ T38] audit: type=1804 audit(1627716664.398:254): pid=15401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/260/bus" dev="sda1" ino=15102 res=1 errno=0 [ 358.063159][ T38] audit: type=1804 audit(1627716664.568:255): pid=15407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/229/bus" dev="sda1" ino=13919 res=1 errno=0 07:31:04 executing program 2: clone3(&(0x7f0000000740)={0x12000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:31:04 executing program 0: syz_io_uring_setup(0x3770, &(0x7f0000000040)={0x0, 0x7cb6}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) clone3(&(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:31:04 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r1, 0x2007fff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:04 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="d0000000", @ANYRES16=r2, @ANYBLOB="010025bd7000fedbdf2506000000080005000a01010208000400ac1414312800070073797374656d5f753a6f626a6563745f723a76686f73745f6465766963655f743a733000140003000000000000000000000000000000000108000500640101012700070073797374656d5f753a6f626a6563745f723a6574635f72756e74696d655f743a733000002c00070073797374656d5f753a6f626a6563745f723a696e6574645f6368696c645f657865635f743a733000140002"], 0xd0}}, 0x0) 07:31:04 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000580)={&(0x7f0000000000), 0xb, &(0x7f0000000540)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x0) 07:31:04 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) [ 358.100144][ T38] audit: type=1804 audit(1627716664.688:256): pid=15410 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/229/bus" dev="sda1" ino=13919 res=1 errno=0 [ 358.247791][ T38] audit: type=1804 audit(1627716665.068:257): pid=15421 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/230/bus" dev="sda1" ino=15108 res=1 errno=0 07:31:05 executing program 1: syz_io_uring_setup(0x681, &(0x7f0000001080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x9) 07:31:05 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)) 07:31:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000180)={0xfffffffffffffffd, 0x4000, 0x0}, 0x0) [ 358.444566][ T38] audit: type=1804 audit(1627716665.188:258): pid=15428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/230/bus" dev="sda1" ino=15108 res=1 errno=0 07:31:05 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:05 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x40044591, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) 07:31:05 executing program 0: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x14) 07:31:05 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x301, 0xffffffffffffffff) 07:31:05 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:05 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r1, 0x2007fff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:05 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_perm_addr={0x26, 0x40000}}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) 07:31:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000580)={0x0, 0xf00, &(0x7f0000000540)={0x0}, 0x41}, 0x0) 07:31:06 executing program 1: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1) 07:31:06 executing program 2: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8) 07:31:06 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:06 executing program 5: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 07:31:06 executing program 1: ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 07:31:06 executing program 2: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x12) 07:31:06 executing program 0: io_uring_setup(0xfffffffe, &(0x7f00000000c0)) 07:31:06 executing program 5: syz_open_dev$ndb(&(0x7f00000000c0), 0x0, 0x26003) 07:31:06 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:06 executing program 4: r0 = open(0x0, 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:06 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010028bd7000ffdbdf2506"], 0x70}}, 0x0) 07:31:06 executing program 2: ioprio_set$uid(0x0, 0xee00, 0x2000) 07:31:06 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_perm_addr={0x26, 0x40000}}) 07:31:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0xb, 0x0, &(0x7f0000001000)) [ 360.240264][ C0] net_ratelimit: 7 callbacks suppressed [ 360.240284][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 360.288570][T15489] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.0'. 07:31:07 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000002040), 0x80803, 0x0) read$FUSE(r0, 0xffffffffffffffff, 0x0) 07:31:07 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000007c0)=ANY=[@ANYBLOB="10"], 0x90}}, 0x0) 07:31:07 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:07 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x5421, 0xffffffffffffffff) [ 360.578668][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000040)={&(0x7f00000005c0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_LISTEN_PORT={0x6}, @WGDEVICE_A_PEERS={0xea8, 0x8, 0x0, 0x1, [{0x514, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "674aa2929c5c06ec2d01d89e965e0a0e377101f0e3034d1f662a5ffeb2d36b04"}, @WGPEER_A_ALLOWEDIPS={0x4c8, 0x9, 0x0, 0x1, [{0x124, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x13c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @private}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "db070305a4494e3d42d3d7674156c7c334910c65e325b6c97cd1d6116f56276b"}]}, {0x2dc, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "1566a5b543daac462d2cbc39a18d998a86bd957ebe9ab141e46e154d4b5ee3a5"}, @WGPEER_A_ALLOWEDIPS={0x60, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x234, 0x9, 0x0, 0x1, [{0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private0}}]}, {0x6b4, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "cfb647889f1514bca201a3b55f0a71ff9183a416265a6ef9703e890b0d6bd943"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f3d0c49e27e456b91e243f37a5911818ee1447501c09176771b8bd2e293362a1"}, @WGPEER_A_ALLOWEDIPS={0x34c, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x5}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @dev}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast1}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x2f4, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}, {0x118, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4}, {0x5}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}]}]}]}]}, 0xec4}}, 0x0) 07:31:07 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x14}, 0xfffffdef}}, 0x0) 07:31:07 executing program 4: r0 = open(0x0, 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:07 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) [ 360.870017][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:07 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000011c0), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x8000000) 07:31:07 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f00000011c0)={0x0, 0x0, 0x0}, 0x0) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 07:31:07 executing program 2: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x65) [ 361.121748][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:08 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:08 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, 0x0) 07:31:08 executing program 1: clone(0x203100, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000240)='\b') 07:31:08 executing program 2: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2) 07:31:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000140)) [ 361.546700][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:08 executing program 4: r0 = open(0x0, 0x1031fe, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:08 executing program 1: syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x81) 07:31:08 executing program 0: syz_io_uring_setup(0x681, &(0x7f0000001080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xe) 07:31:08 executing program 2: syz_io_uring_setup(0x0, &(0x7f0000000040)={0x0, 0x7cb6, 0x0, 0x0, 0x2e8}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) clone3(0x0, 0x0) 07:31:08 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(0xffffffffffffffff, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:08 executing program 5: r0 = syz_open_dev$rtc(&(0x7f0000000040), 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000180)) 07:31:08 executing program 0: syz_io_uring_setup(0x3770, &(0x7f0000000040)={0x0, 0x0, 0x8}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) 07:31:08 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x208403, 0x0) clone3(&(0x7f0000000740)={0x12001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 362.041176][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:09 executing program 2: syz_io_uring_setup(0x681, &(0x7f0000001080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x12) [ 362.152585][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:09 executing program 0: syz_io_uring_setup(0x3aa3, &(0x7f0000000040)={0x0, 0x0, 0x5}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) 07:31:09 executing program 5: syz_io_uring_setup(0x3788, &(0x7f0000000100), &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ff5000/0x1000)=nil, 0x0, 0x0) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) 07:31:09 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(0xffffffffffffffff, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:09 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:09 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000004c00)=[{{0x0, 0x0, &(0x7f0000004300)=[{&(0x7f0000002700)="852e6296c5b2a3473473391919bfd56b32a72a1f47294a449d3eb8602562dadafecbb29650ee2ec554abf4ed002515de95d916a88e4966ae5485673dc0ee8f03a971862bfb58805b38c681a27348d3e2fa7ebbf2ba4694bb3285282efc3151a494b6bcbdb97bef97ccc7b67d9d121d771c83b0ee02d5bb2aae214c9c508a7881c68db25ab47e51d7286622fe77bb72f7637457fdfc155793290a53c23d944f622deb85460adf335a50dea8c10879f965bedb4ce7d5d943998a3de68508ec2918734f38019e868451", 0xc8}, {&(0x7f0000003a80)="a02b90390003a8977de66daaaeb79af54533bdd074435cfb7528e4b1d469654bf54bc2f3fe457a6c8c59afd533a4420bf05e1dd59a98f427d3abddfc844f77c9e3b45ada4d9562c9", 0x48}, {&(0x7f0000003f00)="e46c710fa682a4a398dcedccf3546512b14401c5021ba347cc54f441e7ec6286df755a4a9814b7588aa0cd50fd663cb31e15fc154e8c7b2fb6df1ee475c2d562cd5c5b3364d59bd9e65652e912e620a0fff888d0015de0cb669e9d66eaac6107335aa78e87bb69", 0x67}, {0x0}, {&(0x7f0000000280)="85", 0x1}], 0x5}}, {{&(0x7f00000043c0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80, &(0x7f0000004740)=[{0x0}, {&(0x7f0000007280)="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", 0x8b1}, {0x0}, {&(0x7f0000008c80)="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", 0x500}], 0x4}}], 0x2, 0x8040) sendmsg$alg(r1, &(0x7f0000003ec0)={0x0, 0x0, &(0x7f0000003e40)=[{&(0x7f00000000c0)="ad1ef6bc335e8fdef773020946e1", 0xe}, {&(0x7f0000000100)="448083bbe40171004ca049eb52df03ec4ef067c8f14a57c4ca2122b5de24effd245c45479c1594f7126137e528b283e55ed616a45bfe47c9d7b03547b33074098a93efdc9a7384c8fe88038ed14f21cbaab5a8e5e258d328ed7b74b11d3b030f6aba46672b49fc5ab06f99baf512fada99f08a25e85833bd40202a1502e33fe432b395c0cd094fa0d287009ed4b731c1148b56883b5a58af98f782e34e1a51243b691523fe95b5ff5b905ee9a04ff06af10caa6ac1cf3df275b6c4f195d71d5fa764075eceb0cd508dde4eede264fa1675aaf755d8d9caa2471d2f3b0ff6dd6fd39ed6511244dd54f647f08b4319ba979e0ba4", 0xf3}, {&(0x7f0000003b00)="c1b4fbcc306fb73992f9f4d0af692d33658fb5247505dc9eee636d1c3090b7a4a36c05732ca2d004508bcb037c19655dacf3e92b906059750d8c827f78db650e40c22f7162c27a019c394bf598e23134ebdcb0bb428a0865c7c55490874cae4b09b29d26593aa5a8fdd18ce428cd307aafffb3eb070c1cf9664e8501b111cb8b3fef037dfc8c4b6dd28b55905cf1c2943e2b8e9f07580a555e969a7a5fccf279387601ff7bc7ebd25f8a7ae3a88c90e0eab4564ba043d67d7f73d4526a37436273412a4e4deed368943aaef7aed534e393e34639d4fbca10dae1ac7b8679c6c091ef85a4f8b00da50566a3810ccd47557649e29a77", 0xf5}, {&(0x7f0000009740)="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", 0xffe}, {0x0}], 0x5, &(0x7f0000003c00)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000008940)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000000080)}, {0x0}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x4, 0x0, 0x0) 07:31:09 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0xf0ff7f00000000}, 0x41}, 0x0) 07:31:09 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x401070c9, 0xffffffffffffffff) 07:31:09 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000ac0), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVEDEF(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x3cd580beb8cb6f23, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 07:31:09 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000011c0), 0x40842, 0x0) write$nbd(r0, 0x0, 0x0) [ 362.666702][ T38] kauditd_printk_skb: 25 callbacks suppressed [ 362.666719][ T38] audit: type=1804 audit(1627716669.488:284): pid=15576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/238/bus" dev="sda1" ino=15125 res=1 errno=0 [ 362.721995][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:09 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(0xffffffffffffffff, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:09 executing program 0: msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x8) [ 362.942423][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:09 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffe}, 0x0) [ 362.971931][ T38] audit: type=1804 audit(1627716669.578:285): pid=15576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/238/bus" dev="sda1" ino=15125 res=1 errno=0 07:31:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0xfffffffffffffd06, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:31:10 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x40981) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) 07:31:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000002980)={&(0x7f0000000340)=@proc, 0xc, &(0x7f0000002940)=[{&(0x7f0000000380)={0xec4, 0x0, 0x0, 0x0, 0x0, "", [@generic="d587eeeb911d09130ae18476d0087036d917906c6496b7d8946630471cbd081d0b4dc4454c76010383388ee0bccefb4ddb8cd909f2409e49", @generic="96b9c7f3d27ac1c9232061a7464af43adf030b7fc2a7e256e5042e20cb2fc48fed7faf9a838f5e4f69aaf47a9f17bce88da8be75f87f6adfeaab98cc3d524bb15dd19a024f14f2a829bc649e6cca9ed9731755bb7ae2c6ba02bec7093b29b044dbe59001644e72557651aa2e9b246cd5049906c522ad76f4b2e0fa10804af70a1231efa62b3127f8b36da3095d129772571ab1866518786cd8beb63bc3f515c1312600c1bcf64e50633cca56ad6481c2", @typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="5ec7c84cace7d3cb22923330c65fd57a701d138512618e85a74168add81f1cc60bd3af3eaa594ac9bff7bc813fe877c5c859905b8b32c824060f6466832eccba897edf13c928865021b8334c04c92c6dceecdd508d1c4c31c2c79f8df6c3020096dad7c0f30b86c7d315e8b2d54b01ec7f35224ac7f11b6b9070221e19aa7911ff94b5c0ccd00ac4cdfee82ce934194fc430a3d5e34b12c3adbeee433f78e572d4d81af542f4c8a28a9efa88d007a150d5", @typed={0x81, 0x0, 0x0, 0x0, @binary="d365167b2c9befb3362322b2ba66b7aa69d9446aa0e6039e932997e5777b7b81dfc79366ddf2a4f79b115c4ce99ce8f508635057ce1ae9bf0b3ee82fdd7ac7af9522b4fc911f4c55ccfddea05dee3d98e1809569dc401ed09d39544794e9b95bc9bf58e4e44f6b54959035e8c10dd7b272da07499b690a2475c8752818"}, @generic="885cfcbbfebeb8097a64fcfa5e45b2d9748d518bc25c3c9b4c3af3001f609807c2653e79ae6a3bd6d281126d940a71cdb3ef515f701c7faca94ee21c68bef49d406f0e0d3e926c94f35aacfa67470c4c704199d5c34b63162d7bdd80eee04297ab649e066b746af309e27e1e7cf1f1967ffc4c28f8f6c355cebe17bd8650eb58469ccf7a", @nested={0xc05, 0x0, 0x0, 0x1, [@generic="06cf9de1bceff00cb268083b7346b9b4d9acc7508d3552421954f4f61c4ee0bfb85ef95ad86688124c2cd1eef451bb1d8c3e355de917cb02e79db42e29791f3f964107adf7ee21a7e547ab126f3b950e6816830adc5ea5a7802bb2e370de4afdc7d72d544770acb72299e399dbc90691b85b88b293cbd57c35aa8bf20be701dac8723e82a584e62843523aacbd0d7a2521742556e5ee70cc139ac87a907dac8cd4c6cdff56aba384aaa02e", @typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="1f0400481a74d81885b0842204fd001036738aa2394f3926ac8ea1dd9c15e7f52b6ccf4d68eaaef4e93baba34bce1dcf69f462a119601cfca78c5ab4522c4555b1f194b8dfb16549b847200a18d19766f7d7975ecf81297d07104ea6", @typed={0xe5, 0x0, 0x0, 0x0, @binary="c89b1bac4b4c17bffdc3502d478cf537855c00353e197de51a9c51ba8d43fc7540c5410c69b44a30cea4f8989eba91c0d6a8f71c15b1db1cb212554ef0cccff76ad4a268589006911cbf1e37603c59f0407b7044d6df8fda261969d7017b2d7f4dfe6deb56bf3fa739fe6d4ac37c8d05c4e8204f0277db62bbe7e489ebe0052da89c19ea836a97721b8775dffced92634b3891d77a051a1dc78ddeb822c346672cc4264c23866cf2fbaf37f639707becb894dddd857863233adc91e9dc7f6e61c786abaefa8f41f29dc09ea5e96055cb82206102c04ceafa5f17157cf2d8685d56"}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@empty}, @generic="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"]}]}, 0xec4}], 0x1, 0x0, 0x2}, 0x0) [ 363.225729][ T38] audit: type=1804 audit(1627716669.678:286): pid=15580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/266/bus" dev="sda1" ino=15130 res=1 errno=0 [ 363.298907][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:10 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:10 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r2, 0xffffffffffffffff, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:10 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x1279, 0xffffffffffffffff) [ 363.433990][ T38] audit: type=1804 audit(1627716669.938:287): pid=15589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/266/bus" dev="sda1" ino=15130 res=1 errno=0 [ 363.474253][T15596] block nbd5: shutting down sockets 07:31:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x8000451b, 0x0) 07:31:10 executing program 0: mlock(&(0x7f0000ff8000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x65) [ 363.552033][T15596] block nbd5: shutting down sockets 07:31:10 executing program 5: syz_io_uring_setup(0x56a5, &(0x7f0000000140), &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ff9000/0x1000)=nil, 0x0, 0x0) syz_io_uring_setup(0x29c, &(0x7f0000000240), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) [ 363.662815][ T38] audit: type=1804 audit(1627716670.488:288): pid=15607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/267/bus" dev="sda1" ino=14833 res=1 errno=0 07:31:10 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r2, 0xffffffffffffffff, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:10 executing program 2: add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000200)={0x0, 0x0, @b}, 0x7fff, 0xfffffffffffffffb) 07:31:10 executing program 0: syz_io_uring_setup(0x681, &(0x7f0000001080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3) 07:31:10 executing program 1: clone3(&(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = gettid() wait4(r0, 0x0, 0x20000000, 0x0) [ 363.900921][ T38] audit: type=1804 audit(1627716670.488:289): pid=15608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/240/bus" dev="sda1" ino=15128 res=1 errno=0 07:31:10 executing program 5: mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) mincore(&(0x7f0000ff7000/0x3000)=nil, 0x3000, &(0x7f0000000100)=""/99) [ 364.143876][ T38] audit: type=1804 audit(1627716670.518:290): pid=15608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/240/bus" dev="sda1" ino=15128 res=1 errno=0 07:31:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0x2, 0x3, 0x401}, 0x14}}, 0x0) 07:31:11 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x100) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 364.238610][ T38] audit: type=1804 audit(1627716670.738:291): pid=15615 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/267/bus" dev="sda1" ino=14833 res=1 errno=0 07:31:11 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r2, 0xffffffffffffffff, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:11 executing program 0: syz_io_uring_setup(0x1ea1, &(0x7f0000000140), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000001c0), 0x0) 07:31:11 executing program 1: r0 = syz_open_dev$rtc(&(0x7f0000000040), 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) [ 364.395331][ T38] audit: type=1804 audit(1627716671.038:292): pid=15623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/241/bus" dev="sda1" ino=15145 res=1 errno=0 07:31:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) 07:31:11 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab0a, 0xffffffffffffffff) [ 364.591120][ T38] audit: type=1804 audit(1627716671.048:293): pid=15623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/241/bus" dev="sda1" ino=15145 res=1 errno=0 07:31:11 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0xb230}, 0x0) 07:31:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r2) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x3c, r3, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x8, 0xc, 0x0, 0x1, [{0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5}]}]}, 0x3c}}, 0x0) 07:31:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000000)=""/4096, &(0x7f0000001000)=0x1000) 07:31:11 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:12 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:12 executing program 2: modify_ldt$write(0x1, &(0x7f0000000080), 0x10) modify_ldt$write(0x1, &(0x7f0000000000), 0x10) 07:31:12 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000580)={&(0x7f0000000000), 0xc, &(0x7f0000000540)={0x0}, 0x7}, 0x0) 07:31:12 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_perm_addr={0x9, 0x40000}}) 07:31:12 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000002040), 0x0, 0x0) read$FUSE(r0, 0xffffffffffffffff, 0x0) 07:31:12 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000580)={&(0x7f0000000000), 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 07:31:12 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="d0000000", @ANYRES16=r2, @ANYBLOB="010025bd7000fedbdf2506000000080005000a01010208000400ac1414312800070073797374656d5f753a6f626a6563745f723a76686f73745f6465766963655f74"], 0xd0}}, 0x0) [ 365.492373][ C0] net_ratelimit: 6 callbacks suppressed [ 365.492395][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:12 executing program 1: madvise(&(0x7f0000ff7000/0x1000)=nil, 0x1000, 0xe) mlock(&(0x7f0000ff8000/0x2000)=nil, 0x2000) [ 365.549181][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:12 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x86) 07:31:12 executing program 0: clone3(&(0x7f0000000740)={0x80023000, &(0x7f0000000440), 0x0, 0x0, {}, &(0x7f0000000500)=""/217, 0xd9, 0x0, 0x0}, 0x58) [ 365.753410][T15674] nbd: must specify a device to reconfigure [ 365.840964][T15679] netlink: 132 bytes leftover after parsing attributes in process `syz-executor.5'. 07:31:12 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:12 executing program 1: syz_open_dev$evdev(&(0x7f0000000280), 0x0, 0x86100) 07:31:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 07:31:12 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab07, 0xffffffffffffffff) [ 366.010155][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:13 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(0x0, 0x86) [ 366.248558][T15694] nbd: must specify a device to reconfigure 07:31:13 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_perm_addr={0x2, 0x40000}}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) 07:31:13 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x17, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}}, 0x0) 07:31:13 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x400445a0, &(0x7f0000000100)=""/112) 07:31:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000002980)={&(0x7f0000000340)=@proc={0x10, 0x0, 0xffffffff}, 0xc, &(0x7f0000002940)=[{&(0x7f0000000380)={0xec4, 0x0, 0x0, 0x0, 0x0, "", [@generic="d587eeeb911d09130ae18476d0087036d917906c6496b7d8946630471cbd081d0b4dc4454c76010383388ee0bccefb4ddb8cd909f2409e49", @generic="96b9c7f3d27ac1c9232061a7464af43adf030b7fc2a7e256e5042e20cb2fc48fed7faf9a838f5e4f69aaf47a9f17bce88da8be75f87f6adfeaab98cc3d524bb15dd19a024f14f2a829bc649e6cca9ed9731755bb7ae2c6ba02bec7093b29b044dbe59001644e72557651aa2e9b246cd5049906c522ad76f4b2e0fa10804af70a1231efa62b3127f8b36da3095d129772571ab1866518786cd8beb63bc3f515c1312600c1bcf64e50633cca56ad6481c2", @typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="5ec7c84cace7d3cb22923330c65fd57a701d138512618e85a74168add81f1cc60bd3af3eaa594ac9bff7bc813fe877c5c859905b8b32c824060f6466832eccba897edf13c928865021b8334c04c92c6dceecdd508d1c4c31c2c79f8df6c3020096dad7c0f30b86c7d315e8b2d54b01ec7f35224ac7f11b6b9070221e19aa7911ff94b5c0ccd00ac4cdfee82ce934194fc430a3d5e34b12c3adbeee433f78e572d4d81af542f4c8a28a9efa88d007a150d5", @typed={0x81, 0x0, 0x0, 0x0, @binary="d365167b2c9befb3362322b2ba66b7aa69d9446aa0e6039e932997e5777b7b81dfc79366ddf2a4f79b115c4ce99ce8f508635057ce1ae9bf0b3ee82fdd7ac7af9522b4fc911f4c55ccfddea05dee3d98e1809569dc401ed09d39544794e9b95bc9bf58e4e44f6b54959035e8c10dd7b272da07499b690a2475c8752818"}, @generic="885cfcbbfebeb8097a64fcfa5e45b2d9748d518bc25c3c9b4c3af3001f609807c2653e79ae6a3bd6d281126d940a71cdb3ef515f701c7faca94ee21c68bef49d406f0e0d3e926c94f35aacfa67470c4c704199d5c34b63162d7bdd80eee04297ab649e066b746af309e27e1e7cf1f1967ffc4c28f8f6c355cebe17bd8650eb58469ccf7a", @nested={0xc05, 0x0, 0x0, 0x1, [@generic="06cf9de1bceff00cb268083b7346b9b4d9acc7508d3552421954f4f61c4ee0bfb85ef95ad86688124c2cd1eef451bb1d8c3e355de917cb02e79db42e29791f3f964107adf7ee21a7e547ab126f3b950e6816830adc5ea5a7802bb2e370de4afdc7d72d544770acb72299e399dbc90691b85b88b293cbd57c35aa8bf20be701dac8723e82a584e62843523aacbd0d7a2521742556e5ee70cc139ac87a907dac8cd4c6cdff56aba384aaa02e", @typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="1f0400481a74d81885b0842204fd001036738aa2394f3926ac8ea1dd9c15e7f52b6ccf4d68eaaef4e93baba34bce1dcf69f462a119601cfca78c5ab4522c4555b1f194b8dfb16549b847200a18d19766f7d7975ecf81297d07104ea6", @typed={0xe5, 0x0, 0x0, 0x0, @binary="c89b1bac4b4c17bffdc3502d478cf537855c00353e197de51a9c51ba8d43fc7540c5410c69b44a30cea4f8989eba91c0d6a8f71c15b1db1cb212554ef0cccff76ad4a268589006911cbf1e37603c59f0407b7044d6df8fda261969d7017b2d7f4dfe6deb56bf3fa739fe6d4ac37c8d05c4e8204f0277db62bbe7e489ebe0052da89c19ea836a97721b8775dffced92634b3891d77a051a1dc78ddeb822c346672cc4264c23866cf2fbaf37f639707becb894dddd857863233adc91e9dc7f6e61c786abaefa8f41f29dc09ea5e96055cb82206102c04ceafa5f17157cf2d8685d56"}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@empty}, @generic="539fa4e4a3b0178751fed1c291d5ba28e9a7f63f2a5b71f1e460a3bd9e0ae1e7d02d5fe32729fdae9c514f018f41b5db48393e8c436c2d6e96a5da8cfef69ee2b161d438b63175b5ca9dd32782e831e8f95ac527043809d79de3215f203c28c53c7db1422cd5aa4edf999ffaf3541ea6238c9cea846f614d35bac664c389ffee55dba6b98fe835927f38724a3f0a0f20feb6fb699a9403f6bc2616284436eea266060a3c0d08144cdedf6b91575606a40e3a0bd26ea5f8acc6298077b7d5ff3f61d118554ebbf41f6798a313674fc9ba8ffce92bbf342d1384727f2fd33e9a11c5ddb25275f06f608e572109be57aeb074478fca46d959d38e2a8ceb335bb336369258de56d2d6c03987789ffe9ee939bc7f0c73310c9ac67c3a3a7d65dca3d8f7539b58e144bc8eed8cedfe71f137263c821ff49c07db63f855996f0ba8134c414010d6eb12ed56ec9db62933fed910007582fda1cb5539a69338efd4cd3548a7f71d16544cc4fe0f223f21945f56a5ab571903fcb918a7c3205ee0065c0868d7f23094822329f30d0b62be81d83ada0a08eefc077fb5048aea0c14b3989b15b11a751aa1fad15de6fda1876d1a167e7d8d2073140e8342cb2bded87cae16464c4839781d322285b18a12a0c6ba4ddba11db8fddf399bfa4c1034bdfeeaba612cab835e0abc22bf77cfab10074d43b42e8d6a900a98b4b5c8bb1c4855e2de1aa36ff6c6c18049d5bf46bf69c8b8d41659716ee9c733514521010e244ef82d2a2c593faa191b6cef91fe5b9b7f26288ed2566bb1d5d41d24ec43bf0d8e5c095eb1067fded9977d7f3e5f65f02540ce6e3195f4a95d7225c740eabfb8fd85c52dafa45925aeb953a6377855c9c48ff51eef9e374871c63da95fb2dfde2c754626d30b3a412cfa67b4f81321ed22bb3751a1167e7301b092c099e89760b420baec3cdf40a42d7d357fa15d128efde481946f77427a53aad26e40075cc1c395e052fb2ed04c48be5d62db6b26d12c9a543ad2e832bde77f7f573f78efd52ac5a8a3b648d648e614cb1b32be5b74c70d0bb91728141df30eb2dfe58df8ef46f6f0a9bb38ca77991ee49395334c749e5c86ed55ae42656cb92c10ff40be773ec8f735e871c6bda5bc52b9dec514757317b3bc261684fedf462ff062102e2fd91937ee6b85a9e0a24534ac7c0d4d7d643d0d7da541d1c6b7326a0caaca4a984cd87605018a744b7c34325f4fb889bd56e6be81acbc178b32497fcfe171f5bba66867ed728bf7198d2e552a354cb151d0639c83a9f2ffd648075d5f0992832c9635087991b2ed6986ee067f5d5011cb5f8e30bb62bedce26f83b7db12da4de65c322c298c8d8d96c618a8e1917f29f1201a3a8ba91432cc0561662182394b2c2e35032c2c037db5e111728d63a13671ad65a0b3aba444ddc89b1855053fd30e0d6223bcd48c43b518c56c98dc8714650a5d746d37dbacde861c60b0bf730bc822b5a2d2358e275f978e3ede9b11e084318ca39952a16ea5f740b79ec9128212602e78e068aa758fbb0106a6c00e21367d1ccd657cd516b37857fafd679955a25f4358b1ed9c07924601082a526a33135121efcf7770733c7ece7a54605dddd7b68310ebdbec6630a79e3910ce3c0d75e1cff63a44dd3dcdedab53416ef45940aed9c24e8a29d0d86ec6879bbf6f83a86d64a4390f865c4adbabb647691c080e5024bbe05fbce48b9bc329ee5468a4127652511cc7c4d6ff5d03c10794715d556767410d96e4555ec76d165f34a3276ee76686a543ab767f6573d10c76fb02eb916851dc92ec49725afd1abab318ced0f28ef7923416069760eb34aca03949d8faeaaf6f9c0728f49de37e3c1be545386377f075bb684c0fdf17e67e568be60a4ad92f5ae129e955bac25bea5d2487491f6be88f087dc8699e6de1ec33b8fe682c6dc6899e464dafd25dea9030b30df4ffe530ad5f3001734c7311076a11e172db4857d7413d2d19f8d087581974d251ef6a4037015feb4677d68f9c21fd6ce68e18be61c0edbedf122257cf4ebb72be7dbc57678f5bef880bd9d232660907d081e36aa5c383d1d97f0d0a0600f3da5ff40fa6689c774716d41b920a6049234b7add3fc3a8bfdd632db22df75446c32db803eaea0096bb9e6624cd1ff1b8d0bda3efdf18583014fc6e6cf32f5c87c66279c123b39a6fcfb8f511d92d9501ff2b031fb78320c1adccaf08cdc52cc92a69f235765984ced42e55030401766711736d67a31c78391e2d2051a449208cfc9470ea8ddbff2606b2f0d218612a303394ac4228bc1c4c33e12e0a05bd73481e08c5a0dbfe644a24d3cc330da9033c7c2faaa2b8663c869099028b51ad194a9612ff7fe2aa79b0e32459b06f516b9c86327f684aa8e277efa6487d7d4faa4333e9025c7e3a37d6a036360d20bf68a45ed101d56d450497ee36891403259d9a1c58f170b3e11637bf50a7f9626b63ddcb91e205fa815503a8efb40d2b61476dbf041a701883a1e58ccb0f80f39cecae8671077a517413d06f2964eec08c8f75603d224829ee9eb57af0a825b35c4c6596168734a2836f7efb6b7c1e002d963913757d543c7f48f7c00bd0711062378a1e92d133430d3dda2d9b9c6c6239a49ed5f9d9f40de6c7efb884a1f25e1a4423778dfdc1c720c7489861b00b8dcc79f8012523a3d55cd323e393cc62b6a5f7bc2018f3751078058d3fc1b64a6f288f4974e0a69a1773cf88966fb0e809a738ff55e0ec2fdac4d362059de7b59acd76f2e6a59e68f75325aae08d132969b008a8ab5f56c9e51c8084867393219d507375995db63283cc75060b3aa99a1c6d367e0cf8a14848f51f4450b8202f527bdf362ebafb223dfce140491fc644aa4d5eb3544e1cd8d2d8705fc49fee665042575e6c032d5fe2e1d003597a03362126969645e2218deeed72708efafeb32bb45027c48b252d9d3efab794cf860e296177b9848d53bc18e43f255bedbefe6965a8fab7d795bb1d43a3f97894c0698b54f1745c79e9b80d6517dceb26f19421baa20a85f14f2075618f97018e73893822cd78230545da27f61d81f0939b9928e36f2226124d69cf9446dabb95c5bb4be690a0bce2484ab690aceeb6b6c1553129343493c5cb790ad9ead915f5700016c5fda98792e8c624149f588b0e9719e7ddf926b1710032c74a67a45752a7a1cba18defa543ff6e99c05305a00dc5fb4835b8cc910b7783f2c1a60269aa689080bd176568ae2246ca1f73d0e7919d43945490919c57aa9b1209af1196fbac0e25b8e6b62f6ed99ba4e778be3ae28f065cbec0b2ef3752d56e042431c035f3601e8e911bb8a69120aef241a2a749ddb27071cf36bd9ffe6b3fbac9cbf16a6db19a55132e6bbf52e73031141222dd8280f61bca52b27ec112a7ab1a92cd944ba4f16e2038210c26f1a4e5e08a027dac74b7ce5be0eea15a815a6feddd8cc004acfb5f6d8eb4f74690760c6f7475570128f4f084659995d755317e7f647257a91f70754dacc29087929ad222833bc500fdcd90bdffcfaa35be22f83783eb58714ebfde99193fa4e610aacdd8a6660e9d16c95aea01d04bdd17e26949e97550f5cf"]}]}, 0x33fe0}], 0x1}, 0x0) [ 366.495538][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:13 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:13 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(0x0, 0x86) 07:31:13 executing program 5: getresuid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000080)) 07:31:13 executing program 0: futex(&(0x7f0000000000), 0x3, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) 07:31:13 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0xa8501, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x8000000) 07:31:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x15) syz_genetlink_get_family_id$batadv(&(0x7f0000000140), r0) 07:31:13 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r0 = fsopen(&(0x7f0000000040)='proc\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) dup2(r0, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x404000, 0x101) [ 366.912302][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x14, r2, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) [ 367.079377][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000540)={0x0}, 0x41}, 0x0) 07:31:14 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(0x0, 0x86) 07:31:14 executing program 0: r0 = syz_io_uring_setup(0x6459, &(0x7f0000000000), &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x200000e, 0x12, r0, 0x10000000) 07:31:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000027c0)={&(0x7f0000002780)={0x24, 0x2, 0x3, 0x401, 0x0, 0x0, {}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_FLAGS={0x8}]}, 0x24}}, 0x0) [ 367.685629][ T38] kauditd_printk_skb: 15 callbacks suppressed [ 367.685646][ T38] audit: type=1804 audit(1627716674.508:309): pid=15744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/248/bus" dev="sda1" ino=15166 res=1 errno=0 [ 367.702531][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:15 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:15 executing program 1: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1100, 0x0) 07:31:15 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:15 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000580)={&(0x7f0000000000), 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x14}, 0x33fe0}}, 0x0) 07:31:15 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x401070cd, 0xffffffffffffffff) [ 368.709965][ T38] audit: type=1804 audit(1627716675.528:310): pid=15758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/249/bus" dev="sda1" ino=15174 res=1 errno=0 07:31:15 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/sem\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020}, 0x2020) 07:31:15 executing program 5: getresuid(&(0x7f0000000000), &(0x7f00000000c0), 0x0) [ 368.751611][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:15 executing program 2: futex(&(0x7f0000000000), 0x3, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) 07:31:15 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:15 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000011c0), 0x0, 0x0) read$FUSE(r0, &(0x7f0000004100)={0x2020}, 0x8bb) [ 368.790500][ T38] audit: type=1804 audit(1627716675.588:311): pid=15758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/249/bus" dev="sda1" ino=15174 res=1 errno=0 [ 368.917477][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 368.944713][ T38] audit: type=1804 audit(1627716675.718:312): pid=15765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/272/bus" dev="sda1" ino=13908 res=1 errno=0 07:31:15 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0x127b, r1) 07:31:15 executing program 5: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000280), 0x4040, 0x0) [ 369.126050][ T38] audit: type=1804 audit(1627716675.828:313): pid=15772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/272/bus" dev="sda1" ino=13908 res=1 errno=0 [ 369.127569][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:16 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:16 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80044584, &(0x7f0000000100)=""/112) 07:31:16 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_perm_addr={0x9, 0x40000}}) 07:31:16 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:16 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff7000/0x3000)=nil, 0x1fffff, 0x0, 0x13, r0, 0x8000000) syz_io_uring_setup(0x3517, &(0x7f0000000040), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0, 0x0) [ 369.312333][ T38] audit: type=1804 audit(1627716675.938:314): pid=15774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/250/bus" dev="sda1" ino=14851 res=1 errno=0 07:31:16 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @rumble}) 07:31:16 executing program 2: ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 369.459713][ T38] audit: type=1804 audit(1627716676.028:315): pid=15776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/250/bus" dev="sda1" ino=14851 res=1 errno=0 07:31:16 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0x127e, r1) 07:31:16 executing program 5: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3, 0x100010, 0xffffffffffffffff, 0x8000000) r0 = syz_io_uring_setup(0x3770, &(0x7f0000000040)={0x0, 0x7cb6, 0x8, 0x0, 0x2e8}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) syz_io_uring_setup(0x1ea1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) clone3(&(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, {0x15}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 369.631053][ T38] audit: type=1804 audit(1627716676.318:316): pid=15791 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/251/bus" dev="sda1" ino=13909 res=1 errno=0 07:31:16 executing program 2: prctl$PR_SET_IO_FLUSHER(0x39, 0xfffffffffffffffd) 07:31:16 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x0) 07:31:16 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:16 executing program 0: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xf) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 369.807480][ T38] audit: type=1804 audit(1627716676.388:317): pid=15796 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/273/bus" dev="sda1" ino=13893 res=1 errno=0 07:31:16 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000011c0), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x8000000) [ 369.967544][ T38] audit: type=1804 audit(1627716676.388:318): pid=15798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir044843618/syzkaller.Pwf459/251/bus" dev="sda1" ino=13909 res=1 errno=0 07:31:16 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xc0481273, 0xffffffffffffffff) 07:31:16 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x2}, 0x0) 07:31:16 executing program 2: madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xa) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 07:31:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x18, 0x17, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_HOOK={0x4}]}, 0x18}}, 0x0) 07:31:17 executing program 0: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x15) 07:31:17 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) 07:31:17 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x1261, 0xffffffffffffffff) 07:31:17 executing program 5: syz_io_uring_setup(0x3770, &(0x7f0000000040)={0x0, 0x7cb6}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) 07:31:17 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:17 executing program 1: madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x12) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/137) 07:31:17 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140), r1) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000100)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}}, 0x0) [ 370.545006][T15833] block nbd3: shutting down sockets [ 370.631390][T15833] block nbd3: shutting down sockets [ 370.711830][ C1] net_ratelimit: 3 callbacks suppressed [ 370.711849][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, 0x0, 0x51) 07:31:17 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0x1269, r1) [ 370.759868][T15848] block nbd0: not configured, cannot reconfigure 07:31:17 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x14}, 0xec0}}, 0x0) 07:31:17 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}, 0xc0}, 0x0) 07:31:17 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="03052bbd7000fcdbdf2505"], 0x5c}}, 0x0) 07:31:17 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f00000002c0), 0xc) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 07:31:17 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab04, 0xffffffffffffffff) 07:31:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000002980)={&(0x7f0000000340)=@proc, 0xc, &(0x7f0000002940)=[{&(0x7f0000000380)={0xec4, 0x0, 0x0, 0x0, 0x0, "", [@generic="d587eeeb911d09130ae18476d0087036d917906c6496b7d8946630471cbd081d0b4dc4454c76010383388ee0bccefb4ddb8cd909f2409e49", @generic="96b9c7f3d27ac1c9232061a7464af43adf030b7fc2a7e256e5042e20cb2fc48fed7faf9a838f5e4f69aaf47a9f17bce88da8be75f87f6adfeaab98cc3d524bb15dd19a024f14f2a829bc649e6cca9ed9731755bb7ae2c6ba02bec7093b29b044dbe59001644e72557651aa2e9b246cd5049906c522ad76f4b2e0fa10804af70a1231efa62b3127f8b36da3095d129772571ab1866518786cd8beb63bc3f515c1312600c1bcf64e50633cca56ad6481c2", @typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="5ec7c84cace7d3cb22923330c65fd57a701d138512618e85a74168add81f1cc60bd3af3eaa594ac9bff7bc813fe877c5c859905b8b32c824060f6466832eccba897edf13c928865021b8334c04c92c6dceecdd508d1c4c31c2c79f8df6c3020096dad7c0f30b86c7d315e8b2d54b01ec7f35224ac7f11b6b9070221e19aa7911ff94b5c0ccd00ac4cdfee82ce934194fc430a3d5e34b12c3adbeee433f78e572d4d81af542f4c8a28a9efa88d007a150d5", @typed={0x81, 0x0, 0x0, 0x0, @binary="d365167b2c9befb3362322b2ba66b7aa69d9446aa0e6039e932997e5777b7b81dfc79366ddf2a4f79b115c4ce99ce8f508635057ce1ae9bf0b3ee82fdd7ac7af9522b4fc911f4c55ccfddea05dee3d98e1809569dc401ed09d39544794e9b95bc9bf58e4e44f6b54959035e8c10dd7b272da07499b690a2475c8752818"}, @generic="885cfcbbfebeb8097a64fcfa5e45b2d9748d518bc25c3c9b4c3af3001f609807c2653e79ae6a3bd6d281126d940a71cdb3ef515f701c7faca94ee21c68bef49d406f0e0d3e926c94f35aacfa67470c4c704199d5c34b63162d7bdd80eee04297ab649e066b746af309e27e1e7cf1f1967ffc4c28f8f6c355cebe17bd8650eb58469ccf7a", @nested={0xc05, 0x0, 0x0, 0x1, [@generic="06cf9de1bceff00cb268083b7346b9b4d9acc7508d3552421954f4f61c4ee0bfb85ef95ad86688124c2cd1eef451bb1d8c3e355de917cb02e79db42e29791f3f964107adf7ee21a7e547ab126f3b950e6816830adc5ea5a7802bb2e370de4afdc7d72d544770acb72299e399dbc90691b85b88b293cbd57c35aa8bf20be701dac8723e82a584e62843523aacbd0d7a2521742556e5ee70cc139ac87a907dac8cd4c6cdff56aba384aaa02e", @typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="1f0400481a74d81885b0842204fd001036738aa2394f3926ac8ea1dd9c15e7f52b6ccf4d68eaaef4e93baba34bce1dcf69f462a119601cfca78c5ab4522c4555b1f194b8dfb16549b847200a18d19766f7d7975ecf81297d07104ea6", @typed={0xe5, 0x0, 0x0, 0x0, @binary="c89b1bac4b4c17bffdc3502d478cf537855c00353e197de51a9c51ba8d43fc7540c5410c69b44a30cea4f8989eba91c0d6a8f71c15b1db1cb212554ef0cccff76ad4a268589006911cbf1e37603c59f0407b7044d6df8fda261969d7017b2d7f4dfe6deb56bf3fa739fe6d4ac37c8d05c4e8204f0277db62bbe7e489ebe0052da89c19ea836a97721b8775dffced92634b3891d77a051a1dc78ddeb822c346672cc4264c23866cf2fbaf37f639707becb894dddd857863233adc91e9dc7f6e61c786abaefa8f41f29dc09ea5e96055cb82206102c04ceafa5f17157cf2d8685d56"}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@empty}, @generic="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"]}]}, 0x33fe0}], 0x1}, 0x0) 07:31:18 executing program 1: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, 0x0, 0x0) [ 371.139236][T15863] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. [ 371.235658][T15871] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. 07:31:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000000080)=ANY=[], 0x1c4}, {0x0, 0x11a8}], 0x2}, 0x0) [ 371.278943][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:18 executing program 5: syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x101101, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 07:31:18 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0x80081270, r1) 07:31:18 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:18 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x401870c8, 0xffffffffffffffff) 07:31:18 executing program 3: clone3(0x0, 0x0) gettid() read$FUSE(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 07:31:18 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000400), r0) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}}, 0x0) 07:31:18 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}, 0x7}, 0x0) 07:31:18 executing program 0: modify_ldt$write(0x1, &(0x7f0000000080)={0x7ba}, 0x10) modify_ldt$write(0x1, &(0x7f0000000000), 0x10) [ 371.833209][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:18 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100), r0) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r1, 0x301, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 07:31:18 executing program 5: syz_open_dev$rtc(&(0x7f0000000000), 0xffffffffffffffff, 0x0) 07:31:19 executing program 1: syz_open_dev$ndb(0xfffffffffffffffd, 0x0, 0x0) 07:31:19 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x125e, 0xffffffffffffffff) 07:31:19 executing program 2: clone3(&(0x7f00000011c0)={0x65284700, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000001180)=[0xffffffffffffffff], 0x1}, 0x58) 07:31:19 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:19 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_perm_addr={0x4e, 0x40000}}) fsmount(0xffffffffffffffff, 0x0, 0x0) 07:31:19 executing program 3: r0 = socket(0x11, 0xa, 0x0) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000540)={&(0x7f0000000000), 0xc, &(0x7f0000000580)={0x0, 0x4bc}}, 0x0) 07:31:19 executing program 0: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x10) 07:31:19 executing program 5: modify_ldt$write(0x1, &(0x7f0000000080), 0x10) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x10) syz_io_uring_setup(0x450a, &(0x7f00000000c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000140)) 07:31:19 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x65) clone3(0x0, 0x0) [ 372.522220][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:19 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x1277, 0xffffffffffffffff) 07:31:19 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:19 executing program 0: waitid(0x3, 0x0, 0x0, 0x8, 0x0) 07:31:19 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80004507, 0x0) 07:31:19 executing program 5: socketpair(0x2, 0xa, 0x28f, &(0x7f0000000000)) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 372.973484][ T38] kauditd_printk_skb: 12 callbacks suppressed [ 372.973501][ T38] audit: type=1804 audit(1627716679.798:331): pid=15976 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/279/bus" dev="sda1" ino=14833 res=1 errno=0 [ 372.983328][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 373.178584][ T38] audit: type=1804 audit(1627716679.938:332): pid=15980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/279/bus" dev="sda1" ino=14833 res=1 errno=0 07:31:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_perm_addr={0x1c, 0x40000}}) 07:31:23 executing program 1: futex(0x0, 0x8b, 0x0, 0x0, &(0x7f000001ff00), 0x0) 07:31:23 executing program 0: syz_io_uring_setup(0x681, &(0x7f0000001080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x14) 07:31:23 executing program 3: syz_io_uring_setup(0x3770, &(0x7f0000000040)={0x0, 0x7cb6, 0x0, 0x1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0x1ea1, &(0x7f0000000140), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) setpriority(0x1, 0x0, 0x0) 07:31:23 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x127d, 0xffffffffffffffff) 07:31:23 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="c8000000020101"], 0xc8}}, 0x0) 07:31:23 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000240)) 07:31:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005840)={0x0, 0x0, 0x0, 0x0, &(0x7f0000005780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0x20}, 0x0) 07:31:23 executing program 3: pselect6(0x0, 0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0x0) [ 376.520964][ T38] audit: type=1804 audit(1627716683.339:333): pid=16009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/280/bus" dev="sda1" ino=14129 res=1 errno=0 [ 376.585938][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:23 executing program 2: syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080), 0x0, 0x0) [ 376.697876][T16015] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.1'. [ 376.717982][ T38] audit: type=1804 audit(1627716683.489:334): pid=16010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/280/bus" dev="sda1" ino=14129 res=1 errno=0 07:31:23 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x401870cc, 0xffffffffffffffff) 07:31:23 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:23 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x127f, 0xffffffffffffffff) 07:31:23 executing program 5: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 07:31:23 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff7000/0x3000)=nil, 0x1fffff, 0x0, 0x13, r0, 0x8000000) 07:31:23 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000280)='ns/time\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000400)='ns/time_for_children\x00') 07:31:23 executing program 5: mmap$IORING_OFF_CQ_RING(&(0x7f0000ff6000/0x3000)=nil, 0x3000, 0x78f6e8d4ac64a08b, 0x4010132, 0xffffffffffffffff, 0x8000000) [ 377.211990][ T38] audit: type=1804 audit(1627716684.039:335): pid=16035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/281/bus" dev="sda1" ino=14183 res=1 errno=0 [ 377.278762][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 377.400267][ T38] audit: type=1804 audit(1627716684.199:336): pid=16040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/281/bus" dev="sda1" ino=14183 res=1 errno=0 07:31:24 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/tpm_crb', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000002, 0x100011, r0, 0x0) 07:31:24 executing program 3: mknod(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) link(&(0x7f0000005840)='./file0\x00', 0x0) 07:31:24 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x553782, 0x0) write$char_usb(r0, &(0x7f0000000180)="6fa56c0bc6a8ee6576a9f45dda44989e3d2308ac4575daf8b08029780e3ccd960300e6385477ccb797b0f28c4e22c6eca47e1c3072c50c7c99faf5c435e5", 0xfffffffffffffeca) 07:31:24 executing program 5: pipe2(&(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x0) 07:31:24 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000180)=0x8, 0x4) 07:31:24 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000008b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40010040, 0x0) 07:31:24 executing program 3: syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) 07:31:24 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) 07:31:24 executing program 2: prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000200)) 07:31:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8916, 0x0) 07:31:24 executing program 3: io_setup(0x3f, &(0x7f0000000380)) 07:31:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) [ 377.942460][ T38] audit: type=1804 audit(1627716684.759:337): pid=16064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/282/bus" dev="sda1" ino=14129 res=1 errno=0 07:31:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000012d80)={0x0, @in, @l2tp={0x2, 0x0, @empty}, @xdp, 0x6}) 07:31:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000)=0x7, 0x4) [ 378.012236][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:24 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200), 0x20b00, 0x0) [ 378.167476][ T38] audit: type=1804 audit(1627716684.989:338): pid=16068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/282/bus" dev="sda1" ino=14129 res=1 errno=0 07:31:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8917, &(0x7f0000002640)={'wlan0\x00', @ifru_map}) [ 378.376673][ T3254] ieee802154 phy0 wpan0: encryption failed: -22 [ 378.383081][ T3254] ieee802154 phy1 wpan1: encryption failed: -22 07:31:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f0000002540)={0x0, 0x0, 0x0}, 0x0) 07:31:25 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8943, &(0x7f0000000380)={'ipvlan1\x00', @ifru_addrs=@tipc=@id}) 07:31:25 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:25 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000006c0)={0xffffffffffffffff, 0x0}, 0x20) 07:31:25 executing program 0: process_vm_writev(0x0, &(0x7f0000001480)=[{&(0x7f0000000000)=""/90, 0x5a}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x0) 07:31:25 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x4, 0x4) 07:31:25 executing program 3: r0 = socket(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 07:31:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_opts(r0, 0x0, 0x10, &(0x7f0000000040)="15", 0x1) 07:31:25 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x149101) r1 = syz_open_dev$loop(&(0x7f0000000240), 0x5, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 07:31:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000006900)) [ 378.813826][ T38] audit: type=1804 audit(1627716685.629:339): pid=16097 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/283/bus" dev="sda1" ino=13909 res=1 errno=0 [ 378.836177][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000005380)={&(0x7f0000000100)=@kern={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000052c0)=[{&(0x7f0000000140)={0xea0, 0x0, 0x0, 0x0, 0x0, "", [@generic="5e1c609acb8b2e9e11ee5d0802ceb88addcf5e4a40b0ab9e0ef947038e7b397167f0b84eff3ef622ae03b34e2ed840a92b7f5b45b99d8e01b0577f76648739a90dec01bd590b132968ea6b43d049bbf572270d79e8b70f43b827e7a8e1bd74efe8f54bbec8dc21458bc239ccfbf517f7d0912f7dce1cc38853", @nested={0xe11, 0x0, 0x0, 0x1, [@generic="dd8013637783230cdb321a66ee07aee3e55f01a7b56559362356a4064c24011e0f2aedd5f1f189a339b41dc6971c4462c64038c2c148328ff17d2d5d871c8ef0b529d3b3ba4a59abdee12027ca487b92436ae68df399471e73306cd86b6829333e981baea2490d24f5bac49f323241354cc6cd164047a8dc670808ec41d0d4424fc9a0d9c184111c60c47e6416e2998da1412b2f756d875499add014296d8b9c6498ff509c2599f161e317c902138c1f95c2b09eb4995df827e5c5e96727fd1d39163960a9d3dab6a27c1cb5c803e85c6291cc0bcf5697c9b4d63ce41c96b7ff1cceb11e22d0818378ceb7e9efc7d3a3d2fd71bc5fa7dd59cd1e08b2dbbde26ec4eac329fbce874a73fcf25fb605c12ab0bd8270e7100e2bd7e2d0cee489084632d0fff26d17ceccf851e17b1a5dba2b55b33009dc5106009fa60b011c97314e5917814de5e51d0a4145a19ae340814e74981ba0f4287a9a8ba3c96e8ac3c488b6d9d7b6d425f76074b6de7fedaada89f722b4bcf48fecec467da92d500d39828d285f4e928d23d886d1675751429c7f2abe8f261fe9758992923746f284e2be4bb59213c368f9c554775406ca2587137116d1a62673d26cc623fb8cf4d47f172f38ec4e711f9642bd2b48bcc58d769347428257f2a84d39d20316e741f6a2fa4abf99cfd987e0749813217c95c734c5f864d23f995c42e973311cb728e6ea81a6854c9f94a05109d82864c24f69be92c5446027b13478953674b94b6aca2e2a141b0152b9a3058053e45cb886f3cdc16e1a78e1b0e106b6c24310aa573ba345ed8f802bfef448d692ce24da1ddf1f849a08f5c1321298959a7a7a70873a455ecf88fc9223173556cca50ab77539a7a9e8b7818c1b2e5b1bb619bc2ba4efc9eab3e5f7a5ae7d3225a06444404a957000c2c6eb2197c51d1555b42eef73e03252a9fe7249707995546bb3ba018f6d162529324285ad0a876df6c150bf6ff459c5ab8cc574ef3397c8278ac22dbf360acbdefc4f2c9519fbfd4bc617898d9ad0c65de81b44dc03c4aefd51682dcada84443b76ee0f3c60dc7a2269274aea2164995ef8b56e65334da4cd8afa1fcbb405804457240139f19878ef9e12ccea4d86f7a9ffa40afb8cea1b11522a814f532690bbe127d1a9506cba578fc9784e3df3ea8f20399bb231657f857a2dff722bdf76435f4be0d3dc4d16f49b81ff97ff4ee46f5e32f090ba5d0b918dd930754964f61c51f8e4a331430c399c74ee417e7fda7ae7aaefa3e9fb546d9895d7895e1a1e9ee3eed4f7b57ed2ccab6560d87be4ca174414d006b5cf5f5bf64f122ff42fa7ebc59e6672eb1320f7342145c554f5cdff00e817aba56bfb23d4403d6a4a7d50e86049b903db20de45d0b8123bf9b897f43e4be2b9b9f282cfb31d69cb2a1afa84ec0e3b2d518d574034985ab2ad99cff9ce8ab177362630f2766ff1707134d6af2f9edbe238a013c7c817eff34acc35b930a69521cf3456a4375bd85960e0ce392b5697b249c5bd1f283a6b78f24d715054b001598ac405ce790c5e408303ec4e615fd3f7f41ad9b0a13155e65cac86fc90ffdf8024e6263e595dd06855921328cf85e425095093804bd944faa47379121da4b187a9b296f09554fae10f3feef4f2c85ad0aaa0bd987d42ec132da407ad1e0eedc8408b11a1f0868240f8007ed20c0547e29e4a6ad9d567d74c7553fe30e857c27ea741dfc601ec977e6cfdde84808c034507c02115e000e42c33343035df06f8373601c142891103a7acf97b5edf5fe2a7d7cf4736fda2914afe7dc3f8f6367fb4c3a5f80bfa3628c7c8d2c3023c5337bcffa31cf14236dee5c937e06375a38e0f7a00c79e89f6d625fd16aa32085c3caf1ccd801cbcc1e9722a263eb75570339a77f7c20f87550546fc3789e73e63ec623504e66ef5c3f680a51c61e503d0c5064499e764abc0fd09ebddf0de209239d1199dd5c55125471eef4d3b12cdda81700f2562e6abcd299721352e5a39ee4d02f4640925ba0da238d5f9cf0e2d8e7a8b36292538c57db518f2a4e867f9fee2ca165680ac22f01d828edc6fdc04fd960140aadcf8b306dd20b16b6f5028ccfaf3c2b37b7b3bef2e15fe4677c52e6f30ed415b2db9aab78a424751d21424b4fdadb609cd6da8eae97e8b7610bf72af669776362a3e8510d2867aa66888975da86ac8e39d2d2c3ffb7cbd95d2c4ea53ffdc27fbc7f13180a028631a1f40ac2fa76a2f594598569c31cfde950ae87deb16f6a19e9c3339258c138c25ab2ac5909e8428ce38f7a8e107b2dfcc315771f0db238866f75ddee63368b47bcc9084dfb3fda75860b07b9ab447d620962184b6b308066f410d20297ea8febd866769648cca36cd448a2116451ce59285830a3a48d7c7f9328231194e263bc147306e00856fa60fd9c76a1a6312c479a07866d87f06b13c95d909f3587215a2053f62e8229f52d32b28d2f70182942b7d8df4da53a3a658a410d036d13d55ec3b6a8e8940da8dfef3abfc97cab7e74efff123127d3d39c7abbef32a2be17f0a491dc5b99205e2e10f00a65c5d48da79d750e059dc50aca7aa9e19c4be687a9b1a5351ed99069c4910a7f216acd35d944fff47a466de6cf09ccfa95a44dec859f3ea485f92edc5e8d59ad6cb708b91501ea2614545612a20d9332dd0a9d085a2ce6daba9acdbc6a5573a93bdccfd9f95de413412ee2efe6ff7eaa651c0b25e80539f7dc166d0d6868bfdce0a9ca9cf3c74dcd79cff03c1f9ddcbdf265c42536e79c4e7f79d7ddcae6727462899f4429ca64b013307ca088e73858867244fefb557c10b9faa98a38601e6fe511147c050b4d219e35932c4b4bad6f5fb8f22b7c385b77c41dd4708af7e5e1e726ea63624fb68f909157703b336b928b2afbc5ccfb5f8f005dc9393b973ceae10adbabeefe74d1b5bbbd2afbed9c307837d0fb34ac9001ddb4d9e032723e58e48d9bcaff26149c381dbda62ca03bb5e7c59f32530a874b344521de83a5d44b993d9d054d918669aaff60923f0275aaaa851ea32f9d9b5ff09af0d45c84e0673294d66665766b8c1aa85d4d68d9789ba34e53017bfd68b71db7d1e8744074e86d8219e486969d08a93b7076e72bac5235b1d29ce7a673a6d762127d2faf085ade6d83c0f84c6ebb4c31a26e3d30c450e7a904e6f0f2d2a2ab531ae22693eef203caffa7086d6dc78bea8b007e59422107dfa100547b81d37a6ae8fff093edbed3a1875b43d4690f2c418a4413a32af776c99aa687e5569697e79bb86dd7aa0d48bc47335fd481cd16f0c8dd028937dc10783c25cc32f49363dfb0da6dbe6abbb0806113a31d7bdda717ff3f6a837f31c60862ea9ea5df0d2035b69d956750052283440422421cb8631828be493f8516ee57558da9df7de1f2cb4d8ea32f1cdb708f02b63094ab90edc595cb5ef6668ca3192c80281abb7a65ab1221ee73589a0670843c467be1d2fd7bae90e2313b0a8cbb6e9f83c53b2301c807df0430d919094e6ae79ec1cc87fb3d74b48ac2d1e5656b75edfddf27294619fe1cc3b0d9f02da7730e34e50613d19e3301d1a54e540e0ef0d7bc325539dde8e7e3793e2622cac27c94d7a2390ba36aa7088ddd51d01497d6be42d012e878f41f453a86179d81160db470eca569d7148824afa620208f8dbb4298dbf53bb7b08b014d20f92cfd34f43131196492d906fc0c260b1dba64b2abed4bfe953ffb8b987a2750756658a06bd53a45356fae77a5f1c100f9db201e59010f81d12d163c416455861a7611c9f3348c1eb1239dbff6497c3f6f8513517a4752c0968945b7a5d84d8d5f5b0a4ee41ba63ca6e39823514ed21a29306f95b2d736cdb726282f5a2236c67cd44819b0bc210a2ed612725a36d179eb83ae27e19a852a21cd22fc01c1496b3a148a3bd1db54696b31c1a36766e63c4c8d4e80b8eefb9d9c13dba376b742568dabe617f3776e594b0e755e6fdf1f25806bd4ad6f543b4b49006db5e7d6a79628204da868cf0aa19b6f2a2b625c85fee6ff3695fd0ea7538f40ccf1f6beb89e9823fb7f34b3aff693712632c0f95a9f51f10c9e4548acc2fceefdb1f6fc9003c9e16bec0defb1b4fdb18175cfac1d5257fc3fe356f3ba80ebdd473a3013c97b1e32977751b8d5814ee82ddf1953fd8d623aee5defbf7770b224f35e9a63f7e6eb100574651d64deae4d9134e7106bccbf15537d3972c18549d7295eb0f6b6221f4bc3b3a9e52953862a3e40dd9351cbed6b2b9d975a8b9eec21a16ff10d65fe556c02b0de223f30cb1f92c8b760c7bfe7ed3da6cbf9e61fe3d0ece3c545da3ed652fdc2ccff5aed70999f8a3468f88d510a5754b7773ca97c4cd68d2d641fe83e99aa4f94fe2607d3444de27a7299897b9d8bb386569e21cae1791838261d6fff14a6a99421e3bd6760ef0003d853f6e2a632fc46e0e60530716a1e164a3780b22cc379331ceae5ce9059a4ba84d9e1e3ee8932aa40cfc4ad76b5a0cb0a2224efd9024da7c7d06ffac2e1df5edfc9f9ab9dc052b9ea94caccf698a8e06674e6ba5f6fd28f20d8dc038b2bff6ab06f05a15fc2a151b10c0a1e99c929af1e60d12317c5cf4263c806f4e85edf4081f7a00d4f6a2cb4a9670a80ac667fa523297c31ff351ec223794cc289e1a7b97d3cd57368bd7cf830f2d5ba00d738a104ee170af22c11c262369cf37c044e329750037f35e8b0a9f3cd120398b8e9ac7b3f755199141800e8816b7f9ebf20c40eee0b7becb19bea2a2847d506404fa3b3edd3ae05d96d9eeab009539c84d07f2e5269ed3da55f989fcf7fd1430455b7462ed1a2d8ce2663b54a2103a5dfc9fd356fb7ec96da22cd6e6833f63c46317b621af2123196e1f1a4f25b33d792180d50f91914266eff4c5f2b6fb0b7c4e88e176e621da71cf50669d1284be33969923af5c6e7b6fda52b3be3c5bb014d22fc0ac438f70d4bc081137609bb901f98c5cc70c8dd530b2cb30cf4b3d43c129ef31a0d15e2a4b6bbe59a3ab5e2ae7b8fc392b08ba7105d24de49942b71b5e87c0bb15417e578ed229a6d0f91134b45ce590cc19d3c6e6f65948"]}]}, 0xea0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f00000019c0)={0x24, 0x12, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x6}, @nested={0x9, 0x0, 0x0, 0x1, [@generic="127c0809f3"]}]}, 0x24}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 07:31:25 executing program 3: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x16) 07:31:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x3f, &(0x7f0000000180)=0x0) io_submit(r3, 0x1, &(0x7f0000000580)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) io_submit(r3, 0x2, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x7}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}]) [ 379.034524][ T38] audit: type=1804 audit(1627716685.779:340): pid=16102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/283/bus" dev="sda1" ino=13909 res=1 errno=0 [ 379.084310][T16107] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16107 comm=syz-executor.1 [ 379.107365][T16107] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 07:31:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000012d80)={0x0, @in, @l2tp={0x2, 0x0, @dev}, @xdp, 0x6}) 07:31:26 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r1, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:26 executing program 3: r0 = socket(0x2, 0x3, 0x3) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 07:31:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000500)={0x3, 'ip6gretap0\x00'}) 07:31:26 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/net\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 07:31:26 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x4d) 07:31:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000040)=""/24, &(0x7f0000000080)=0x18) 07:31:26 executing program 3: pipe(&(0x7f00000002c0)={0xffffffffffffffff}) ioctl$EVIOCGABS20(r0, 0x80184560, 0x0) 07:31:26 executing program 1: io_setup(0x3f, &(0x7f0000000180)=0x0) io_submit(r0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) io_getevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, r1+10000000}) 07:31:26 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000500)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) close(r1) close(r1) 07:31:26 executing program 0: mknod(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) readlink(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=""/107, 0x6b) [ 379.614565][ T38] audit: type=1804 audit(1627716686.439:341): pid=16135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/284/bus" dev="sda1" ino=14129 res=1 errno=0 07:31:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x0, 0xc}, &(0x7f0000000040)=0x20) 07:31:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000012d80)={0x0, @in, @generic={0x2, "280000cf5a13a0cf7f606b6654cd"}, @xdp, 0x5f}) [ 379.728462][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 379.818275][ T38] audit: type=1804 audit(1627716686.639:342): pid=16125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/284/bus" dev="sda1" ino=14129 res=1 errno=0 07:31:26 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r1, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:26 executing program 1: r0 = getpgrp(0x0) prlimit64(r0, 0xd, &(0x7f0000000080)={0x0, 0x9}, 0x0) 07:31:26 executing program 3: capset(0x0, &(0x7f0000000080)) waitid(0x1, 0x0, &(0x7f0000000100), 0x2, 0x0) 07:31:26 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000003200)='ns/ipc\x00') 07:31:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000001c0), 0x4) 07:31:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r0, 0x1, 0x14, 0x0, &(0x7f0000000440)) 07:31:26 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000600)={&(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback, 0x4}, 0x1c, 0x0, 0x0, &(0x7f00000004c0)=[@hopopts={{0x18}}], 0x18}, 0x10) 07:31:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f0000000a00)={&(0x7f0000000540)={0xa, 0x0, 0x0, @private1}, 0x1c, 0x0}, 0x20040000) 07:31:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f000000c200)={0x0, 0x989680}) [ 380.218330][ T38] audit: type=1804 audit(1627716687.039:343): pid=16160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/285/bus" dev="sda1" ino=14161 res=1 errno=0 [ 380.267618][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001340)=ANY=[@ANYBLOB='$\x00\x00\x00\"\x00u\a'], 0x24}}, 0x0) recvmmsg(r0, &(0x7f000000a0c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:31:27 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000100), 0xc) 07:31:27 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) [ 380.446600][ T38] audit: type=1804 audit(1627716687.169:344): pid=16162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/285/bus" dev="sda1" ino=14161 res=1 errno=0 07:31:27 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r1, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:27 executing program 3: prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffd000/0x3000)=nil) 07:31:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@delneigh={0x1c, 0x1d, 0x1}, 0x1c}}, 0x0) 07:31:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f00000003c0)=0x8, 0x4) 07:31:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@ipv6_newaddrlabel={0x30, 0x48, 0x739, 0x0, 0x0, {}, [@IFAL_ADDRESS={0x14, 0x1, @remote}]}, 0x30}}, 0x0) 07:31:27 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000000)={'syztnl2\x00', 0x0}) 07:31:27 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000080)) 07:31:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0xcc, 0x4) [ 380.867297][ T38] audit: type=1804 audit(1627716687.689:345): pid=16187 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/286/bus" dev="sda1" ino=13909 res=1 errno=0 07:31:27 executing program 1: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) [ 380.924490][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:27 executing program 5: madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x15) 07:31:27 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_trace_dev_match', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 381.078098][ T38] audit: type=1804 audit(1627716687.819:346): pid=16190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/286/bus" dev="sda1" ino=13909 res=1 errno=0 07:31:27 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpgid(0x0) sendmsg$netlink(r0, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @cred={{0x1c, 0x1, 0x2, {r1}}}], 0x40}, 0x0) 07:31:28 executing program 2: r0 = socket(0x2, 0x3, 0x3) sendmsg$unix(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@abs, 0x6e, 0x0}, 0x40044) [ 381.177065][T16199] capability: warning: `syz-executor.1' uses 32-bit capabilities (legacy support in use) 07:31:28 executing program 5: memfd_create(&(0x7f00000002c0)='wlan0\x00', 0x2) 07:31:28 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/LNXSYSTM:00', 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002540)='/sys/devices/virtual', 0x0, 0x0) renameat2(r0, &(0x7f0000007b80)='./file0\x00', r1, &(0x7f0000007bc0)='./file0\x00', 0x0) 07:31:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_opts(r0, 0x0, 0x14, &(0x7f0000000040)='L', 0x1) [ 381.361784][T16210] raw_sendmsg: syz-executor.2 forgot to set AF_INET. Fix it! 07:31:28 executing program 3: open$dir(&(0x7f0000000700)='./file0\x00', 0x40, 0x0) 07:31:28 executing program 5: getresuid(&(0x7f0000006fc0), &(0x7f0000007000), &(0x7f0000007040)) 07:31:28 executing program 2: socketpair(0xa, 0x0, 0x80000001, 0x0) [ 381.492338][ T38] audit: type=1804 audit(1627716688.269:347): pid=16212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/287/bus" dev="sda1" ino=14722 res=1 errno=0 [ 381.551460][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000640), 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) pipe2(&(0x7f0000000640), 0x0) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 07:31:28 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/tpm_crb', 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 07:31:28 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/bpf', 0x0, 0x0) 07:31:28 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000001900)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x10, 0x0, "62a6548a7d491733bd07462b45bc22b62fd72d58c204c1534528dcc3b0031437e510c78c9c93c075ff428f119ab06440306488ce7f7d3aa05ebd175c41ed3bb58a22e356482ac3809b3200b573c0f706"}, 0xd8) 07:31:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc) 07:31:28 executing program 0: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_timeout(0xf, r0, 0x1) 07:31:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000140)) 07:31:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0xfff, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, 0x0) 07:31:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'erspan0\x00'}) [ 382.247395][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:29 executing program 3: socketpair(0xa, 0x3, 0x2, 0x0) 07:31:29 executing program 0: add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, 0xfffffffffffffff9) 07:31:29 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000680)=[{{&(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback}}}], 0x20}}], 0x1, 0x0) 07:31:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000012d80)={0x0, @in, @l2tp={0x2, 0x0, @loopback}, @xdp={0x2c, 0xf}, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 07:31:29 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000003480)=[{{&(0x7f00000003c0)={0x2, 0x4e21, @empty}, 0x10, 0x0}}], 0x1, 0x24028cc0) sendmsg$sock(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)="e3", 0x1}, {&(0x7f0000000100)="cc", 0x1}, {&(0x7f0000000180)='1', 0x1}], 0x3}, 0x0) 07:31:29 executing program 3: clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0xca, 0x3, 0x0, 0x9}, &(0x7f0000000200), &(0x7f0000000280)={r0, r1+10000000}, &(0x7f0000000300)={&(0x7f00000002c0)={[0x3]}, 0x8}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) 07:31:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000004c0), 0x4) [ 382.622335][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:29 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_opts(r0, 0x0, 0x10, &(0x7f0000000040), 0x0) 07:31:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f0000000000)=@unspec, 0xffffffffffffffaf) 07:31:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000001c0)={'bond_slave_1\x00'}) 07:31:29 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x80001) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) 07:31:29 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x141042, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:29 executing program 2: sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0xe04fd6d6ad06b74e) 07:31:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000001640)) 07:31:29 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f00000002c0)="5c45c1face899e739484c80e16e4c3e241c180f507f02e4af76920baa3fa39bd", 0x20) 07:31:29 executing program 1: prlimit64(0x0, 0x7, &(0x7f0000000080), 0x0) syz_open_procfs$namespace(0x0, 0x0) 07:31:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x400, "a619f38ecaadd1bc72883f2c3fc44c492f28bd587727e954b297aac9bc1c5f7c"}) 07:31:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$netlink(r0, 0x0, &(0x7f0000000040)) [ 383.150274][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 383.176323][ T38] kauditd_printk_skb: 6 callbacks suppressed [ 383.176339][ T38] audit: type=1804 audit(1627716689.999:354): pid=16283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/290/bus" dev="sda1" ino=14659 res=1 errno=0 07:31:30 executing program 0: r0 = socket(0x2, 0x3, 0x3) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-aesni\x00'}, 0x58) 07:31:30 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:30 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000200)) 07:31:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000002a80)) 07:31:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)=@setneightbl={0x28, 0x43, 0x401, 0x0, 0x0, {0x1c}, [@NDTA_NAME={0x11, 0x1, '/proc/crypto\x00'}]}, 0x28}}, 0x0) 07:31:30 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, r0, r0) 07:31:30 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000300)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dstopts_2292={{0x18}}], 0x18}, 0x0) 07:31:30 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x49, 0x4) [ 383.513634][ T38] audit: type=1804 audit(1627716690.339:355): pid=16301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/291/bus" dev="sda1" ino=14882 res=1 errno=0 07:31:30 executing program 3: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, r0) [ 383.588466][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@private2, 0x0, 0x2}, &(0x7f0000000140)=0x20) [ 383.658632][ T38] audit: type=1804 audit(1627716690.379:356): pid=16301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/291/bus" dev="sda1" ino=14882 res=1 errno=0 07:31:30 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', '#,$(}'}, 0x30, 0x0) 07:31:30 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) 07:31:30 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:30 executing program 5: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) 07:31:30 executing program 3: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x82e01, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 383.842126][ T38] audit: type=1804 audit(1627716690.449:357): pid=16301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/291/bus" dev="sda1" ino=14882 res=1 errno=0 07:31:30 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_opts(r0, 0x0, 0xd6bde2c200b9dc14, 0x0, &(0x7f0000000000)) 07:31:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000000), 0x4) [ 384.008795][ T38] audit: type=1804 audit(1627716690.819:358): pid=16323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/292/bus" dev="sda1" ino=14183 res=1 errno=0 [ 384.020448][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:30 executing program 0: add_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000001c0)='P', 0x1, 0xfffffffffffffffb) 07:31:30 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r1, r0, 0x0, &(0x7f00000002c0)) 07:31:31 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x164) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8982, &(0x7f0000000400)) 07:31:31 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop4', 0x0, 0x0) 07:31:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGABS20(r0, 0x80184560, 0x0) [ 384.211657][ T38] audit: type=1804 audit(1627716690.829:359): pid=16323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/292/bus" dev="sda1" ino=14183 res=1 errno=0 07:31:31 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvfrom(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 07:31:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000043c0)={0x0, @in={0x2, 0x0, @multicast1}, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, @rc={0x1f, @none}}) [ 384.364866][ T38] audit: type=1804 audit(1627716690.899:360): pid=16323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/292/bus" dev="sda1" ino=14183 res=1 errno=0 07:31:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000003100)=[{{&(0x7f0000000000)={0x2, 0x4e2a, @local}, 0x10, 0x0}}], 0x1, 0x0) [ 384.456692][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:31 executing program 3: r0 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) write$khugepaged_scan(r0, &(0x7f0000000340), 0x8) 07:31:31 executing program 1: add_key(&(0x7f0000000200)='ceph\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='((^([\'(\x00', 0x0) 07:31:31 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 384.562834][ T38] audit: type=1804 audit(1627716691.269:361): pid=16343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/293/bus" dev="sda1" ino=14132 res=1 errno=0 07:31:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@ipv6_newroute={0x34, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @LWTUNNEL_IP6_SRC={0x14, 0x3, @empty}}]}, 0x34}}, 0x0) 07:31:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000000100)={'veth0_macvtap\x00', @ifru_hwaddr=@link_local}) 07:31:31 executing program 2: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$update(0x2, r1, &(0x7f0000001140)="88", 0x1) [ 384.706800][ T38] audit: type=1804 audit(1627716691.269:362): pid=16343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/293/bus" dev="sda1" ino=14132 res=1 errno=0 07:31:31 executing program 3: r0 = socket(0x2, 0xa, 0x0) sendmsg$unix(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@abs, 0x6e, 0x0}, 0x0) 07:31:31 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x2, &(0x7f0000000340)="c9", 0x1) 07:31:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={0x0}}, 0x0) [ 384.894458][ T38] audit: type=1804 audit(1627716691.319:363): pid=16343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/293/bus" dev="sda1" ino=14132 res=1 errno=0 07:31:31 executing program 2: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) [ 385.020388][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:31 executing program 0: get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, 0x4) 07:31:32 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000700)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000c40)='ns/uts\x00') 07:31:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_opts(r0, 0x0, 0x19, &(0x7f0000000040)='U', 0x1) 07:31:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f00000003c0)=0x8, 0x4) 07:31:32 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:32 executing program 2: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, r1) 07:31:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x80000000}, 0xc) 07:31:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000004940), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 07:31:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x9, 0x4) 07:31:32 executing program 3: syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) select(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x8}, &(0x7f0000000140)={0x0, 0x2710}) 07:31:32 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) 07:31:32 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000600)="9b", 0x1) [ 385.833541][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:32 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:32 executing program 1: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) write$P9_RLERROR(r0, 0x0, 0x0) 07:31:32 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r0) 07:31:32 executing program 3: mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000000440)=""/244) 07:31:32 executing program 2: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$link(0x8, r1, r0) 07:31:32 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@getqdisc={0x24, 0x26, 0xb05}, 0x24}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 07:31:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x3f, &(0x7f0000000180)=0x0) io_submit(r1, 0x2, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 386.198254][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:33 executing program 5: socket(0x10, 0x3, 0x7fffffff) 07:31:33 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:33 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002540), 0x2, 0x0) write$FUSE_CREATE_OPEN(r0, 0x0, 0x0) 07:31:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) accept4$unix(r0, 0x0, 0x0, 0x0) 07:31:33 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000080)={0x4, 0x9}, 0x0) [ 386.502428][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:33 executing program 1: r0 = syz_open_dev$rtc(&(0x7f0000000080), 0x0, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) 07:31:33 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001340)=ANY=[@ANYBLOB='$\x00\x00\x00\"\x00u\a'], 0x24}}, 0x0) recvmmsg(r0, &(0x7f000000a0c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 07:31:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002800)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=[@dstopts_2292={{0x18}}, @dontfrag={{0x14}}], 0x30}}], 0x1, 0x0) 07:31:33 executing program 5: syz_open_dev$evdev(&(0x7f00000000c0), 0xffff, 0x0) 07:31:34 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) 07:31:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0x0) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000000340)) 07:31:34 executing program 2: sendmsg$unix(0xffffffffffffffff, 0x0, 0x8dec4a21b5929642) 07:31:34 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:34 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x5f7882, 0x0) 07:31:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000780)) 07:31:34 executing program 3: r0 = socket$unix(0x1, 0x3, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x12121, 0x0, 0x0) 07:31:34 executing program 5: clock_gettime(0x0, &(0x7f00000011c0)) 07:31:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {0x0}, {&(0x7f0000000100)="631ce17022c8d845e4eba8c5fa92d1306c9ee74d66ac213c0087ee65f7a151a28b5a0fd4af6b987ed9f33b13aa611eb1fc953ef1185d3aed37341704d361ae6abc9baff5b6242ae4760408652e7b2b315a6ff25b9f1b2449523cb10aa9e5a4e686d6259c547a8e533b30011cdf2780a2cb6e249fcdd1164c1ea81fd6003d5b3dbbb71e4533892cb640ab859ab1559e5aa6721d15831d84abfd0b9bd178de0dc19e3ecc6e2145b6a3f73d620a56c95bde0dd31ec2cdddf672899fa47550bd86a9b21616a4d1d079030f0fca9a6d78d2fd9c937ca16382e54e83f6c185901364d5a2a32e8d93f0a84b8d6e69f78aef40b1", 0xf0}, {&(0x7f0000000840)="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", 0x1000}, {&(0x7f0000001840)="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", 0xdd1}], 0x5}, 0x0) [ 387.397602][ C1] net_ratelimit: 1 callbacks suppressed [ 387.397621][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:34 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x268080, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000800), 0x0, 0x0) pselect6(0x40, &(0x7f00000004c0), &(0x7f0000000500)={0xf1}, 0x0, 0x0, 0x0) 07:31:34 executing program 0: wait4(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000002280)={'syz', 0x1}, &(0x7f0000002580)="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", 0x1000, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), &(0x7f0000002180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f00000022c0)='dns_resolver\x00', &(0x7f0000002300)={'syz', 0x2}, &(0x7f0000002340)='\x00', 0x0) 07:31:34 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:34 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 07:31:34 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002540)='/sys/devices/virtual', 0x0, 0x0) inotify_rm_watch(r0, 0x0) 07:31:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000000)=@dstopts, 0x8) 07:31:34 executing program 2: r0 = socket(0x2, 0x3, 0x3) sendmsg$unix(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@abs, 0x6e, 0x0}, 0x0) recvmsg$unix(r0, &(0x7f0000001580)={&(0x7f0000000100), 0x6e, &(0x7f0000001440)=[{&(0x7f0000000080)=""/30, 0x1e}], 0x1}, 0x0) 07:31:34 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) [ 387.868491][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000043c0)={0x0, @in={0x2, 0x0, @multicast1}, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, @rc}) 07:31:34 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:34 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000340)={@dev}, 0x14) 07:31:34 executing program 1: sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003480)=[{{&(0x7f00000003c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, 0x0, 0x18}}], 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) 07:31:34 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000004c0), 0x0, 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000500)) 07:31:35 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) io_setup(0x3f, &(0x7f0000000380)=0x0) io_getevents(r0, 0x4, 0x0, 0x0, 0x0) 07:31:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_opts(r0, 0x0, 0xf, &(0x7f0000000100)='z', 0x1) [ 388.263094][ T38] kauditd_printk_skb: 14 callbacks suppressed [ 388.263111][ T38] audit: type=1804 audit(1627716695.089:378): pid=16494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/301/bus" dev="sda1" ino=15241 res=1 errno=0 [ 388.297457][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:35 executing program 3: request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xffffffffffffffff) 07:31:35 executing program 1: sysfs$2(0x2, 0x0, &(0x7f0000000280)=""/18) 07:31:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in=@empty, @in6=@local}}, {{@in6=@private1}, 0x0, @in=@local}}, &(0x7f0000000100)=0xffffffffffffffc4) 07:31:35 executing program 2: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000540)='dns_resolver\x00', 0x0, 0x0, 0x0, r0) 07:31:35 executing program 0: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) [ 388.534370][ T38] audit: type=1804 audit(1627716695.309:379): pid=16505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/301/bus" dev="sda1" ino=15241 res=1 errno=0 07:31:35 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000380), 0x10400, 0x0) 07:31:35 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@delneigh={0x1c, 0x1d, 0x1, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) 07:31:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000040)={'team_slave_1\x00', @ifru_ivalue}) 07:31:35 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002540)='/sys/devices/virtual', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00') 07:31:35 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002800)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=[@hoplimit_2292={{0x14}}, @tclass={{0x14}}, @dontfrag={{0x14}}], 0x48}}], 0x1, 0x20000810) 07:31:35 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x2) 07:31:35 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000) [ 389.132260][ T38] audit: type=1804 audit(1627716695.959:380): pid=16528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/302/bus" dev="sda1" ino=15242 res=1 errno=0 07:31:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000043c0)={0x0, @in={0x2, 0x0, @multicast1}, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, @l2tp}) [ 389.174234][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000003500)={0x0, 0x0, &(0x7f0000003480)=[{&(0x7f0000002140)={0x10, 0x28, 0x1}, 0x10}], 0x1}, 0x0) 07:31:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f000000a180)=[{{&(0x7f00000003c0)={0x2, 0x4e21, @remote}, 0x10, 0x0}}, {{&(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10, 0x0}}], 0x2, 0x24028c90) [ 389.269465][ T38] audit: type=1804 audit(1627716696.089:381): pid=16534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/302/bus" dev="sda1" ino=15242 res=1 errno=0 07:31:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x2a, 0x0, 0x0) 07:31:36 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f00000004c0)=0x3448, 0x4) 07:31:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f00000004c0)=0xda7, 0x4) 07:31:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, 0x0, 0x0) 07:31:36 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) select(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x8}, 0x0, &(0x7f00000001c0)) 07:31:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, 0x0, &(0x7f0000000180)) [ 389.674663][ T38] audit: type=1804 audit(1627716696.499:382): pid=16549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/303/bus" dev="sda1" ino=15229 res=1 errno=0 [ 389.681702][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000005380)={0x0, 0x0, &(0x7f00000052c0)=[{&(0x7f00000019c0)={0x18, 0x12, 0x1, 0x0, 0x0, "", [@nested={0x7, 0x0, 0x0, 0x1, [@generic="127c08"]}]}, 0x18}], 0x1}, 0x0) [ 389.800198][ T38] audit: type=1804 audit(1627716696.609:383): pid=16552 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/303/bus" dev="sda1" ino=15229 res=1 errno=0 07:31:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$sock(r0, &(0x7f00000015c0)={&(0x7f0000001640)=@in={0x2, 0x4e24, @private}, 0x80, 0x0, 0x0, &(0x7f0000001500)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}], 0x18}, 0x0) 07:31:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) 07:31:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'batadv_slave_1\x00'}) 07:31:36 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x82a, 0x4) 07:31:36 executing program 1: unshare(0x26000600) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) 07:31:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000)=0x7f, 0x4) 07:31:37 executing program 5: r0 = socket$inet(0x2, 0x3, 0x9) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 07:31:37 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x298000, 0x0) memfd_create(&(0x7f0000000000)='\x00', 0x2) 07:31:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) recvmmsg$unix(r1, &(0x7f0000000040), 0x1, 0x0, &(0x7f0000002380)) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000a0e05d"], 0x14}}, 0x0) 07:31:37 executing program 0: request_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0) [ 390.329531][ T38] audit: type=1804 audit(1627716697.149:384): pid=16576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/304/bus" dev="sda1" ino=15262 res=1 errno=0 07:31:37 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x66, 0x0, &(0x7f0000000040)=0x4c) [ 390.424629][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 390.508349][ T38] audit: type=1804 audit(1627716697.329:385): pid=16578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/304/bus" dev="sda1" ino=15262 res=1 errno=0 07:31:37 executing program 3: r0 = socket(0x11, 0xa, 0x0) getsockname(r0, 0x0, &(0x7f0000000080)) 07:31:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="100000000000000001"], 0x10}, 0x0) 07:31:37 executing program 1: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000300)="a0", 0x1, r0) keyctl$setperm(0x5, r1, 0x0) 07:31:37 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:37 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) 07:31:37 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x2762c2, 0x0) 07:31:37 executing program 3: unshare(0x26000200) unshare(0x20000) [ 390.901532][ T38] audit: type=1804 audit(1627716697.729:386): pid=16599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/305/bus" dev="sda1" ino=15259 res=1 errno=0 [ 390.910543][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:37 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0xc8202, 0x0) 07:31:37 executing program 1: pipe2(&(0x7f0000001180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) dup3(r2, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/152, 0x98}, {&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f0000000140)=""/136, 0x88}, {&(0x7f0000000240)=""/175}], 0x100000000000025e) 07:31:37 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) [ 391.065357][ T38] audit: type=1804 audit(1627716697.889:387): pid=16603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/305/bus" dev="sda1" ino=15259 res=1 errno=0 07:31:37 executing program 0: keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="e7ac57ac8a6321f60c638509c799ea4e8eaac4c8af815fa14b2a0c22b9b96d8b3d9a9a7c593010ac1dc7e87d44dae31c18224e57018e69de4305e1d1fdcb5b6793093a062af7f05c02f0df8d9cf9233af0359e", 0x53}, {&(0x7f00000001c0)="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", 0x168}], 0x353, 0x0) 07:31:38 executing program 3: mq_timedsend(0xffffffffffffffff, 0x0, 0x18, 0x4e66e521, 0x0) 07:31:38 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0) 07:31:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$unix(0x1, 0x5, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) write$P9_RGETLOCK(r2, &(0x7f0000000000)={0x1e, 0x37, 0xfffc, {0x0, 0x0, 0x0, 0xffffffffffffffff}}, 0x1e) 07:31:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x24}, 0x0) 07:31:38 executing program 0: unshare(0x26000200) unshare(0xc040000) 07:31:38 executing program 3: unshare(0x2000000) unshare(0x2000000) [ 391.644404][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:38 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) 07:31:38 executing program 2: unshare(0xc000000) shmget(0x1, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 07:31:38 executing program 5: ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000000)) shmat(0x0, &(0x7f00005b6000/0x4000)=nil, 0x3b3a75b6022cc228) shmat(0x0, &(0x7f00004ab000/0x2000)=nil, 0x6000) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x6000) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f00004aa000/0x3000)=nil, 0x4000) 07:31:38 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x400, 0x0) 07:31:38 executing program 3: fork() add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) 07:31:38 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:38 executing program 1: keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="4821f6e2db1a5a92393f6e8809d34364dd2834e59c5af6f0401d030ec4203b94cd7a0528c2f6e26ab48c9e18ce7c774c92068c4a691e813f084c67f9dad8315cfd21894ef54c626b516d28f8fe156e48045b8cdacbd0cfc27db1ad0b3db329d3809fe9ced7c6ef01df9c53dccd1ca33788", 0x71}, {&(0x7f0000000000)="cb3537e119946301ffced0d0ce2120669903503f006f115ee09957f608192ec5e2f25539538a96cac3143b2b700551935b2a6056cbb4790d457c4025911855adfbb67cd98c682bed81983165a6a749e67b572daaacf08319891387d32b8bfd3943d2c6d079205de605f68e53653b81a1296b3e4993646c6a132cfc37ed5b8858e7a376ea17ba215f282d3dd376f6367ea24df55989574537191ca2d4", 0x9c}, {&(0x7f0000000280)="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", 0x148}, {&(0x7f0000000580)="af75136cb1ac494761c8f1d2f9ffe231602c90b8cfe73470e28e3671057bb63dfbe60a365b41d97d57a35b4c25a24ba6706240a60535217bb596a61827991411a2146cbdbb29ed1ea8714ed7a3fc44e5a019399299f51e0265f219699b174e5c7a5200000000f3c8d1ea08cbe2cdd7fea9faa61d3c471883190fc430568a0c27e84506693f3775848fb9f933c73bfba9f4ded84d3a8cef263a6e80333c26d60cf93a7c8b358ecb1eefffaa9af23eec8aecce9e2e6bbec5cddc37fd4d1989658488d024d8", 0xffffff05}], 0x36, 0x0) 07:31:38 executing program 2: unshare(0x26000200) unshare(0x22020000) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) 07:31:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000001280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000240)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_CSA_IES={0x1f8, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x6, 0xbb, [0x0]}, @beacon_params=[@NL80211_ATTR_IE={0x1d9, 0x2a, [@channel_switch={0x25, 0x3}, @cf={0x4, 0x6}, @dsss={0x3, 0x1}, @channel_switch={0x25, 0x3}, @ht={0x2d, 0x1a}, @tim={0x5, 0xa3, {0x0, 0x0, 0x0, "6b01b6aa94b6a46df0964f55f69db735bc701a0d066799231de754e17ee1ee525543516dfcb34adf99c52270274ac045463c3c7cc996b561296abaabdf6cba7e531dd9d05791bf1dca15231fd9bc5600c703cd7114648d2f4bd61d94e7fa9a7245c4c5e84fd9c6c7f3efe6e70d12013f945dbd578d401f53cd94121b1809afcd2cf57dde0005fd5efafe0c024eb503624b002013160f8a0111ff8a2c688eb948"}}, @fast_bss_trans={0x37, 0xfd, {0x0, 0x8, "96c972569cecc16a1278ccc0295868bb", "00b296067f02db860447cba7d0bc079305490eec97c1e16bd5f89c50e9f184c2", "26d28f6748b82a034b3945d8d1b9c7e45318641dfc216e11a65a7ebd03111e9b", [{0x0, 0xe, "9f864ca6b5d0b325863174794486"}, {0x0, 0x20, "a7fb915c0015c1d75c0e71882d707c17b249cde271d20ac565c1ae771272b27f"}, {0x0, 0x23, "99d5e7fb2f9d04721ad8402a6224f397b2c31209a55b0a40bff208b1f20da39d680130"}, {0x0, 0x10, "5477c9a08a2eccf7f348036247e48525"}, {0x0, 0xb, "e2aaa073d4d5b80b4462a9"}, {0x0, 0x18, "6e266927798e64ea051d2582083dc8df01830f01695bd2fd"}, {0x0, 0x15, "4ed35f74e98c082b9553aef77634a3895c59be2e2b"}, {0x0, 0x2, "5cd4"}]}}]}, @NL80211_ATTR_BEACON_TAIL={0xd, 0xf, [@sec_chan_ofs={0x3e, 0x1}, @chsw_timing={0x68, 0x4}]}]]}, @NL80211_ATTR_CSA_IES={0xcac, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_BEACON={0x6, 0xba, [0x0]}, @NL80211_ATTR_CSA_C_OFF_PRESP={0x6, 0xbb, [0x0]}, @NL80211_ATTR_CSA_C_OFF_BEACON={0x6, 0xba, [0x0]}, @beacon_params=[@NL80211_ATTR_FTM_RESPONDER={0x8, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_ENABLED={0x4}]}, @NL80211_ATTR_FTM_RESPONDER={0xe4, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0xd9, 0x2, "5a240fcbb37d86c3dd9db80b76d7c77447ba4322e2d13549eca219f8eee89a9eba1daf8fe49852ba43eda860ca3e61cc254dc65aa1d410f4f77fe6e21e20134c500cd876b82e3f6d83c59f1360d07409346f119a17a80eefe09ab01cc175ffd75be2393c5f909eeadb2b1d1fff33b5ea3857a0b5cb18905a8bbb51221300aaafca05745cce04bccfe86a1c146a9b665be11dbaa0e2f25add2e06d658832ca1df0ae72c9b510df17441a6d8115d20792ccecb5017983c8ac3a2883cf0958825c0fe1beaee6b72aa39cc598cfb351c1b9f0e245583bd"}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}]}, @NL80211_ATTR_IE_ASSOC_RESP={0x12d, 0x80, [@sec_chan_ofs={0x3e, 0x1}, @mesh_chsw={0x76, 0x6}, @mesh_id={0x72, 0x6}, @measure_req={0x26, 0xef, {0x0, 0x0, 0x0, "bc534d7a1aac85b053b285b470bb969257e9ab146ecc13346235413db5b5a803920eafaa9608c7b7aac66f63ab6c03690714539a38c5951def4a49c2f4a52e323db28613507dfddbfb98bc6b1cfa89b581ac4b5e7a72f23422649e8383369c9e3e26c45a3ef5aa2b5f51a8d9bb2dc38ceb1fdf1cff498b8d73c40277651046b10ba74237925aa3e4800285671849afdd0dcd043dafb2c1b5879f7026c6fdb9a44f0bff448b5fb71e09395b1daab12cc901ca547f8d42e5812328b74a732d49cdc3e8ce3240e1cc6fe7f410078e9f249f2ab9542d7af812fd80be7d90cf7cf7f157517080211e62610316c60f"}}, @link_id={0x65, 0x12}, @mesh_id={0x72, 0x6}, @ext_channel_switch={0x3c, 0x4}, @dsss={0x3, 0x1}]}, @NL80211_ATTR_PROBE_RESP={0x585, 0x91, "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"}, @NL80211_ATTR_IE_PROBE_RESP={0x4}, @NL80211_ATTR_PROBE_RESP={0x4e5, 0x91, "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"}]]}]}, 0xec4}}, 0x0) 07:31:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_START_AP(r0, 0xfffffffffffffffd, 0x0) [ 392.164288][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:39 executing program 3: unshare(0x2000400) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) 07:31:39 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_IOCTL(r0, 0x0, 0x0) 07:31:39 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:39 executing program 2: r0 = mq_open(&(0x7f0000000200)=',\n\x00', 0x2, 0x0, 0x0) mq_timedsend(r0, &(0x7f0000000280)="ec448ed4", 0x4, 0x0, 0x0) 07:31:39 executing program 5: r0 = getpgid(0x0) process_vm_writev(r0, &(0x7f0000001840)=[{0x0}, {&(0x7f0000000000)=""/64, 0x40}, {0x0}, {&(0x7f0000001740)=""/220, 0xdc}], 0x4, &(0x7f0000001b40)=[{&(0x7f00000018c0)=""/237, 0xed}], 0x1, 0x0) 07:31:39 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000), 0x0) 07:31:39 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) 07:31:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) timer_create(0x0, 0x0, &(0x7f0000000180)) timer_gettime(0x0, &(0x7f00000001c0)) [ 392.612697][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20}, 0x0) 07:31:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0), r1) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 07:31:39 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:31:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={0x0}}, 0x20040001) 07:31:39 executing program 1: unshare(0xc000000) shmctl$SHM_STAT(0x0, 0xd, 0x0) 07:31:39 executing program 5: r0 = shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmdt(r0) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x6000) 07:31:39 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:39 executing program 0: add_key(&(0x7f0000000100)='logon\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='logon\x00', 0x0) 07:31:40 executing program 2: r0 = fork() wait4(r0, 0x0, 0xe000000b, 0x0) 07:31:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000001540)={0x0, @in={0x2, 0x0, @broadcast}, @generic={0x0, "5115aaf0196c92b8de700dc6ca99"}, @qipcrtr, 0xfffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 07:31:40 executing program 1: mq_open(&(0x7f0000000040)='\'&\x00', 0x40, 0x0, &(0x7f0000000080)) [ 393.350092][ T38] kauditd_printk_skb: 9 callbacks suppressed [ 393.350110][ T38] audit: type=1804 audit(1627716700.169:397): pid=16693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/309/bus" dev="sda1" ino=15281 res=1 errno=0 07:31:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) sched_getparam(0x0, &(0x7f0000000080)) [ 393.450159][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:40 executing program 5: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000080), 0x0, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0xb3]}, 0x8}) 07:31:40 executing program 2: openat$pfkey(0xffffffffffffff9c, 0x0, 0x490000, 0x0) [ 393.583779][ T38] audit: type=1804 audit(1627716700.379:398): pid=16706 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/309/bus" dev="sda1" ino=15281 res=1 errno=0 07:31:40 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0xfffffffffffffdfc) 07:31:40 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:40 executing program 1: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x989680}) [ 393.741617][ T38] audit: type=1326 audit(1627716700.539:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16708 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 07:31:40 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x103, 0x4) 07:31:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000002700)={0x0, 0x0, &(0x7f00000026c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="20000000c2811e"], 0x20}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) 07:31:40 executing program 2: shmat(0x0, &(0x7f00005b6000/0x4000)=nil, 0x3b3a75b6022cc228) 07:31:40 executing program 3: keyctl$search(0xa, 0x0, &(0x7f0000000000)='rxrpc_s\x00', 0xffffffffffffffff, 0x0) 07:31:40 executing program 1: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000001440), 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r1, r0) keyctl$get_security(0x11, r1, 0x0, 0x0) 07:31:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x65, 0x0, &(0x7f0000000040)) [ 394.110309][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 07:31:41 executing program 2: select(0x40, &(0x7f00000001c0)={0x5}, 0x0, 0x0, &(0x7f0000000280)={0x77359400}) 07:31:41 executing program 3: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000000)=""/80) 07:31:41 executing program 2: r0 = socket$inet(0x2, 0x3, 0x9) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 07:31:41 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:41 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) unshare(0x0) 07:31:41 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 07:31:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_LEAVE_OCB(r0, &(0x7f0000000100)={&(0x7f0000000040), 0x6, &(0x7f00000000c0)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void}}, ["", "", ""]}, 0x14}}, 0x0) 07:31:41 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = dup3(r0, r1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[], 0x30}}], 0x1, 0x0) [ 394.822795][ T38] audit: type=1326 audit(1627716701.649:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16743 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 07:31:41 executing program 1: request_key(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0xfffffffffffffffc) 07:31:41 executing program 5: r0 = shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmdt(r0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) 07:31:41 executing program 2: shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/131) shmat(0x0, &(0x7f00005b6000/0x4000)=nil, 0x3b3a75b6022cc228) shmat(0x0, &(0x7f00004ab000/0x2000)=nil, 0x6000) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x6000) 07:31:41 executing program 0: socket(0x2, 0x0, 0x80000001) 07:31:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0xfffffff6}}, 0x0) [ 395.090750][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:42 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) r0 = fork() perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa}}, r0, 0x0, 0xffffffffffffffff, 0x0) 07:31:42 executing program 1: mq_open(&(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0, 0x0) 07:31:42 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:42 executing program 5: r0 = socket$inet(0x2, 0x3, 0x9) pipe2$9p(&(0x7f0000000040), 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 07:31:42 executing program 2: mq_getsetattr(0xffffffffffffffff, &(0x7f0000001780)={0x9bd8}, 0x0) 07:31:42 executing program 3: mq_getsetattr(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 07:31:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, 0x0) 07:31:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f00000000c0)=0x1, 0x4) 07:31:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000380)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 07:31:42 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x3, 0x0, &(0x7f0000000140)) [ 395.633312][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:42 executing program 3: select(0x40, &(0x7f00000001c0)={0x5}, &(0x7f0000000200)={0x7}, 0x0, &(0x7f0000000280)={0x77359400}) 07:31:42 executing program 1: mq_open(&(0x7f0000000040)='>]#.^{\x00', 0x40, 0x0, &(0x7f0000000080)={0x0, 0x1}) [ 395.955740][ T38] audit: type=1326 audit(1627716702.779:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16794 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 07:31:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) setrlimit(0x0, &(0x7f0000000040)) 07:31:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f00000000c0), 0x4) 07:31:43 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:43 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 07:31:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f00000004c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) [ 396.303585][ T38] audit: type=1326 audit(1627716703.119:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16802 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 07:31:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) 07:31:43 executing program 1: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000003c0)="db", 0x1, r1) 07:31:43 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x40000000, 0x0) [ 396.428402][ T38] audit: type=1326 audit(1627716703.239:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16808 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 07:31:43 executing program 5: r0 = mq_open(&(0x7f0000000040)='>]#.^{\x00', 0x0, 0x0, 0x0) mq_timedreceive(r0, &(0x7f00000000c0)=""/121, 0x79, 0x0, &(0x7f0000000000)={0x0, 0x989680}) 07:31:43 executing program 3: mq_open(&(0x7f0000000000)='&-b\x00', 0x0, 0x0, 0x0) 07:31:43 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000300)="a0", 0x1, r0) keyctl$setperm(0x5, r1, 0x212008) keyctl$setperm(0x5, r1, 0x0) 07:31:43 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, r0) [ 396.726115][ T38] audit: type=1804 audit(1627716703.549:404): pid=16823 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/313/bus" dev="sda1" ino=15282 res=1 errno=0 07:31:43 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={0x0}}, 0x2000c801) 07:31:43 executing program 5: shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0xa000000) 07:31:43 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:43 executing program 3: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) 07:31:43 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) getpgid(0x0) 07:31:43 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='.\x00', 0x0, 0x0, 0x5c, 0x4) 07:31:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) 07:31:44 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 07:31:44 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$FUSE_IOCTL(r0, 0x0, 0x0) [ 397.329275][ T38] audit: type=1804 audit(1627716704.149:405): pid=16847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/314/bus" dev="sda1" ino=15279 res=1 errno=0 07:31:44 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0x103, 0x4) 07:31:44 executing program 2: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x77359400}) [ 397.454836][ T38] audit: type=1326 audit(1627716704.209:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16844 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 07:31:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) recvmmsg$unix(r1, &(0x7f0000002200)=[{{&(0x7f0000000040), 0x6e, 0x0}}], 0x1, 0x0, 0x0) fork() sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000a0e05d"], 0x14}}, 0x0) 07:31:44 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mq_getsetattr(r0, 0x0, 0x0) 07:31:44 executing program 0: socketpair(0x2, 0x0, 0x7fffffff, 0x0) 07:31:44 executing program 5: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='.\x00', &(0x7f0000000040), &(0x7f0000000180)={0x0, 0xfb, 0x15, 0x0, 0x0, "75bb8bad5dfb5ba70088bda2f1a50db6"}, 0x15, 0x0) 07:31:44 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}}, 0x0) 07:31:45 executing program 1: shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0xd000) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x6000) 07:31:45 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x8}, 0x0, &(0x7f0000000100)) 07:31:45 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/131) 07:31:45 executing program 3: keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="4821f6e2db1a5a92393f6e8809d34364dd2834e59c5af6f0401d030ec4203b94cd7a0528c2f6e26ab48c9e18ce7c774c92068c4a691e813f084c67f9dad8315cfd21894ef54c626b516d28f8fe156e48045b8cdacbd0cfc27db1ad0b3db329d3809fe9ced7c6ef01df9c53dccd1ca33788", 0x71}, {&(0x7f0000000000)="cb3537e119946301ffced0d0ce2120669903503f006f115ee09957f608192ec5e2f25539538a96cac3143b2b700551935b2a6056cbb4790d457c4025911855adfbb67cd98c682bed81983165a6a749e67b572daaacf08319891387d32b8bfd3943d2c6d079205de605f68e53653b81a1296b3e4993646c6a132cfc37ed5b8858e7a376ea17ba215f282d3dd376f6367ea24df55989574537191ca2d4", 0x9c}, {&(0x7f0000000480)="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", 0x1f0}, {&(0x7f0000000940)="af75136cb1ac494761c8f1d2f9ffe231602490b8cfe73470e28e36d8489dbf71057bb63dfbe60a365b41d97d57a35b4c25a24b62de7932a60535217bb596a61827991411a2146cbdbb29ed1ea8714ed7a3fc44e5a019399299f51e0265f219699b174e5c7a52", 0x66}], 0x1000013d, 0x0) 07:31:45 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 398.406005][ T38] kauditd_printk_skb: 4 callbacks suppressed [ 398.406021][ T38] audit: type=1326 audit(1627716705.229:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16887 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 07:31:45 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) timer_create(0x0, 0x0, &(0x7f00000011c0)) timer_getoverrun(0x0) 07:31:45 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 07:31:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000008580)=[{&(0x7f0000000140)={0x10c, 0x0, 0x0, 0x0, 0x0, "", [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="52927771a8c427386f1c575ea1d34130edd6d790480fd0f399f23a0e27e1e7466a0681ca8d6dcfc46cb8839e08aea835cc31e65442b0d1c2fe896bac387c33fcf23c6076b5d351bd341e66e4c9a92018817f6dec47d312275f523776d9e17d3adb", @typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="2facff604e785753d9e539cc1cfe09932f2a0d963b8ebde34140f38b4546e081c7f4b9fd6e58fd1c8c1678da5586b1dec8f6a8ab82e06e6511f2dcc79b304cae8cc321e682c0abb4738aebc4c853afc5544bca1402399ff0553ea96e101c06c683fa2df2e988a272", @typed={0x8, 0x0, 0x0, 0x0, @fd}]}, 0x10c}, {&(0x7f00000023c0)={0x1d98, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x4}, @nested={0x1d81, 0x0, 0x0, 0x1, [@generic="99e23d0c5a4be2420a64600fc4f0592f573a06e3c4569f25d4588971c54bb8c0a0ea1c732225d9a0982579f389f72ba53ff4e298e7a29a639ca54d2da0669eb2b8617178007321a7654dc65f99d04f88928599a025dd4c8d3f28132d05d0cef3a378715c50d56d1e8a5828399b4b9c1ee511d1c856142659016d541ff9a5b3720dbb2fcaaf17e149af10d86f68b0a2fcb8cbc38e51fc490a3b4a2e748868", @typed={0x8, 0x0, 0x0, 0x0, @pid}, @generic="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", @typed={0x8, 0x0, 0x0, 0x0, @pid}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@dev}, @generic="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"]}]}, 0x1d98}, {0x0}, {0x0}, {0x0}, {&(0x7f0000007100)={0x10, 0x22, 0x1}, 0x10}, {0x0}, {&(0x7f0000008340)={0x10, 0x33, 0x1}, 0x10}, {0x0}], 0x9}, 0x0) 07:31:45 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) [ 398.548062][ T38] audit: type=1804 audit(1627716705.369:412): pid=16895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/317/bus" dev="sda1" ino=15317 res=1 errno=0 07:31:45 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:45 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000001400)) 07:31:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_LEAVE_MESH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 398.765868][ T38] audit: type=1326 audit(1627716705.589:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16899 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 07:31:45 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0xaa001, 0x0) 07:31:45 executing program 2: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0) 07:31:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000040)) 07:31:45 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 07:31:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@rights={{0x10}}], 0x10}, 0x0) [ 399.091211][ T38] audit: type=1804 audit(1627716705.909:414): pid=16917 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/318/bus" dev="sda1" ino=15299 res=1 errno=0 07:31:46 executing program 0: setrlimit(0x0, &(0x7f0000000040)) fork() 07:31:46 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040), 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:46 executing program 2: add_key(&(0x7f0000000080)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000001100)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$describe(0x6, r0, 0x0, 0x0) 07:31:46 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 07:31:46 executing program 3: unshare(0xc000000) unshare(0xa000000) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socket(0x0, 0x0, 0x0) 07:31:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) syz_genetlink_get_family_id$SEG6(&(0x7f0000000280), r0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc}, @NL80211_ATTR_COOKIE={0xc}]}, 0x2c}}, 0x0) 07:31:46 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read$FUSE(r0, &(0x7f0000004400)={0x2020}, 0x2020) 07:31:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c}}], 0x40}, 0x0) 07:31:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000780), 0x4) 07:31:46 executing program 0: r0 = socket(0x11, 0xa, 0x0) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={0x0}}, 0x0) 07:31:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) read$FUSE(r0, &(0x7f0000000340)={0x2020}, 0x2020) [ 399.680506][ T38] audit: type=1804 audit(1627716706.499:415): pid=16945 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/319/bus" dev="sda1" ino=15322 res=1 errno=0 07:31:46 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040), 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:46 executing program 1: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000180)="9e", 0x1, r0) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000003c0)="801959b8969603076dedb51593890a7ef4d93ffe924a9cfd5b8e71dbcabdb00aad9691a85c7b707b99fd283d166d70bc72007c44d1ecf5b2d502fc120fffd0b9fa91d4af2c489e844510eaef137d99b57ad649b968af2cf35bc86b40f92591fa43c1f98c3832dac7a56d52e534c8a531f4916938e9e48276aa680bdbf7fc1c932c4b0c9988a86e72e088a4e10868f6980fbce6a098038e39ed672521ecda065f6ef66d8cabb5634f37c6bfc5527a30b734b5e309c44fd00e39779695e493eee637e0f24f880ee2ef2420249c7cec151c", 0xd0, 0xfffffffffffffffb) r2 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, "d16ac3bf8e3ea4a6b07ae55e99f3f88dea539214049a9040a1f27cec0c26ec4a8bd9d71bf8b30eafa6c678dc779ec844ff508f2914beb5384f072a05f09affa4"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x65, 0x34, 0x7, 0x64, 0x32, 0x61, 0x19, 0x32, 0x62, 0x65, 0x62, 0x37, 0x36, 0x37, 0x63, 0x35]}, &(0x7f0000000200)={0x0, "c2b8dce814b21eebed22de24cc774f6a72863c6ce91d9472665e19418b911d77243b11b1ee1d7df95f0873e8c98450b63ad5c187631bcdf38fdd5a4f0181249a", 0x25}, 0x48, r2) keyctl$search(0xa, r1, &(0x7f0000000280)='cifs.idmap\x00', &(0x7f00000002c0)={'syz', 0x0}, 0xffffffffffffffff) 07:31:46 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) add_key$keyring(&(0x7f0000000140), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 07:31:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 07:31:46 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, 0x0) [ 400.135307][ T38] audit: type=1326 audit(1627716706.959:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16959 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 07:31:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000080)=0x80000001, 0x4) 07:31:47 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000002240), &(0x7f0000000240)={'fscrypt:', @auto=[0x39]}, &(0x7f0000000280)={0x0, "d16ac3bf8e3ea4a6b07ae55e99f3f88dea539214049a9040a1f27cec0c26ec4a8bd9d71bf8b30eafa6c678dc779ec844ff508f2914beb5384f072a05f09affa4"}, 0x48, 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f00000021c0)='id_resolver\x00', &(0x7f0000002200)={'syz', 0x3}, 0x0) 07:31:47 executing program 0: request_key(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)='user\x00', 0xfffffffffffffffc) [ 400.279622][ T38] audit: type=1804 audit(1627716706.989:417): pid=16962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/320/bus" dev="sda1" ino=15313 res=1 errno=0 07:31:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f00000000c0), 0x4) [ 400.468545][ T38] audit: type=1326 audit(1627716706.999:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16965 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 07:31:47 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040), 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) r0 = getpgid(0x0) process_vm_writev(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:31:47 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) 07:31:47 executing program 5: add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000340)="f5", 0x1, 0xfffffffffffffffd) request_key(&(0x7f0000001480)='user\x00', &(0x7f0000001640)={'syz', 0x2}, 0x0, 0x0) 07:31:47 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000200)="11", 0x1, r1) keyctl$setperm(0x5, r2, 0x0) keyctl$search(0xa, r2, &(0x7f0000000280)='cifs.idmap\x00', &(0x7f00000002c0)={'syz', 0x0}, 0xffffffffffffffff) 07:31:47 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mq_timedreceive(r0, 0x0, 0x0, 0x0, 0x0) [ 400.810499][ T38] audit: type=1326 audit(1627716707.639:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16978 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 07:31:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) sendmmsg$inet6(r1, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}], 0x2, 0x0) [ 400.934541][ T38] audit: type=1804 audit(1627716707.719:420): pid=16987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/321/bus" dev="sda1" ino=15308 res=1 errno=0 07:31:47 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:47 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000001c0), 0x4) 07:31:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000080)=0x80000001, 0x4) 07:31:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={0x0}}, 0x0) 07:31:48 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x1090c1, 0x0) 07:31:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="10"], 0x10}, 0x0) 07:31:48 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 07:31:48 executing program 0: r0 = socket$inet(0x2, 0x3, 0x7) getsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 07:31:48 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000002040)='ns/net\x00') 07:31:48 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:48 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) unshare(0x2000400) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) 07:31:48 executing program 1: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 07:31:48 executing program 3: keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="4821f6e2db1a5a92393f6e8809d34364dd2834e59c5af6f0401d030ec4203b94cd7a0528c2f6e26ab48c9e18ce7c774c92068c4a691e813f084c67f9dad8315cfd21894ef54c626b516d28f8fe156e48045b8cdacbd0cfc27db1ad0b3db329d3809fe9ced7c6ef01df9c53dccd1ca33788", 0x71}, {&(0x7f0000000000)="cb3537e119946301ffced0d0ce2120669903503f006f115ee09957f608192ec5e2f25539538a96cac3143b2b700551935b2a6056cbb4790d457c4025911855adfbb67cd98c682bed81983165a6a749e67b572daaacf08319891387d32b8bfd3943d2c6d079205de605f68e53653b81a1296b3e4993646c6a132cfc37ed5b8858e7a376ea17ba215f282d3dd376f6367ea24df55989574537191ca2d4", 0x9c}, {&(0x7f0000000480)="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", 0x148}, {&(0x7f0000000940)="af75136cb1ac494761c8f1d2f9ffe231602490b8cfe73470e28e36d8489dbf71057bb63dfbe60a365b41d97d57a35b4c25a24b62de7932a60535217bb596a61827991411a2146cbdbb29ed1ea8714ed7a3fc44e5a019399299f51e0265f219699b174e5c7a52", 0xffffff05}], 0x4, 0x0) 07:31:48 executing program 0: perf_event_open$cgroup(&(0x7f0000000940)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:31:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000001580)=[{{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast1}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000100)="ca750ee670186fd2c2cf34133faf7952708cbc0e31bd88a46a970e419754cf1d1873b949c4b8ae289c1f19383e9fb7e4a75d2846b08d01856b225a5630eb186b6d11b73034bcc444fbbf941c283bf0a25051557e728ba06edc783b09fbb347362bd3160aa44ad3e911efa6a62afa7bfc02c409846cc853badb41ca462c6c6213499dc3c4d11726c82383d7a2845a8fe71914b396351a3c4d23", 0x99}, {&(0x7f00000002c0)="e2d8f1733a8b482acbac04fc30da44e0c32d370274f83d4c6ddfdad003cebcdc457140ef06345b3dd4324624d282f8935d400a262db008fba37469fa06372a502603e65aeb7279366f8e127ea3d341eaaaa854c8e1fb5b5becbb6ae859c8fedc0633447885fc6fd0d1223d0b40a0e9b2fe12bc1c9cec45f4cbb891a0b9957e68cf49c4f94c423f5816cd80c1afabf6d08a7b519b30e65e45ad0df40c76d8173b5cdd0a1be0c88ce1cd7accc1f2aa239bb933dbdb282c5103f0", 0xb9}, {&(0x7f0000000040)="84130e9256a71b63913001dbdc4ad7f2f96fbc965a61dcc897b3007d375b65e7ab615833874265c2fd777d950e222cef4bdb72edf6e953b152620ee322d77d206dc6eb98462a43055d8eef3a6a73fc4149178950a2968267f2bd8ec51030797bd1a0c8507939d4c19292d41cbcc2cee7d75422e8aa51f1f7", 0x78}, {&(0x7f0000000380)="86b72b7247803762920686ddd48cc20c5d77c0ab48661a4728db40f0940735739ec3d413d6b4c9d68240fa36d3bbd498d73fdc514b8d65935c168503a25d620526f1281edffb22f89715b67502fc78835d209e9339421bd8975e1bcc2350103d6e550502b3806e2d1ca9ca853a2d442283f7ba02ad8e11e776ea8efa7f2c3550fe1c854de43da7f626b651cda5503713c21b5f893447b8264d42cffa8b", 0x9d}, {&(0x7f0000000440)="ef428908b154ea297ff43b50fdc435e6840206c59a96d23e270d1f26be2e2210a79811a532a3d90e55c1c20993439fe61c79e002e313d336cc9457b20c62c50be2d8ba84208403e9ccad3b08c73310e3198b6b7847f24af436d6859c1740e5107da929a2", 0x64}, {&(0x7f00000004c0)="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", 0x2d6}], 0x6}}], 0x2, 0x2000c080) sendmsg(r1, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000200)="0b2ec872254fec263fb4cb", 0xb}, {&(0x7f00000007c0)="cb", 0x1}], 0x2}, 0x0) 07:31:48 executing program 5: r0 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000180)="9e", 0x1, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, 0xfffffffffffffffc) 07:31:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) recvmmsg$unix(r1, &(0x7f0000002200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000002380)={0x0, r2+60000000}) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000a0e05d"], 0x14}}, 0x0) 07:31:48 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:48 executing program 3: mq_open(&(0x7f0000000040)='\'&\x00', 0x0, 0x0, 0x0) 07:31:48 executing program 0: socket(0x0, 0x80d, 0x0) 07:31:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000001580)=[{{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast1}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000100)="ca750ee670186fd2c2cf34133faf7952708cbc0e31bd88a46a970e419754cf1d1873b949c4b8ae289c1f19383e9fb7e4a75d2846b08d01856b225a5630eb186b6d11b73034bcc444fbbf941c283bf0a25051557e728ba06edc783b09fbb347362bd3160aa44ad3e911efa6a62afa7bfc02c409846cc853badb41ca462c6c6213499dc3c4d11726c82383d7a2845a8fe71914b396351a3c4d23", 0x99}, {&(0x7f00000002c0)="e2d8f1733a8b482acbac04fc30da44e0c32d370274f83d4c6ddfdad003cebcdc457140ef06345b3dd4324624d282f8935d400a262db008fba37469fa06372a502603e65aeb7279366f8e127ea3d341eaaaa854c8e1fb5b5becbb6ae859c8fedc0633447885fc6fd0d1223d0b40a0e9b2fe12bc1c9cec45f4cbb891a0b9957e68cf49c4f94c423f5816cd80c1afabf6d08a7b519b30e65e45ad0df40c76d8173b5cdd0a1be0c88ce1cd7accc1f2aa239bb933dbdb282c5103f0", 0xb9}, {&(0x7f0000000040)="84130e9256a71b63913001dbdc4ad7f2f96fbc965a61dcc897b3007d375b65e7ab615833874265c2fd777d950e222cef4bdb72edf6e953b152620ee322d77d206dc6eb98462a43055d8eef3a6a73fc4149178950a2968267f2bd8ec51030797bd1a0c8507939d4c19292d41cbcc2cee7d75422e8aa51f1f7", 0x78}, {&(0x7f0000000380)="86b72b7247803762920686ddd48cc20c5d77c0ab48661a4728db40f0940735739ec3d413d6b4c9d68240fa36d3bbd498d73fdc514b8d65935c168503a25d620526f1281edffb22f89715b67502fc78835d209e9339421bd8975e1bcc2350103d6e550502b3806e2d1ca9ca853a2d442283f7ba02ad8e11e776ea8efa7f2c3550fe1c854de43da7f626b651cda5503713c21b5f893447b8264d42cffa8b", 0x9d}, {&(0x7f0000000440)="ef428908b154ea297ff43b50fdc435e6840206c59a96d23e270d1f26be2e2210a79811a532a3d90e55c1c20993439fe61c79e002e313d336cc9457b20c62c50be2d8ba84208403e9ccad3b08c73310e3198b6b7847f24af436d6859c1740e5107da929a2", 0x64}, {&(0x7f00000004c0)="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", 0x2d6}], 0x6}}], 0x2, 0x2000c080) sendmsg(r1, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000200)="0b2ec872254fec263fb4cb", 0xb}, {&(0x7f00000007c0)="cb", 0x1}], 0x2}, 0x0) 07:31:48 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) 07:31:49 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb", 0x6a, 0x1, 0x0, 0xffffffffffffffb1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f00000001c0)={'rose0\x00', 0x9}) 07:31:49 executing program 1: r0 = semget$private(0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x6b18}], 0x1) semop(r0, &(0x7f00000001c0)=[{}], 0x1) semctl$IPC_RMID(r0, 0x0, 0x0) 07:31:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$unix(r0, &(0x7f00000001c0)=[{{&(0x7f0000000040)=@abs={0x1}, 0x6e, 0x0}}], 0x1, 0x0) 07:31:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000001580)=[{{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast1}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000100)="ca750ee670186fd2c2cf34133faf7952708cbc0e31bd88a46a970e419754cf1d1873b949c4b8ae289c1f19383e9fb7e4a75d2846b08d01856b225a5630eb186b6d11b73034bcc444fbbf941c283bf0a25051557e728ba06edc783b09fbb347362bd3160aa44ad3e911efa6a62afa7bfc02c409846cc853badb41ca462c6c6213499dc3c4d11726c82383d7a2845a8fe71914b396351a3c4d23", 0x99}, {&(0x7f00000002c0)="e2d8f1733a8b482acbac04fc30da44e0c32d370274f83d4c6ddfdad003cebcdc457140ef06345b3dd4324624d282f8935d400a262db008fba37469fa06372a502603e65aeb7279366f8e127ea3d341eaaaa854c8e1fb5b5becbb6ae859c8fedc0633447885fc6fd0d1223d0b40a0e9b2fe12bc1c9cec45f4cbb891a0b9957e68cf49c4f94c423f5816cd80c1afabf6d08a7b519b30e65e45ad0df40c76d8173b5cdd0a1be0c88ce1cd7accc1f2aa239bb933dbdb282c5103f0", 0xb9}, {&(0x7f0000000040)="84130e9256a71b63913001dbdc4ad7f2f96fbc965a61dcc897b3007d375b65e7ab615833874265c2fd777d950e222cef4bdb72edf6e953b152620ee322d77d206dc6eb98462a43055d8eef3a6a73fc4149178950a2968267f2bd8ec51030797bd1a0c8507939d4c19292d41cbcc2cee7d75422e8aa51f1f7", 0x78}, {&(0x7f0000000380)="86b72b7247803762920686ddd48cc20c5d77c0ab48661a4728db40f0940735739ec3d413d6b4c9d68240fa36d3bbd498d73fdc514b8d65935c168503a25d620526f1281edffb22f89715b67502fc78835d209e9339421bd8975e1bcc2350103d6e550502b3806e2d1ca9ca853a2d442283f7ba02ad8e11e776ea8efa7f2c3550fe1c854de43da7f626b651cda5503713c21b5f893447b8264d42cffa8b", 0x9d}, {&(0x7f0000000440)="ef428908b154ea297ff43b50fdc435e6840206c59a96d23e270d1f26be2e2210a79811a532a3d90e55c1c20993439fe61c79e002e313d336cc9457b20c62c50be2d8ba84208403e9ccad3b08c73310e3198b6b7847f24af436d6859c1740e5107da929a2", 0x64}, {&(0x7f00000004c0)="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", 0x2d6}], 0x6}}], 0x2, 0x2000c080) sendmsg(r1, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000200)="0b2ec872254fec263fb4cb", 0xb}, {&(0x7f00000007c0)="cb", 0x1}], 0x2}, 0x0) 07:31:49 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:49 executing program 5: r0 = epoll_create1(0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x2000000a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 07:31:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5) 07:31:49 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='rose0\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb", 0x6a, 0x1, 0x0, 0xffffffffffffffb1) 07:31:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) fchown(r0, 0xee00, 0x0) 07:31:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000001580)=[{{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast1}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000100)="ca750ee670186fd2c2cf34133faf7952708cbc0e31bd88a46a970e419754cf1d1873b949c4b8ae289c1f19383e9fb7e4a75d2846b08d01856b225a5630eb186b6d11b73034bcc444fbbf941c283bf0a25051557e728ba06edc783b09fbb347362bd3160aa44ad3e911efa6a62afa7bfc02c409846cc853badb41ca462c6c6213499dc3c4d11726c82383d7a2845a8fe71914b396351a3c4d23", 0x99}, {&(0x7f00000002c0)="e2d8f1733a8b482acbac04fc30da44e0c32d370274f83d4c6ddfdad003cebcdc457140ef06345b3dd4324624d282f8935d400a262db008fba37469fa06372a502603e65aeb7279366f8e127ea3d341eaaaa854c8e1fb5b5becbb6ae859c8fedc0633447885fc6fd0d1223d0b40a0e9b2fe12bc1c9cec45f4cbb891a0b9957e68cf49c4f94c423f5816cd80c1afabf6d08a7b519b30e65e45ad0df40c76d8173b5cdd0a1be0c88ce1cd7accc1f2aa239bb933dbdb282c5103f0", 0xb9}, {&(0x7f0000000040)="84130e9256a71b63913001dbdc4ad7f2f96fbc965a61dcc897b3007d375b65e7ab615833874265c2fd777d950e222cef4bdb72edf6e953b152620ee322d77d206dc6eb98462a43055d8eef3a6a73fc4149178950a2968267f2bd8ec51030797bd1a0c8507939d4c19292d41cbcc2cee7d75422e8aa51f1f7", 0x78}, {&(0x7f0000000380)="86b72b7247803762920686ddd48cc20c5d77c0ab48661a4728db40f0940735739ec3d413d6b4c9d68240fa36d3bbd498d73fdc514b8d65935c168503a25d620526f1281edffb22f89715b67502fc78835d209e9339421bd8975e1bcc2350103d6e550502b3806e2d1ca9ca853a2d442283f7ba02ad8e11e776ea8efa7f2c3550fe1c854de43da7f626b651cda5503713c21b5f893447b8264d42cffa8b", 0x9d}, {&(0x7f0000000440)="ef428908b154ea297ff43b50fdc435e6840206c59a96d23e270d1f26be2e2210a79811a532a3d90e55c1c20993439fe61c79e002e313d336cc9457b20c62c50be2d8ba84208403e9ccad3b08c73310e3198b6b7847f24af436d6859c1740e5107da929a2", 0x64}, {&(0x7f00000004c0)="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", 0x2d6}], 0x6}}], 0x2, 0x2000c080) sendmsg(r1, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000200)="0b2ec872254fec263fb4cb", 0xb}, {&(0x7f00000007c0)="cb", 0x1}], 0x2}, 0x0) 07:31:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004000000c0b80f", 0xf, 0x800}, {0x0, 0x0, 0x21001}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x518302, 0x0) 07:31:49 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x2}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvmmsg(r1, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}, 0x5}], 0x1, 0x0, 0x0) shutdown(r1, 0x0) 07:31:49 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x125e, 0x0) 07:31:49 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x12, &(0x7f0000000140), 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendto$packet(r0, &(0x7f0000000100)="7f0086dd", 0x5e0, 0x0, &(0x7f00000000c0)={0x11, 0x8100, r2, 0x1, 0x0, 0x6, @local}, 0x14) [ 403.047425][T17091] loop5: detected capacity change from 0 to 528 07:31:49 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$nfs4(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000000480), 0x0, 0x6}], 0x0, &(0x7f0000000640)={[{'hash\x00'}, {'blake2s-128-generic\x00'}], [{@euid_gt}]}) [ 403.277453][T17091] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 403.304085][T17109] EXT4-fs error (device loop5): __ext4_new_inode:1069: comm syz-executor.5: reserved inode found cleared - inode=1 07:31:50 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r6) setresgid(0x0, r6, 0x0) [ 403.383533][T17108] nfs4: Unknown parameter 'hash' 07:31:50 executing program 1: r0 = memfd_create(&(0x7f0000000080)='\xf3e\t\xa9\xff\vty\x01senux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000001c0), 0x7fa) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 07:31:50 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0), 0x0, 0x0, 0x4, &(0x7f0000002300)=[{&(0x7f0000000140)='\r', 0x1}, {&(0x7f00000001c0)="c282fb20e97e056f8e9b24bb", 0xc, 0x1000}, {0x0}, {&(0x7f0000001300)="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", 0xffc, 0x5}], 0x20000, &(0x7f0000002380)={[{@rodir}]}) [ 403.508177][T17112] nfs4: Unknown parameter 'hash' 07:31:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={0x0, 0x40}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) [ 403.657450][T17118] loop3: detected capacity change from 0 to 16 [ 403.751582][T17118] loop3: detected capacity change from 0 to 16 07:31:50 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:50 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x802, 0x0) sendfile(r2, r1, 0x0, 0x7ffff000) r3 = getpgid(0xffffffffffffffff) msgget$private(0x0, 0x400) clock_gettime(0x0, &(0x7f0000004700)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000008e80)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setregid(0xee00, r4) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000080)) r5 = dup3(r0, r0, 0x0) perf_event_open(0x0, r3, 0xd, r5, 0x3) 07:31:50 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004000000c0b80f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x801, 0x1001}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 07:31:50 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000180)={0x38, 0x1, 0x0, 0x0, 0x4, 0x1}, 0x0) fork() sched_setattr(0x0, 0x0, 0x0) pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x10, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:31:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x4) [ 404.351969][T17145] loop5: detected capacity change from 0 to 512 [ 404.374069][ T38] kauditd_printk_skb: 7 callbacks suppressed 07:31:51 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0xffffffffffffff81}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/diskstats\x00', 0x0, 0x0) [ 404.374088][ T38] audit: type=1804 audit(1627716711.189:428): pid=17144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/327/bus" dev="sda1" ino=15313 res=1 errno=0 [ 404.470617][T17145] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 07:31:51 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) [ 404.524609][ T38] audit: type=1804 audit(1627716711.349:429): pid=17147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/327/bus" dev="sda1" ino=15313 res=1 errno=0 07:31:51 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 404.667905][ T38] audit: type=1326 audit(1627716711.490:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17155 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665e9 code=0x0 07:31:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@empty, 0x0, 0x32}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x2, 0x0, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}, 0x154}}, 0x0) 07:31:51 executing program 5: getpid() pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:31:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f00000029c0)={@initdev, @multicast2}, &(0x7f0000002a00)=0x8) [ 404.985235][ T38] audit: type=1804 audit(1627716711.800:431): pid=17165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/328/bus" dev="sda1" ino=15328 res=1 errno=0 07:31:51 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\xf3e\t\xa9\xff\vty\x01senux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000001c0), 0x7fa) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') chdir(&(0x7f0000000100)='./file0\x00') 07:31:52 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendto$packet(r1, &(0x7f0000000100)="7f0086dd", 0x5e0, 0x0, &(0x7f00000000c0)={0x11, 0x8100, r3, 0x1, 0x0, 0x6, @local}, 0x14) 07:31:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@empty, 0x0, 0x32}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x2, 0x0, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}, 0x154}}, 0x0) 07:31:52 executing program 1: r0 = memfd_create(&(0x7f0000000080)='\xf3e\t\xa9\xff\vty\x01senux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000001c0), 0x7fa) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 07:31:52 executing program 2: socket$alg(0x26, 0x5, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="390000001100090468fe0700000000000700ff3f0800000045000e070000001419001a00", 0x24}], 0x1) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x15) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) [ 405.562416][ T38] audit: type=1804 audit(1627716712.390:432): pid=17193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/329/bus" dev="sda1" ino=15354 res=1 errno=0 07:31:52 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@empty, 0x0, 0x32}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x2, 0x0, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}, 0x154}}, 0x0) 07:31:52 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:31:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}}, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000c80), 0xffffffffffffffff) [ 406.009076][ T38] audit: type=1326 audit(1627716712.830:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17206 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665e9 code=0x0 07:31:52 executing program 5: syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000007c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000840), 0x0, 0x0, 0x0, 0xfffffffffffffffe) openat$cgroup_ro(r0, &(0x7f0000000b00)='cgroup.events\x00', 0x0, 0x0) 07:31:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@loopback}, {@in6=@empty, 0x0, 0x32}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x2, 0x0, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}, 0x154}}, 0x0) 07:31:53 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:53 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) read$FUSE(r0, 0x0, 0x0) [ 406.164917][ T38] audit: type=1804 audit(1627716712.870:434): pid=17207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/330/bus" dev="sda1" ino=15250 res=1 errno=0 07:31:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$FUSE(r0, 0x0, 0x1b9) 07:31:53 executing program 5: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) 07:31:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004000000c0b80f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x801, 0x1001}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x518302, 0x0) close(r0) 07:31:53 executing program 0: sysinfo(&(0x7f0000001000)=""/253) [ 406.563964][ T38] audit: type=1804 audit(1627716713.390:435): pid=17229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/331/bus" dev="sda1" ino=15263 res=1 errno=0 [ 406.571836][T17231] loop3: detected capacity change from 0 to 512 07:31:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000020c0)='net/unix\x00') read$FUSE(r0, 0x0, 0x0) 07:31:53 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 406.712675][T17231] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 406.790912][T17231] loop3: detected capacity change from 0 to 512 [ 406.812245][T17231] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value 07:31:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0xa2ce) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/200, 0xa2ce}], 0x1, 0x0, 0x0, 0x2000000}}], 0x1, 0x0, 0x0) 07:31:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) 07:31:53 executing program 1: socket(0x0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000b80), 0xffffffffffffffff) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000c80)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 07:31:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x4b46, &(0x7f0000000040)) 07:31:53 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'lo\x00'}) 07:31:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @empty}}) [ 407.149310][ T38] audit: type=1804 audit(1627716713.970:436): pid=17247 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/332/bus" dev="sda1" ino=15325 res=1 errno=0 07:31:54 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:54 executing program 5: r0 = eventfd(0x0) fstatfs(r0, &(0x7f0000000000)=""/65) 07:31:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000840)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000880)='.\x00', &(0x7f00000008c0)='tmpfs\x00', 0x0, 0x0) mknod(&(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x0) 07:31:54 executing program 3: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@private1, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, {{@in6=@private2}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:31:54 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x38}, 0x0) 07:31:54 executing program 2: timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, @thr={0x0, &(0x7f0000000080)}}, 0x0) timer_create(0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) timer_settime(0x0, 0x0, 0x0, &(0x7f0000001a00)) 07:31:54 executing program 3: r0 = io_uring_setup(0x1760, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x11, 0x0, 0x0) [ 407.701580][ T38] audit: type=1804 audit(1627716714.520:437): pid=17276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/333/bus" dev="sda1" ino=15058 res=1 errno=0 07:31:54 executing program 2: mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000800)={0x70, 0x7d}, 0x20) 07:31:54 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) 07:31:54 executing program 5: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) close(r0) 07:31:54 executing program 1: mkdir(&(0x7f0000020900)='./file0\x00', 0x4) 07:31:54 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:54 executing program 0: socket$inet(0x10, 0x0, 0x14) 07:31:54 executing program 3: r0 = io_uring_setup(0x311, &(0x7f0000000140)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 07:31:54 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x800, 0x0, 0x3, 0x9}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000180)=0xffffffc1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x380000, @empty}, 0x1c) 07:31:54 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "d35dece4ea6f1e4249c333d07826e5f3083b7a8f9bfb6c3917d7ceb82a95e4f35aada6fe83c345ff9940741bba08f1a69bdb97da03cbeffa2938c1a7e4642513"}, 0x48, 0xfffffffffffffffc) 07:31:55 executing program 1: request_key(&(0x7f0000001500)='dns_resolver\x00', &(0x7f0000001540)={'syz', 0x0}, 0x0, 0x0) 07:31:55 executing program 3: mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000040)={0x88, 0x0, 0x160000}, 0x20) 07:31:55 executing program 0: mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x160000}, 0x20) 07:31:55 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:55 executing program 2: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x149802) 07:31:55 executing program 5: add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 07:31:55 executing program 3: r0 = socket$inet(0x11, 0x803, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x0, 0x0, 0x0) 07:31:55 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0xf, 0x0, 0x0) tkill(r1, 0x7) 07:31:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x40049409, 0x0) 07:31:55 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@empty, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0xb8}}, 0x0) 07:31:55 executing program 3: r0 = eventfd2(0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, 0x0) 07:31:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x891a, &(0x7f0000000000)) 07:31:55 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_print_times', 0x1, 0x0) 07:31:55 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:55 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0xf, 0x0, 0x0) tkill(r1, 0x7) 07:31:55 executing program 2: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, r0, r1) 07:31:56 executing program 3: io_uring_setup(0x359f, &(0x7f00000001c0)={0x0, 0xa71c, 0x8}) 07:31:56 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x15, r0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, r0, 0x0, 0x0) 07:31:56 executing program 0: getitimer(0x10, 0x0) 07:31:56 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 409.405725][ T38] kauditd_printk_skb: 2 callbacks suppressed [ 409.405741][ T38] audit: type=1804 audit(1627716716.230:440): pid=17343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/336/bus" dev="sda1" ino=15377 res=1 errno=0 07:31:56 executing program 2: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0xe, r0, 0x0, 0xffffffffffffffff) 07:31:56 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0xf, 0x0, 0x0) tkill(r1, 0x7) 07:31:56 executing program 3: r0 = socket$inet(0x11, 0x803, 0x0) setsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 07:31:56 executing program 5: timer_create(0x0, 0x0, &(0x7f0000000700)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x77359400}}, 0x0) timer_gettime(0x0, &(0x7f00000000c0)) 07:31:56 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x10}, 0x10}}, 0x0) 07:31:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, 0x0, &(0x7f0000000080)) [ 409.817258][ T38] audit: type=1804 audit(1627716716.640:441): pid=17372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/337/bus" dev="sda1" ino=13909 res=1 errno=0 07:31:56 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0xf, 0x0, 0x0) tkill(r1, 0x7) 07:31:56 executing program 3: request_key(&(0x7f0000003c40)='keyring\x00', &(0x7f0000003c80)={'syz', 0x0}, &(0x7f0000003cc0)='\x00', 0xffffffffffffffff) [ 409.886509][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:56 executing program 5: timer_create(0x0, 0x0, &(0x7f0000000000)) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) [ 410.067317][ T38] audit: type=1804 audit(1627716716.820:442): pid=17374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/337/bus" dev="sda1" ino=13909 res=1 errno=0 07:31:57 executing program 0: request_key(&(0x7f0000000100)='logon\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='logon\x00', 0x0) 07:31:57 executing program 2: add_key$keyring(&(0x7f0000000300), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='logon\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) fork() 07:31:57 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xfffffff7) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x12) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0xfffffffe}) close_range(r1, 0xffffffffffffffff, 0x0) 07:31:57 executing program 0: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0) 07:31:57 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() r1 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_FILES(r1, 0xf, 0x0, 0x0) 07:31:57 executing program 5: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "af53f975244e4c4e3704178bcaddc846fd63cf0d499d6272b3e04e0a5b9a59ec7b0e6f5050c4bc3b6dec208044e6630859db3387d73cd81c473994e475dab51f"}, 0x48, r0) keyctl$read(0xb, r1, 0x0, 0x0) 07:31:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x800, 0x0, 0x3, 0x9}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000180)=0xffffffc1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x380000, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000007e40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@dstopts={{0x18, 0x29, 0x3}}], 0x18}}], 0x1, 0x0) [ 410.666698][ T38] audit: type=1804 audit(1627716717.490:443): pid=17405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/338/bus" dev="sda1" ino=14163 res=1 errno=0 [ 410.679386][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:57 executing program 0: mq_open(&(0x7f0000000000)='-{\\^\x00', 0x840, 0x0, &(0x7f0000000040)={0x27, 0x401, 0xfffffffffffffffa, 0xfffe00000000000}) 07:31:57 executing program 5: mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000040), 0x20) [ 410.852073][ T38] audit: type=1804 audit(1627716717.660:444): pid=17410 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/338/bus" dev="sda1" ino=14163 res=1 errno=0 07:31:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:31:57 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=tcp']) 07:31:57 executing program 2: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 07:31:58 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:58 executing program 2: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x7, r0, 0x0, 0xffffffffffffffff) [ 411.310460][T17427] 9pnet: p9_fd_create_tcp (17427): problem connecting socket to 127.0.0.1 [ 411.345487][T17431] 9pnet: p9_fd_create_tcp (17431): problem connecting socket to 127.0.0.1 [ 411.527865][ T38] audit: type=1804 audit(1627716718.350:445): pid=17438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/339/bus" dev="sda1" ino=14386 res=1 errno=0 [ 411.609805][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 411.793538][ T38] audit: type=1804 audit(1627716718.610:446): pid=17440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/339/bus" dev="sda1" ino=14386 res=1 errno=0 07:31:58 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000b80), &(0x7f0000000bc0)={'syz', 0x0}, &(0x7f0000000c00)={0x0, 0x0, @c}, 0x29, 0xfffffffffffffff9) 07:31:58 executing program 0: r0 = io_uring_setup(0x1760, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x11, &(0x7f0000001a40)=[{0x0}], 0x1) 07:31:58 executing program 5: r0 = add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, 0x0, 0x0, r0) 07:31:58 executing program 2: mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0x9}, 0x0) 07:31:58 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() r1 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_FILES(r1, 0xf, 0x0, 0x0) 07:31:58 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:59 executing program 2: request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='}{$\\\x00', 0xfffffffffffffffe) 07:31:59 executing program 0: r0 = timerfd_create(0x9, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{}, {r1}}, 0x0) 07:31:59 executing program 5: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, r0, 0x101) request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0) 07:31:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x40049409, &(0x7f0000000000)) [ 412.414438][ T38] audit: type=1804 audit(1627716719.240:447): pid=17455 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/340/bus" dev="sda1" ino=14418 res=1 errno=0 [ 412.417922][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:59 executing program 0: r0 = timerfd_create(0x9, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{}, {r1}}, 0x0) 07:31:59 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000340), 0x0, 0x0) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x0) 07:31:59 executing program 2: sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000000)) [ 412.663231][ T38] audit: type=1804 audit(1627716719.360:448): pid=17457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/340/bus" dev="sda1" ino=14418 res=1 errno=0 07:31:59 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:31:59 executing program 3: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0xc100}, {}], 0x2, &(0x7f0000000040)) 07:31:59 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000340), 0x4, 0x0) r1 = io_uring_setup(0x71b3, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, &(0x7f0000000180)=r0, 0x1) [ 413.063232][ T38] audit: type=1804 audit(1627716719.890:449): pid=17482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/341/bus" dev="sda1" ino=14530 res=1 errno=0 [ 413.066132][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:31:59 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() r1 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_FILES(r1, 0xf, 0x0, 0x0) 07:31:59 executing program 5: r0 = io_uring_setup(0x1760, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x10, 0x0, 0x0) 07:31:59 executing program 3: add_key$keyring(&(0x7f0000000300), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) 07:31:59 executing program 2: semtimedop(0x0, &(0x7f0000000000)=[{}, {}], 0x2, &(0x7f0000000040)) 07:32:00 executing program 0: add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 07:32:00 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x10}, 0x10}}, 0x0) 07:32:00 executing program 5: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$setperm(0x5, r1, 0x0) keyctl$search(0xa, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0) 07:32:00 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x0) 07:32:00 executing program 0: getitimer(0x0, 0x0) fork() 07:32:00 executing program 3: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x20}, {0x0, 0x0, 0x1800}], 0x2, 0x0) 07:32:00 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:32:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @multicast2}, 0x4}) 07:32:00 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:00 executing program 0: r0 = io_uring_setup(0x1760, &(0x7f0000000080)) r1 = syz_open_dev$vcsu(&(0x7f0000000340), 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000001a40)=[{0x0}], 0x1) r2 = socket$nl_audit(0x10, 0x3, 0x9) r3 = io_uring_setup(0xd78, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r2, r3], 0x5) 07:32:00 executing program 5: timer_create(0x3, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, r0+60000000}, {0x0, 0x989680}}, 0x0) timer_gettime(0x0, &(0x7f0000000080)) 07:32:00 executing program 3: socket$inet(0x10, 0x803, 0x2) 07:32:00 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, 0x0, 0x0) tkill(r1, 0x7) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 414.156803][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:32:01 executing program 3: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$negate(0xd, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffb) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x10, 0x3f8, 0x8, 0x70bd2a, 0x25dfdbfe, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40094}, 0x4000050) r2 = add_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="7dc07f7d5d6d42387b596c2f067da8acab6c30d82bcce091d0fefe939a05cd266935e3250e752dc4b6b0c21aa12b2d2a4529453019843f0ae1d7c448e52607c59e9542de0c331e40e4", 0x49, r0) r3 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$negate(0xd, 0x0, 0x0, r3) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLIST(r4, 0x0, 0x0) keyctl$instantiate(0xc, r2, &(0x7f0000000400)=ANY=[@ANYBLOB="f7028362a5793c75384d2e5e2496979db201fd6326216a2f10b0695bd839785381ecefcdb3fa2563f1ebbea93fbc87c4afe1f8de27152f217b73d0de7b9dcab29e4a8a5a312e0c46bf8664126d8df688d04fc52705a889570175bd3bb970038aef8598297e71acf24db641a95bd3229d3b369024903d54a574b11a57e416b30840d762b10526801990b5096f1da2cbd845663f8f6bf17f5c522ff4ef3270da6b909381ee29c9673dc15354e30935e5f224dd63ab547c639fef38377c8588f4ab135b4c5d44afcf23326f49a8a2e752347a94fda814c10c53793130bf232bd29e8d", @ANYRES64=r1, @ANYBLOB="c0a8c440ef107643bc697d8e8d9e780f6f9e152b710a549684497d3ffd716eff2e867871f51d4d01422f6d5e48e06942caa4114bb8cad67035efd6199e66ea3d91976811190c14061d2ee8703c4097643731d7319d53513da185d9ea6dcc58ed28dc55797a64fcc34562d920a7822644a9634a1cd8b245612be5bf49acbaba1998f86fa3b23cebeb5b2823c12427f62c7a872f2a53a081d816e9397bb3ff", @ANYRESDEC=r4], 0x32, r3) keyctl$chown(0x15, 0x0, 0x0, 0xffffffffffffffff) r5 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280)={'fscrypt:', @desc1}, &(0x7f0000000380)={0x0, "35a31f5d5d5d6d604d09e47efda1b47aed12519c4649dde93322e52edb69080cb984796be4cf9e08366df0088a6ee33cfea9a30ce2df0ccae34a45aa5df9c0ba", 0x3c}, 0x48, 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, r5, 0x4) 07:32:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20004091, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmmsg$sock(r0, &(0x7f0000001bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000009c0)="1ad54ecd3bd296354b870a3765cf2cc87defe6cfb5d79a40127ef03db054dd7e0bcd9135eae48dac67146101a93c506d85663b10256423d1f68538e32755c4b77f1d7d9e4b403f9989a273b132f16e6ddc1f8cca4c3a8c16335ab42d2803cf13dcd846a3deb37c40c7f653f8746ac2528d9f98f00d924efd805d7f5e0edea0469c2c16eb4b0a18e72da19c81b29626414f153f47b7fd8bc1a582c6be68f02c7c48250cc2ba5a2ac26f5768eb7b698ca553481514eb703ef794af469d211203eeb5b93d6ed167c783d97e788ef2d3720300686f1a512165964613db5f2a9dafbd00e10c8efc2d21b76b78a71303af93e5ca7cd641fff07873d2df46f21d871546fb4c0e1e1a500bf126813a21b0e3504a1aecace4d9ffcf81dea8587f82d18b4393284aa771cac5208547d61178febd681b70e52678048e97d7f361f2238be5ffa245a2386dcdc9019a46e94459e4b48c34b7e3b5505031eec6435a2dd674c541f7814d1e3ab6d75965f638122b3806baf45169db802ca29ef7bf437c91809077f9af7d13a214778cbd4ff5eec070b77281bfb2b85c63e2a82d758473832166cab0324768b6220c286776582fe763ebaf8b8da712b08c0c0a5bd2d25e6b6e201f1f43d4deea000000000000000000efffffff03342c1f96c16d1bcbd5d9744f85b3cef241004f7f202e1f349ae68415477c31f0de5c41fb22142f484c126bf435c6c43f055bbdb1dfe8", 0x209}], 0x1}}], 0x1, 0x0) sendmmsg$sock(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="42f31153f9e788", 0x7}, {&(0x7f0000000640)="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", 0xfb}, {&(0x7f0000000340)="11376c859d266e475450e7d14ef921fb494c3bb7ec0120da948f3706ce24c490f910a8bd1b2cefaf68533ccb85e495735800a5ef1951b1eae4fa2b797da4a6e9ed15f07f33fb029afefd5f0d547149c98057a03147733ea391f2764166758adcd85ddb97a703f2d0b83164320423f7e19ec47090130902cb2ba926d3fedcae9d1a9c5dd5", 0x84}, {&(0x7f0000000740)="faa769897f35543fa7918ab14401f2cc45d94f712b9a16ae0c8130f3031b4479140c44b390700255cb9f125cd275761f8e8476e3759f0ffa53631e064718da283161efafc0a84addef84ccbf503acc39ab915ad323b2547d10501205cb6e4009bb93fb677b410b6dff14f500d1da30348ca3a8131a13d7bfadf5290de322b3d45a40be40a464ebfb5f351b269438296d94a9ebff1ece420c8578ebf068162ab6201f56", 0xa3}], 0x4}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f0000000240)="9b17e6284febffd7c37947f7989de4ef6750102e7f97bc692aac2de98ab72207366766a546ffd2960d3729c35ba4f72395a998d9229ff7244d5499cbe99c886a1d9723af264c715778a50ebd6f23a4790934848ef1e71b7d099832d0ee996ca772ad1cc4421a26a28ffe65c752dff5d2286bdf4f25080018e77d1a565a443115241a83fced147ceb252a0c3ec8708db199ae95088edd807531f2c51e0620c5e668bf5f1f6b48f09a9d67900e1b02f21b31d03eb3888aafe704875ecdb0be5cfe85c37837cc0661613266394a071492785b37da3a227b10946e954acdee9fabacef1eda819380310eaf8f85a20d4417c36e3c", 0xffffffffffffffc8, 0xfecc, 0x0, 0x0) 07:32:01 executing program 0: r0 = io_uring_setup(0x1760, &(0x7f0000000080)) r1 = syz_open_dev$vcsu(&(0x7f0000000340), 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000001a40)=[{0x0}], 0x1) r2 = socket$nl_audit(0x10, 0x3, 0x9) r3 = io_uring_setup(0xd78, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r2, r3], 0x5) 07:32:01 executing program 3: add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="317ec6bb23cc41b0d19f0281447d35747ab99d3f85b792efd6b28cfe1cc25c7701e3345c133de591f2f45807769cb218b8db212c4b7675eab38d25b8fcec91c2d5b54c23a79e8e82950e0ae47860be6cb9d5208a4c8a42c592532f4a705c1493dc37038f99932f85b8e7375400fccb6e00", 0x71, 0xfffffffffffffffe) 07:32:01 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:01 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:32:01 executing program 0: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000)='u', 0x1}]) [ 414.829552][T17546] Option 'ÌA°ÑŸD}5tz¹?…·’ïÖ²ŒþÂ\wã4\' to dns_resolver key: bad/missing value [ 414.858904][T17546] Option 'ÌA°ÑŸD}5tz¹?…·’ïÖ²ŒþÂ\wã4\' to dns_resolver key: bad/missing value 07:32:01 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x8955, &(0x7f0000000000)) 07:32:01 executing program 5: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x1}, r0) [ 415.054018][ T38] kauditd_printk_skb: 3 callbacks suppressed [ 415.054035][ T38] audit: type=1800 audit(1627716721.880:453): pid=17553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=14787 res=0 errno=0 [ 415.143136][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:32:02 executing program 2: r0 = socket(0xa, 0x3, 0x4) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000380)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000180)='S', 0x1}], 0x1}, 0x0) 07:32:02 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) [ 415.284080][ T38] audit: type=1800 audit(1627716721.920:454): pid=17553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=14787 res=0 errno=0 07:32:02 executing program 0: socket$inet(0x11, 0x0, 0x200004) r0 = syz_open_dev$vcsu(&(0x7f0000000340), 0x4, 0x0) syz_open_dev$vcsu(&(0x7f0000000480), 0x1, 0x200800) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, 0x0, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x1, 0x1, 0x5a, 0x800, {{0x18, 0x4, 0x2, 0x4, 0x60, 0x67, 0x0, 0x80, 0x6, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x3e}, {[@rr={0x7, 0xb, 0x3c, [@broadcast, @multicast2]}, @ssrr={0x89, 0x13, 0xc1, [@remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101, @rand_addr=0x64010100]}, @timestamp_prespec={0x44, 0x2c, 0x43, 0x3, 0xb, [{@private=0xa010100, 0x100}, {@remote, 0x10001}, {@rand_addr=0x64010101, 0x1}, {@local, 0x5}, {@broadcast, 0x80000000}]}, @end]}}}}}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="3874c8c5", @ANYRES16=0x0, @ANYBLOB="000428bd7000ffdbdf250000000008000100", @ANYRES32=r1, @ANYBLOB="3401028038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000001000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004000100000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040006000000080007000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r1, @ANYBLOB="080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004003f0000000800070000000000"], 0x150}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000805) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x3fa, 0x100, 0x70bd2b, 0x25dfdbfb, {0x1, 0x1, 0x0, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x400c04c) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xa) 07:32:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x8911, &(0x7f0000000000)) 07:32:02 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:32:02 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) fork() [ 415.408180][ T38] audit: type=1804 audit(1627716721.950:455): pid=17554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/343/bus" dev="sda1" ino=14542 res=1 errno=0 07:32:02 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x8907, 0x0) [ 415.571476][ T38] audit: type=1804 audit(1627716722.050:456): pid=17560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/343/bus" dev="sda1" ino=14542 res=1 errno=0 07:32:02 executing program 3: r0 = io_uring_setup(0x18d1, &(0x7f0000000000)) r1 = eventfd2(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000080)=r1, 0x1) 07:32:02 executing program 0: getitimer(0x0, &(0x7f0000000900)) getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) 07:32:02 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x500}, 0x0) [ 415.727733][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 415.747788][ T38] audit: type=1804 audit(1627716722.540:457): pid=17583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/344/bus" dev="sda1" ino=14737 res=1 errno=0 07:32:02 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:02 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:02 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:32:02 executing program 0: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x4030, 0xffffffffffffffff, 0x0) 07:32:02 executing program 3: timer_create(0x2, &(0x7f0000000000)={0x0, 0x28, 0x0, @thr={0x0, &(0x7f0000001080)}}, &(0x7f0000001100)) timer_delete(0x0) [ 415.953428][ T38] audit: type=1804 audit(1627716722.630:458): pid=17588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/344/bus" dev="sda1" ino=14737 res=1 errno=0 07:32:02 executing program 5: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_keyring_id(0x0, r0, 0x0) 07:32:02 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:03 executing program 3: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x4000) 07:32:03 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000100)={0x0, "0f6c7f0cea9cf4b572b3f6da16903be247e7efc5281581e002060989300ae3cad6656e425de78eff8d52f9039fee771ba1ba193faff66d61419db5487ecb00e8"}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, r1) [ 416.238587][ T38] audit: type=1804 audit(1627716723.060:459): pid=17610 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/345/bus" dev="sda1" ino=13926 res=1 errno=0 [ 416.249380][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:32:03 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:03 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 07:32:03 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 416.422843][ T38] audit: type=1804 audit(1627716723.170:460): pid=17613 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/345/bus" dev="sda1" ino=13926 res=1 errno=0 07:32:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@loopback, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 07:32:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:03 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:03 executing program 0: timer_create(0x0, &(0x7f0000000000)={0x0, 0x3d, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000040)) 07:32:03 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) 07:32:03 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) [ 416.708530][ T38] audit: type=1804 audit(1627716723.530:461): pid=17633 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/346/bus" dev="sda1" ino=13929 res=1 errno=0 [ 416.716648][T17634] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.3'. [ 416.787343][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:32:03 executing program 0: getitimer(0x0, &(0x7f0000000900)) waitid(0x0, 0x0, &(0x7f0000000040), 0x6000000c, 0x0) 07:32:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:03 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(0x0, 0x7) 07:32:03 executing program 3: mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x10000e}, 0x20) [ 417.047246][ T38] audit: type=1804 audit(1627716723.870:462): pid=17642 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/346/bus" dev="sda1" ino=13929 res=1 errno=0 07:32:04 executing program 3: r0 = socket(0xa, 0x3, 0x4) sendmmsg$unix(r0, &(0x7f0000000700)=[{{&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000140)="99bf2a0d2a2fe1", 0x7}], 0x1}}, {{&(0x7f00000002c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)='7', 0x1}], 0x1}}], 0x2, 0x2000a880) 07:32:04 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:32:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, &(0x7f0000000000)="9e", 0x1) 07:32:04 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r1, r0) 07:32:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f00000000c0)="9d198234368f4a506c22ceea816513f94f4ecc38bf", 0x15}, {&(0x7f00000001c0)="88f32874bfd8bf0e69667208ce3651f4403861d38c3355153c7bcb3fdcb6988dfe874a5edd53b252d5ea87f998d31bf10c06e36064bc6f7499a8e6a682606c5571e52507afde7e87d2b2c36f5ad3314976bd65f5d9bbc2c8643353c9b97d7ba2ad5a9fc48b0ea7e9f1cab4c50b08c85e7f2d4a761c3520ce38b993925c4595c01988dc23596ed9b1f0bd57cc9fe3afb6be", 0x91}, {&(0x7f0000000280)="ae582788dce059128066101cfa99769c0d4c9f7901f1f4b7a4fa4bf123d9cd7b1a569d3676e5dd0ee6543e249ceb502f22f41375b626682ec0957f5d50ade50673eb3d5156c733bd7c6cb1e5dc50078af3233a4caf668c7a66dcbd5de13cb42e7017ede71c61200bf0d57fc829f114230547b7705363b898db2c603f3a816db7e66ae1f20152663ff37a2944f6f015a2d27af45ce97bb1dc4f1ce8cd35d49244a5d08b6f357c3d91be08e65349984dfcc803a37eab419e6ea3dab681f964782366987ae766f1d758cc27024a85ad3d0e96ffdb66c88633a6d15d5f264742bd14b82a3f1ecf31b5bda5b16d123423075a3dce9179eb68cc", 0xf7}, {&(0x7f0000000380)="58bb89ced609ef704fef3e843603cb1baafa12a717e3c48122f3d42a9a6b666a590667b75a6cbea8514a1e4168272550e953dca55783d636d6ad3e7a52429b1d25b8732efb2ca10096503dd12f0072f8492be151d4dad140a835729aee23c9f829e4f7806e533cb41ee9cfc54f9c832ef9b92858", 0x74}, {&(0x7f0000000400)="8746", 0x2}, {&(0x7f0000000440)="9e29c67655b4710f273b4b323af32b2954c537cb8d2267c9c527da4763886e23ecd33b209c2edb1738c3", 0x2a}, {&(0x7f0000000480)="6a81bb16ff2ea1229e0b039a1625a7e52888b7b07420085952761782cf62dcfdf3cc78795e79fc6b3f7421d937fc26a7e34ed8f9a68e1d1c4283e681c941eb1417e293c50f5d6aea5ead92a19b686a7c1508572a4d91c1a2", 0x58}, {&(0x7f0000000500)="846c17ad422b22d20e4e3916cac9a1afd585e86ef822a102", 0x18}], 0x8) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000740)=[@window={0x3, 0x2, 0x86}], 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat(r3, &(0x7f00000005c0)='./file0\x00', 0x10000, 0x8) setsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000000600)={@dev={0xac, 0x14, 0x14, 0x23}, @local}, 0xc) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x37e877ad08e6019f, 0x70bd2a, 0x25dfdbfb, {{}, {@void, @void}}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x40000) sendto$inet6(r6, 0x0, 0xfffffffffffffff3, 0x20000001, &(0x7f0000000080)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r6, &(0x7f0000000040)="4cf2e44a1ebce1f0e06f9dd4f04d2f0d78979174464ece6b3d72349e81372384a8e7a6fde2bf9b7f0a5c9f7e79d4f2e9c966baf944f0dbc0", 0xffffffffffffffa7, 0x805, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) splice(r6, 0x0, r4, 0x0, 0x6e803, 0x0) 07:32:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000003c0)={0x0, @local, @loopback}, 0xc) [ 417.623483][T17664] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 417.763911][T17664] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 417.778973][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:32:05 executing program 5: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) write$tcp_congestion(r0, &(0x7f00000002c0)='cubic\x00', 0x6) 07:32:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r1, r0) 07:32:05 executing program 0: request_key(&(0x7f0000000080)='.dead\x00', 0x0, 0x0, 0x0) 07:32:05 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {r0, r1+10000000}}, 0x0) timer_delete(0x0) 07:32:05 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:32:05 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(0x0, 0x7) 07:32:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x3b97, &(0x7f0000000040), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000100)=0x0) r2 = syz_io_uring_setup(0x2494, &(0x7f0000000140), &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r3, r4, &(0x7f0000000100)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f0000000240)=@in6={0xa, 0x0, 0x0, @private2}}, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000200)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r2, 0x3905, 0x0, 0x0, 0x0, 0x0) 07:32:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r1, r0) 07:32:05 executing program 0: r0 = io_uring_setup(0x1760, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xf, 0x0, 0x0) 07:32:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f0000000080)='./file0\x00') [ 418.648501][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:32:05 executing program 0: add_key(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) 07:32:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x8935, &(0x7f0000000000)) 07:32:05 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:32:05 executing program 5: r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000000100), 0x8) 07:32:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:06 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x2, &(0x7f00000006c0)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0xf, 0x0, 0x0) tkill(r1, 0x7) 07:32:06 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(0x0, 0x7) 07:32:06 executing program 3: io_setup(0x6, &(0x7f0000000240)=0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) io_submit(r0, 0x1, &(0x7f0000000100)=[&(0x7f0000001680)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000)='r', 0x1}]) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x1c1042, 0x0) pwrite64(r3, &(0x7f0000000280)='\x00', 0x1, 0xbee3) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) 07:32:06 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:06 executing program 5: prlimit64(0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) [ 419.516980][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:32:06 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:06 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x2, &(0x7f00000006c0)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0xf, 0x0, 0x0) tkill(r1, 0x7) 07:32:06 executing program 5: syz_open_dev$vcsu(&(0x7f0000000340), 0x0, 0x0) r0 = eventfd(0x6) read$eventfd(r0, &(0x7f0000000140), 0x8) 07:32:06 executing program 3: keyctl$chown(0xe, 0x0, 0x0, 0xffffffffffffffff) 07:32:06 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:32:06 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:07 executing program 5: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{}, {0x0, r1+60000000}}, 0x0) 07:32:07 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:07 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) getpid() r0 = gettid() r1 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r0, 0x7) 07:32:07 executing program 3: clock_gettime(0x4, &(0x7f0000001380)) 07:32:07 executing program 0: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, &(0x7f00000001c0)='id_legacy\x00', &(0x7f0000000200)='\x00') 07:32:07 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) [ 420.422030][ T38] kauditd_printk_skb: 10 callbacks suppressed [ 420.422048][ T38] audit: type=1804 audit(1627716727.240:473): pid=17761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/350/bus" dev="sda1" ino=15396 res=1 errno=0 [ 420.508667][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:32:07 executing program 5: r0 = io_uring_setup(0x1760, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x300, 0x0, 0x0) [ 420.680999][ T38] audit: type=1804 audit(1627716727.420:474): pid=17763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/350/bus" dev="sda1" ino=15396 res=1 errno=0 07:32:07 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x61, 0x2, 0x0, 0x0, 0x0, 0xafe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fdatasync(r0) 07:32:07 executing program 5: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='id_legacy\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000380)="1d", 0x1, r0) request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffffc) 07:32:07 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(0xffffffffffffffff, r0) 07:32:07 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:32:07 executing program 0: socket$inet6_tcp(0xa, 0x2, 0x0) 07:32:07 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) getpid() r0 = gettid() r1 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r0, 0x7) 07:32:07 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f00000000c0), 0x8) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000300)="1e", 0x5c8}], 0x1) 07:32:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x894c, 0x0) 07:32:07 executing program 5: semtimedop(0x0, &(0x7f0000000000)=[{}, {0x0, 0x0, 0x1800}, {}], 0x3, 0x0) 07:32:08 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(0xffffffffffffffff, r0) [ 421.222143][ T38] audit: type=1804 audit(1627716728.040:475): pid=17793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/351/bus" dev="sda1" ino=13932 res=1 errno=0 07:32:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x89a0, 0x0) [ 421.352618][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:32:08 executing program 5: pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="ac0000000001190500000000000000000a0000003c0001002c0001001400030016f8bcd383af9b1577def13edad6b8bf14000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c000100140003800000000000000000000000000000000014000400ff0100000000000000000000000000010800070000000000180006"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:32:08 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) getpid() r0 = gettid() r1 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r0, 0x7) [ 421.497361][ T38] audit: type=1804 audit(1627716728.280:476): pid=17797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/351/bus" dev="sda1" ino=13932 res=1 errno=0 07:32:08 executing program 3: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0) 07:32:08 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(0xffffffffffffffff, r0) 07:32:08 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:32:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x891b, &(0x7f0000000000)) [ 421.816953][T17816] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 07:32:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r0, 0xffffffffffffffff) 07:32:08 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x419}, 0x14}}, 0x0) 07:32:08 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() r1 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r0, 0x7) [ 422.081171][ T38] audit: type=1804 audit(1627716728.900:477): pid=17830 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/352/bus" dev="sda1" ino=15395 res=1 errno=0 07:32:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r0, 0xffffffffffffffff) [ 422.128705][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:32:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, 0x1c) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000300)="1e", 0x5c8}], 0x1) 07:32:09 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 422.231016][ T38] audit: type=1804 audit(1627716729.020:478): pid=17830 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/352/bus" dev="sda1" ino=15395 res=1 errno=0 07:32:09 executing program 5: pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="ac0000000001190500000000000000000a0000003c0001002c0001001400030016f8bcd383af9b1577def13edad6b8bf14000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c000100140003800000000000000000000000000000000014000400ff0100000000000000000000000000010800070000000000180006"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:32:09 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x14540, 0x0) 07:32:09 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() r1 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r0, 0x7) 07:32:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r0, 0xffffffffffffffff) 07:32:09 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000140)={0x9f31, 0x0, 0x0, 0x2, 0x0, "627216a8f46ee331f54a27c48ac38ce2314988"}) [ 422.584720][ T38] audit: type=1804 audit(1627716729.410:479): pid=17845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/353/bus" dev="sda1" ino=15396 res=1 errno=0 [ 422.706751][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:32:09 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}, 0x1, 0x0, 0x9effffff}, 0x0) [ 422.791092][ T38] audit: type=1804 audit(1627716729.610:480): pid=17845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/353/bus" dev="sda1" ino=15396 res=1 errno=0 07:32:09 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000002c0)) [ 423.001519][T17860] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 07:32:10 executing program 1: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() r1 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r0, 0x7) 07:32:10 executing program 3: request_key(0xfffffffffffffffe, 0x0, 0x0, 0xfffffffffffffffb) 07:32:10 executing program 0: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="10", 0x1, r0) keyctl$link(0x8, r0, r1) 07:32:10 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 423.513525][ T38] audit: type=1804 audit(1627716730.330:481): pid=17881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/354/bus" dev="sda1" ino=15400 res=1 errno=0 [ 423.557650][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 423.600175][ T38] audit: type=1804 audit(1627716730.400:482): pid=17881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/354/bus" dev="sda1" ino=15400 res=1 errno=0 07:32:10 executing program 5: pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="ac0000000001190500000000000000000a0000003c0001002c0001001400030016f8bcd383af9b1577def13edad6b8bf14000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c000100140003800000000000000000000000000000000014000400ff0100000000000000000000000000010800070000000000180006"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:32:10 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:10 executing program 3: keyctl$reject(0x13, 0x0, 0x0, 0xffffffffffffffd9, 0x0) 07:32:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = gettid() r3 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r3, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000140)}], 0x1) io_uring_register$IORING_REGISTER_FILES(r3, 0xf, 0x0, 0x0) tkill(r2, 0x7) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x0, 0x0}) 07:32:10 executing program 1: close(0xffffffffffffffff) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:10 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:32:10 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x3fffffe) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) fallocate(r0, 0x3, 0x0, 0x100000fe) 07:32:10 executing program 1: close(0xffffffffffffffff) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:11 executing program 0: timer_create(0x0, &(0x7f0000001080)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000010c0)) clock_gettime(0x0, &(0x7f0000001380)={0x0}) timer_settime(0x0, 0x0, &(0x7f0000001140)={{0x77359400}, {r0}}, &(0x7f0000001180)) [ 424.116318][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 424.143677][T17909] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 07:32:11 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:11 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:32:11 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)={0x10}, 0x10}}, 0x0) [ 424.731955][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:32:11 executing program 5: pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="ac0000000001190500000000000000000a0000003c0001002c0001001400030016f8bcd383af9b1577def13edad6b8bf14000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c000100140003800000000000000000000000000000000014000400ff0100000000000000000000000000010800070000000000180006"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:32:11 executing program 1: close(0xffffffffffffffff) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:32:11 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x0, {}, {}, {0x2, 0x0, @private}, 0x0, 0x0, 0x0, 0x0, 0x4}) 07:32:12 executing program 3: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000200)={r0}, &(0x7f0000000240)={'enc=', 'pkcs1', ' hash=', {'ghash-ce\x00'}}, 0x0, 0x0) 07:32:12 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) [ 425.297835][T17949] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 07:32:12 executing program 0: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0xc100}], 0x1, 0x0) 07:32:12 executing program 3: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x15, r0, 0x0, 0xffffffffffffffff) keyctl$get_security(0x11, r0, 0x0, 0x0) 07:32:12 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:12 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020001) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:32:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x894b, &(0x7f0000000000)) [ 425.786703][ T38] kauditd_printk_skb: 4 callbacks suppressed [ 425.786721][ T38] audit: type=1804 audit(1627716732.610:487): pid=17971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/357/bus" dev="sda1" ino=13932 res=1 errno=0 [ 425.927249][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 425.990953][ T38] audit: type=1804 audit(1627716732.810:488): pid=17971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/357/bus" dev="sda1" ino=13932 res=1 errno=0 07:32:12 executing program 5: pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="ac0000000001190500000000000000000a0000003c0001002c0001001400030016f8bcd383af9b1577def13edad6b8bf14000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c000100140003800000000000000000000000000000000014000400ff0100000000000000000000000000010800070000000000180006"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:32:12 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x149802) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 07:32:12 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:12 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xa, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 07:32:13 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x3fffffe) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) fallocate(r0, 0x3, 0xba05, 0x100000fe) 07:32:13 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:13 executing program 3: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2c, 0x0, 0x1, 0x0, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}]}, 0x2c}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffe3b, &(0x7f0000000000)=[{&(0x7f00000000c0)="7fff000018007f5f14fe01b2a4a29093020604dffffffe02041004053900090035002003010000001900164006271001020022dc1338d54404139b84136ef75afb83de4404000500", 0xff72}, {&(0x7f0000000040)="73005000d612110000ff0ea988", 0xd}], 0x2}, 0x8000000000000000) 07:32:13 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:32:13 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) [ 426.502969][T17991] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 07:32:13 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:13 executing program 0: r0 = gettid() prlimit64(r0, 0x0, &(0x7f0000000000)={0xd12}, 0x0) [ 426.695608][T18003] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 426.748754][T18003] netlink: 65299 bytes leftover after parsing attributes in process `syz-executor.3'. [ 426.774450][ T38] audit: type=1804 audit(1627716733.600:489): pid=18005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/358/bus" dev="sda1" ino=15425 res=1 errno=0 [ 426.849499][T18010] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 426.850853][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 426.874593][T18010] netlink: 65299 bytes leftover after parsing attributes in process `syz-executor.3'. [ 427.001017][ T38] audit: type=1804 audit(1627716733.800:490): pid=18008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/358/bus" dev="sda1" ino=15425 res=1 errno=0 07:32:14 executing program 5: pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="ac0000000001190500000000000000000a0000003c0001002c0001001400030016f8bcd383af9b1577def13edad6b8bf14000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c000100140003800000000000000000000000000000000014000400ff0100000000000000000000000000010800070000000000180006"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:32:14 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:14 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f00000008c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000880)={0x0}}, 0x0) 07:32:14 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:14 executing program 0: timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, @thr={0x0, 0x0}}, 0x0) 07:32:14 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:32:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat2(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x24}, 0x18) 07:32:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000400), &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, 0x0, 0x0) 07:32:14 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) [ 427.504141][T18029] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 427.617459][ T38] audit: type=1804 audit(1627716734.440:491): pid=18032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/359/bus" dev="sda1" ino=15437 res=1 errno=0 [ 427.672995][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:32:14 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:14 executing program 0: setuid(0x0) open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=user,version=9p2000.u']) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) [ 427.813343][ T38] audit: type=1804 audit(1627716734.560:492): pid=18032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/359/bus" dev="sda1" ino=15437 res=1 errno=0 07:32:14 executing program 3: r0 = socket$inet(0x2, 0x803, 0x4) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000200)={{0x2, 0x0, @multicast1}, {0x1, @remote}, 0xa, {0x2, 0x0, @remote}, 'lo\x00'}) 07:32:15 executing program 5: pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="ac0000000001190500000000000000000a0000003c0001002c0001001400030016f8bcd383af9b1577def13edad6b8bf14000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c000100140003800000000000000000000000000000000014000400ff0100000000000000000000000000010800070000000000180006"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:32:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:15 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 07:32:15 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:15 executing program 3: timer_create(0x3, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x3938700}}, &(0x7f0000000080)) 07:32:15 executing program 0: setuid(0x0) open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=user,version=9p2000.u']) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) 07:32:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}, 0x1, 0x0, 0xc000}, 0x0) 07:32:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) [ 428.575929][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 428.591789][ T38] audit: type=1804 audit(1627716735.400:493): pid=18070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/360/bus" dev="sda1" ino=15444 res=1 errno=0 07:32:15 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) [ 428.631515][T18073] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 428.745390][ T38] audit: type=1804 audit(1627716735.530:494): pid=18070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/360/bus" dev="sda1" ino=15444 res=1 errno=0 07:32:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x40086602, &(0x7f0000000000)) 07:32:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:16 executing program 5: pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="ac0000000001190500000000000000000a0000003c0001002c0001001400030016f8bcd383af9b1577def13edad6b8bf14000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c000100140003800000000000000000000000000000000014000400ff0100000000000000000000000000010800070000000000180006"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:32:16 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(0x0, 0x0) 07:32:16 executing program 3: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, r0) 07:32:16 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:16 executing program 0: setuid(0x0) open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=user,version=9p2000.u']) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) 07:32:16 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0, 0xf0ff7f00000000}}, 0x0) [ 429.651027][T18106] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 429.743463][ T38] audit: type=1804 audit(1627716736.560:495): pid=18108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/361/bus" dev="sda1" ino=15452 res=1 errno=0 07:32:16 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) [ 429.814230][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:32:16 executing program 3: r0 = io_uring_setup(0x1760, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xc, &(0x7f0000001a40), 0x0) 07:32:16 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:17 executing program 5: pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="ac0000000001190500000000000000000a0000003c0001002c0001001400030016f8bcd383af9b1577def13edad6b8bf14000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c000100140003800000000000000000000000000000000014000400ff0100000000000000000000000000010800070000000000180006"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:32:17 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20004091, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmmsg$sock(r0, &(0x7f0000001bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000009c0)="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", 0x209}], 0x1}}], 0x1, 0x0) sendmmsg$sock(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="42f31153f9e788", 0x7}, {&(0x7f0000000340)="11376c859d266e475450e7d14ef921fb494c3bb7ec0120da948f3706ce24c490f910a8bd1b2cefaf68533ccb85e495735800a5ef1951b1eae4fa2b797da4a6e9ed15f07f33fb029afefd5f0d547149c98057a03147733ea391f2764166758adcd85ddb97a703f2d0b83164320423f7e19ec47090130902cb2ba926d3fedcae9d1a9c5dd5", 0x84}, {&(0x7f0000000740)="faa769897f35543fa7918ab14401f2cc45d94f712b9a16ae0c8130f3031b4479140c44b390700255cb9f125cd275761f8e8476e3759f0ffa53631e064718da283161efafc0a84addef84ccbf503acc39ab915ad323b2547d10501205cb6e4009bb93fb677b410b6dff14f500d1da30348ca3a8131a13d7bfadf5290de322b3d45a40be40a464ebfb5f", 0x89}], 0x3}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f0000000240)="9b17e6284febffd7c37947f7989de4ef6750102e7f97bc692aac2de98ab72207366766a546ffd2960d3729c35ba4f72395a998d9229ff7244d5499cbe99c886a1d9723af264c715778a50ebd6f23a4790934848ef1e71b7d099832d0ee996ca772ad1cc4421a26a28ffe65c752dff5d2286bdf4f25080018e77d1a565a443115241a83fced147ceb252a0c3ec8708db199ae95088edd807531f2c51e0620c5e668bf5f1f6b48f09a9d67900e1b02f21b31d03eb3888aafe704875ecdb0be5cfe85c37837cc0661613266394a071492785b37da3a227b10946e954acdee9fabacef1eda819380310eaf8f85a20d4417c36e3c", 0xffffffffffffffc8, 0xfecc, 0x0, 0x0) 07:32:17 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(0x0, 0x0) 07:32:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:17 executing program 0: setuid(0x0) open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=user,version=9p2000.u']) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) 07:32:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) [ 430.738478][T18142] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 430.889852][ T38] audit: type=1804 audit(1627716737.720:496): pid=18146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/362/bus" dev="sda1" ino=15461 res=1 errno=0 07:32:17 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x0) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 430.931544][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:32:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:18 executing program 3: r0 = getpgid(0x0) prlimit64(r0, 0x0, 0x0, &(0x7f0000000300)) 07:32:18 executing program 0: setuid(0x0) open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=user,version=9p2000.u']) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 07:32:18 executing program 5: pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="ac0000000001190500000000000000000a0000003c0001002c0001001400030016f8bcd383af9b1577def13edad6b8bf14000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c000100140003800000000000000000000000000000000014000400ff0100000000000000000000000000010800070000000000180006"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:32:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:18 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "b76509b662e292d1", "187eb3ae1a042e928849daedd94aa90e", "78cfbbe6", "3293b1541425ece2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(0x0, 0x0) 07:32:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:18 executing program 3: keyctl$search(0x8, 0x0, &(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0) [ 431.863653][T18181] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 07:32:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() r1 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r0, 0x7) 07:32:18 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000)='u', 0x8800000}]) 07:32:19 executing program 0: setuid(0x0) open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=user,version=9p2000.u']) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) [ 432.161308][ T38] audit: type=1804 audit(1627716738.990:497): pid=18192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir193733619/syzkaller.LpP8Xl/363/bus" dev="sda1" ino=15420 res=1 errno=0 [ 432.281529][ T38] audit: type=1800 audit(1627716739.100:498): pid=18198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15460 res=0 errno=0 [ 432.295603][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:32:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) [ 432.519847][ T38] audit: type=1800 audit(1627716739.130:499): pid=18198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15460 res=0 errno=0 07:32:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() r1 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r0, 0x7) 07:32:19 executing program 3: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1800}, {}], 0x2, 0x0) 07:32:19 executing program 5: pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="ac0000000001190500000000000000000a0000003c0001002c0001001400030016f8bcd383af9b1577def13edad6b8bf14000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c000100140003800000000000000000000000000000000014000400ff0100000000000000000000000000010800070000000000180006"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:32:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:19 executing program 0: setuid(0x0) open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=user,version=9p2000.u']) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 07:32:19 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, 0x0, 0x0) [ 433.109833][T18219] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 07:32:20 executing program 4: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f00000009c0)=""/147, 0x93) 07:32:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() r1 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r0, 0x7) 07:32:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:20 executing program 3: close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0xf, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r2, 0xf, 0x0, 0x0) tkill(r1, 0x7) 07:32:20 executing program 0: setuid(0x0) open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=user,version=9p2000.u']) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400086) 07:32:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:20 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xc1) 07:32:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:20 executing program 5: pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="ac0000000001190500000000000000000a0000003c0001002c0001001400030016f8bcd383af9b1577def13edad6b8bf14000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c000100140003800000000000000000000000000000000014000400ff0100000000000000000000000000010800070000000000180006"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:32:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:20 executing program 0: setuid(0x0) open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=user,version=9p2000.u']) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400086) 07:32:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@loopback, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x40}}}, 0xb8}}, 0x0) 07:32:20 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xc1) 07:32:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:20 executing program 3: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0) 07:32:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:21 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xc1) 07:32:21 executing program 0: setuid(0x0) open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=user,version=9p2000.u']) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400086) [ 434.224113][T18278] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 07:32:21 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000001040)={0x20}, 0x20}}, 0x0) 07:32:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:21 executing program 5: pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="ac0000000001190500000000000000000a0000003c0001002c0001001400030016f8bcd383af9b1577def13edad6b8bf14000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c000100140003800000000000000000000000000000000014000400ff0100000000000000000000000000010800070000000000180006"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:32:21 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xc1) 07:32:21 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:21 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000180), 0x0) 07:32:21 executing program 0: setuid(0x0) open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',access=user,version=9p2000.u']) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 07:32:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd_index}, 0x10001) mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r1, 0x10000000) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x525083}, 0x1) io_uring_enter(r1, 0x6eaa, 0x0, 0x0, 0x0, 0x0) [ 435.161846][T18314] 9pnet: Insufficient options for proto=fd 07:32:22 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xc1) 07:32:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:22 executing program 0: setuid(0x0) open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',access=user,version=9p2000.u']) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) [ 435.285883][T18320] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 07:32:22 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:22 executing program 3: timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0xf94ffd83ffe4bf9}, 0x0) [ 435.621915][T18334] 9pnet: Insufficient options for proto=fd 07:32:22 executing program 5: pipe(&(0x7f0000000d00)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="ac0000000001190500000000000000000a0000003c0001002c0001001400030016f8bcd383af9b1577def13edad6b8bf14000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c000100140003800000000000000000000000000000000014000400ff0100000000000000000000000000010800070000000000180006"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r1, 0x0, 0x4ffe0, 0x0) 07:32:22 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3, 0x9}, 0x20) dup2(r1, r0) 07:32:22 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xc1) 07:32:22 executing program 0: setuid(0x0) open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',access=user,version=9p2000.u']) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 07:32:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x8948, &(0x7f0000000000)) [ 436.288672][T18350] 9pnet: Insufficient options for proto=fd 07:32:23 executing program 0: setuid(0x0) open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=user,version=9p2000.u']) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) 07:32:23 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) dup2(r1, r0) 07:32:23 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xc1) 07:32:23 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:23 executing program 3: mq_open(&(0x7f00000013c0)='\x01\x00', 0x40, 0x0, 0x0) 07:32:23 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) dup2(r1, r0) 07:32:24 executing program 5: pipe(&(0x7f0000000d00)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="ac0000000001190500000000000000000a0000003c0001002c0001001400030016f8bcd383af9b1577def13edad6b8bf14000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c000100140003800000000000000000000000000000000014000400ff0100000000000000000000000000010800070000000000180006"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r1, 0x0, 0x4ffe0, 0x0) 07:32:24 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xc1) 07:32:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:24 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, 0x0) 07:32:24 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) dup2(r1, r0) 07:32:24 executing program 0: setuid(0x0) open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=user,version=9p2000.u']) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) 07:32:24 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x0, 0x9}, 0x20) dup2(r1, r0) 07:32:24 executing program 3: add_key$fscrypt_v1(&(0x7f00000001c0), 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffff9) 07:32:24 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xc1) 07:32:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:24 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x0, 0x9}, 0x20) dup2(r1, r0) 07:32:24 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xc1) 07:32:25 executing program 5: pipe(&(0x7f0000000d00)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="ac0000000001190500000000000000000a0000003c0001002c0001001400030016f8bcd383af9b1577def13edad6b8bf14000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c000100140003800000000000000000000000000000000014000400ff0100000000000000000000000000010800070000000000180006"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r1, 0x0, 0x4ffe0, 0x0) 07:32:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x0, {}, {}, {0x2, 0x0, @private}, 0x1c, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)='hsr0\x00'}) 07:32:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x0, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:25 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x0, 0x9}, 0x20) dup2(r1, r0) 07:32:25 executing program 4: perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xc1) 07:32:25 executing program 0: setuid(0x0) open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=user,version=9p2000.u']) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) 07:32:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000011c0)=ANY=[@ANYBLOB="e56ff514b3078650b320f566af724d45557f14750a"], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f28d00000173d5e822a7632200"}) r1 = syz_io_uring_setup(0x7760, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000080)=@IORING_OP_FADVISE, 0x5) io_uring_enter(r1, 0x450e, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_pts(r0, 0x0) read(r4, &(0x7f0000000180)=""/4096, 0x1000) 07:32:25 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3}, 0x20) dup2(r1, r0) 07:32:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x0, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:25 executing program 4: perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xc1) 07:32:25 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3}, 0x20) dup2(r1, r0) 07:32:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x0, &(0x7f00000013c0)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) 07:32:26 executing program 5: pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="ac0000000001190500000000000000000a0000003c0001002c0001001400030016f8bcd383af9b1577def13edad6b8bf14000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c000100140003800000000000000000000000000000000014000400ff0100000000000000000000000000010800070000000000180006"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:32:26 executing program 4: perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xc1) 07:32:26 executing program 0: setuid(0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=user,version=9p2000.u']) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) 07:32:26 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x3}, 0x20) dup2(r1, r0) 07:32:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = gettid() r2 = io_uring_setup(0x20e1, 0x0) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x6, &(0x7f00000006c0)=[{0x0}], 0x1) tkill(r1, 0x7) [ 439.466042][T18432] ------------[ cut here ]------------ [ 439.473883][T18432] WARNING: CPU: 1 PID: 18432 at fs/io_uring.c:1546 io_poll_double_wake+0x4fb/0x760 [ 439.483443][T18432] Modules linked in: [ 439.487759][T18432] CPU: 1 PID: 18432 Comm: syz-executor.3 Not tainted 5.14.0-rc3-syzkaller #0 [ 439.496726][T18432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.506766][T18432] RIP: 0010:io_poll_double_wake+0x4fb/0x760 [ 439.512665][T18432] Code: 13 dc ff f0 41 ff 4c 24 5c 0f 94 c3 31 ff 89 de e8 fa 5d 96 ff 84 db b8 01 00 00 00 0f 84 6f fc ff ff 89 04 24 e8 35 56 96 ff <0f> 0b 8b 04 24 e9 5d fc ff ff e8 26 56 96 ff 4c 89 e5 e9 a1 fb ff [ 439.532398][T18432] RSP: 0018:ffffc90002d17c20 EFLAGS: 00010093 [ 439.538727][T18432] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 [ 439.546779][T18432] RDX: ffff888087b68240 RSI: ffffffff81de7a9b RDI: 0000000000000003 [ 439.554916][T18432] RBP: ffff88801d9f495c R08: 0000000000000001 R09: 0000000000000001 [ 439.563206][T18432] R10: ffffffff81de7a86 R11: 0000000000000000 R12: ffff88801d9f4900 [ 439.571881][T18432] R13: 0000000000000000 R14: ffff88801d9f4930 R15: ffff88802ae72da0 [ 439.579942][T18432] FS: 0000000002f9a400(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 439.589054][T18432] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 439.595630][T18432] CR2: 0000001b2e022000 CR3: 0000000029aed000 CR4: 00000000001506e0 [ 439.603673][T18432] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 439.611635][T18432] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 439.619593][T18432] Call Trace: [ 439.622947][T18432] __wake_up_common+0x147/0x650 [ 439.627813][T18432] __wake_up_common_lock+0xd0/0x130 [ 439.633000][T18432] ? __wake_up_common+0x650/0x650 [ 439.638017][T18432] ? rwlock_bug.part.0+0x90/0x90 [ 439.643382][T18432] ? _raw_spin_unlock_irq+0x1f/0x40 [ 439.648655][T18432] pty_close+0x224/0x4f0 [ 439.652966][T18432] ? ptmx_open+0x360/0x360 [ 439.657361][T18432] tty_release+0x45e/0x1200 [ 439.661932][T18432] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 439.668153][T18432] __fput+0x288/0x920 [ 439.672204][T18432] ? tty_release_struct+0xe0/0xe0 [ 439.677213][T18432] task_work_run+0xdd/0x1a0 [ 439.681702][T18432] exit_to_user_mode_prepare+0x27e/0x290 [ 439.687509][T18432] syscall_exit_to_user_mode+0x19/0x60 [ 439.693228][T18432] do_syscall_64+0x42/0xb0 [ 439.697725][T18432] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 439.703910][T18432] RIP: 0033:0x4193fb [ 439.707904][T18432] Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 [ 439.727883][T18432] RSP: 002b:00007fff995b6940 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 439.736719][T18432] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00000000004193fb [ 439.744694][T18432] RDX: 0000001b2e625c80 RSI: ffffffff81359292 RDI: 0000000000000005 [ 439.752930][T18432] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b2e6257f8 [ 439.760993][T18432] R10: 00000000000015db R11: 0000000000000293 R12: 000000000056cb00 [ 439.769069][T18432] R13: 000000000056cb00 R14: 000000000056bf80 R15: 000000000006b17d [ 439.778523][T18432] ? __cpu_to_node+0x82/0xb0 [ 439.783396][T18432] Kernel panic - not syncing: panic_on_warn set ... [ 439.789983][T18432] CPU: 1 PID: 18432 Comm: syz-executor.3 Not tainted 5.14.0-rc3-syzkaller #0 [ 439.798952][T18432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.809387][T18432] Call Trace: [ 439.812751][T18432] dump_stack_lvl+0xcd/0x134 [ 439.817423][T18432] panic+0x306/0x73d [ 439.821475][T18432] ? __warn_printk+0xf3/0xf3 [ 439.826065][T18432] ? __warn.cold+0x1a/0x44 [ 439.830576][T18432] ? io_poll_double_wake+0x4fb/0x760 [ 439.835963][T18432] __warn.cold+0x35/0x44 [ 439.840458][T18432] ? io_poll_double_wake+0x4fb/0x760 [ 439.845755][T18432] report_bug+0x1bd/0x210 [ 439.850224][T18432] handle_bug+0x3c/0x60 [ 439.854502][T18432] exc_invalid_op+0x14/0x40 [ 439.859284][T18432] asm_exc_invalid_op+0x12/0x20 [ 439.864414][T18432] RIP: 0010:io_poll_double_wake+0x4fb/0x760 [ 439.870741][T18432] Code: 13 dc ff f0 41 ff 4c 24 5c 0f 94 c3 31 ff 89 de e8 fa 5d 96 ff 84 db b8 01 00 00 00 0f 84 6f fc ff ff 89 04 24 e8 35 56 96 ff <0f> 0b 8b 04 24 e9 5d fc ff ff e8 26 56 96 ff 4c 89 e5 e9 a1 fb ff [ 439.891410][T18432] RSP: 0018:ffffc90002d17c20 EFLAGS: 00010093 [ 439.897494][T18432] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 [ 439.905541][T18432] RDX: ffff888087b68240 RSI: ffffffff81de7a9b RDI: 0000000000000003 [ 439.913733][T18432] RBP: ffff88801d9f495c R08: 0000000000000001 R09: 0000000000000001 [ 439.921701][T18432] R10: ffffffff81de7a86 R11: 0000000000000000 R12: ffff88801d9f4900 [ 439.930212][T18432] R13: 0000000000000000 R14: ffff88801d9f4930 R15: ffff88802ae72da0 [ 439.938397][T18432] ? io_poll_double_wake+0x4e6/0x760 [ 439.944187][T18432] ? io_poll_double_wake+0x4fb/0x760 [ 439.949651][T18432] __wake_up_common+0x147/0x650 [ 439.954499][T18432] __wake_up_common_lock+0xd0/0x130 [ 439.959912][T18432] ? __wake_up_common+0x650/0x650 [ 439.965327][T18432] ? rwlock_bug.part.0+0x90/0x90 [ 439.970287][T18432] ? _raw_spin_unlock_irq+0x1f/0x40 [ 439.975659][T18432] pty_close+0x224/0x4f0 [ 439.979907][T18432] ? ptmx_open+0x360/0x360 [ 439.984422][T18432] tty_release+0x45e/0x1200 [ 439.989221][T18432] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 439.995659][T18432] __fput+0x288/0x920 [ 439.999830][T18432] ? tty_release_struct+0xe0/0xe0 [ 440.004841][T18432] task_work_run+0xdd/0x1a0 [ 440.009328][T18432] exit_to_user_mode_prepare+0x27e/0x290 [ 440.015225][T18432] syscall_exit_to_user_mode+0x19/0x60 [ 440.020678][T18432] do_syscall_64+0x42/0xb0 [ 440.025179][T18432] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 440.031059][T18432] RIP: 0033:0x4193fb [ 440.039958][T18432] Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 [ 440.059775][T18432] RSP: 002b:00007fff995b6940 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 440.068180][T18432] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00000000004193fb [ 440.076246][T18432] RDX: 0000001b2e625c80 RSI: ffffffff81359292 RDI: 0000000000000005 [ 440.084418][T18432] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b2e6257f8 [ 440.092509][T18432] R10: 00000000000015db R11: 0000000000000293 R12: 000000000056cb00 [ 440.100785][T18432] R13: 000000000056cb00 R14: 000000000056bf80 R15: 000000000006b17d [ 440.109309][T18432] ? __cpu_to_node+0x82/0xb0 [ 440.114129][T18432] [ 440.114137][T18432] ====================================================== [ 440.114143][T18432] WARNING: possible circular locking dependency detected [ 440.114148][T18432] 5.14.0-rc3-syzkaller #0 Not tainted [ 440.114153][T18432] ------------------------------------------------------ [ 440.114159][T18432] syz-executor.3/18432 is trying to acquire lock: [ 440.114163][T18432] ffffffff8b887d20 (console_owner){-.-.}-{0:0}, at: console_unlock+0x2e6/0xc40 [ 440.114181][T18432] [ 440.114184][T18432] but task is already holding lock: [ 440.114188][T18432] ffff888018e72528 (&tty->write_wait){-.-.}-{2:2}, at: __wake_up_common_lock+0xb4/0x130 [ 440.114205][T18432] [ 440.114208][T18432] which lock already depends on the new lock. [ 440.114212][T18432] [ 440.114214][T18432] [ 440.114217][T18432] the existing dependency chain (in reverse order) is: [ 440.114221][T18432] [ 440.114223][T18432] -> #2 (&tty->write_wait){-.-.}-{2:2}: [ 440.114237][T18432] _raw_spin_lock_irqsave+0x39/0x50 [ 440.114242][T18432] __wake_up_common_lock+0xb4/0x130 [ 440.114246][T18432] tty_port_default_wakeup+0x26/0x40 [ 440.114250][T18432] serial8250_tx_chars+0x4f3/0xad0 [ 440.114255][T18432] serial8250_handle_irq.part.0+0x305/0x3a0 [ 440.114260][T18432] serial8250_default_handle_irq+0xb2/0x220 [ 440.114265][T18432] serial8250_interrupt+0xfd/0x200 [ 440.114269][T18432] __handle_irq_event_percpu+0x303/0x8f0 [ 440.114273][T18432] handle_irq_event+0x102/0x280 [ 440.114277][T18432] handle_edge_irq+0x25f/0xd00 [ 440.114281][T18432] __common_interrupt+0x9d/0x210 [ 440.114285][T18432] common_interrupt+0x9f/0xd0 [ 440.114290][T18432] asm_common_interrupt+0x1e/0x40 [ 440.114294][T18432] _raw_spin_unlock_irqrestore+0x38/0x70 [ 440.114298][T18432] uart_write+0x30d/0x570 [ 440.114302][T18432] do_output_char+0x5de/0x850 [ 440.114306][T18432] n_tty_write+0x4c3/0xfd0 [ 440.114310][T18432] file_tty_write.constprop.0+0x526/0x910 [ 440.114315][T18432] redirected_tty_write+0xa1/0xc0 [ 440.114319][T18432] do_iter_readv_writev+0x46f/0x740 [ 440.114324][T18432] do_iter_write+0x188/0x670 [ 440.114327][T18432] vfs_writev+0x1aa/0x630 [ 440.114331][T18432] do_writev+0x139/0x300 [ 440.114335][T18432] do_syscall_64+0x35/0xb0 [ 440.114339][T18432] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 440.114343][T18432] [ 440.114345][T18432] -> #1 (&port_lock_key){-.-.}-{2:2}: [ 440.114359][T18432] _raw_spin_lock_irqsave+0x39/0x50 [ 440.114364][T18432] serial8250_console_write+0x91a/0xb70 [ 440.114368][T18432] console_unlock+0x859/0xc40 [ 440.114372][T18432] vprintk_emit+0x1ca/0x560 [ 440.114376][T18432] vprintk+0x8d/0x260 [ 440.114379][T18432] printk+0xba/0xed [ 440.114383][T18432] register_console+0x55f/0x780 [ 440.114387][T18432] univ8250_console_init+0x3a/0x46 [ 440.114393][T18432] console_init+0x3c1/0x58d [ 440.114398][T18432] start_kernel+0x30b/0x49b [ 440.114402][T18432] secondary_startup_64_no_verify+0xb0/0xbb [ 440.114406][T18432] [ 440.114408][T18432] -> #0 (console_owner){-.-.}-{0:0}: [ 440.114422][T18432] __lock_acquire+0x2a07/0x54a0 [ 440.114426][T18432] lock_acquire+0x1ab/0x510 [ 440.114430][T18432] console_unlock+0x359/0xc40 [ 440.114434][T18432] vprintk_emit+0x1ca/0x560 [ 440.114438][T18432] vprintk+0x8d/0x260 [ 440.114441][T18432] printk+0xba/0xed [ 440.114445][T18432] report_bug.cold+0x72/0xab [ 440.114449][T18432] handle_bug+0x3c/0x60 [ 440.114453][T18432] exc_invalid_op+0x14/0x40 [ 440.114457][T18432] asm_exc_invalid_op+0x12/0x20 [ 440.114461][T18432] io_poll_double_wake+0x4fb/0x760 [ 440.114465][T18432] __wake_up_common+0x147/0x650 [ 440.114470][T18432] __wake_up_common_lock+0xd0/0x130 [ 440.114474][T18432] pty_close+0x224/0x4f0 [ 440.114477][T18432] tty_release+0x45e/0x1200 [ 440.114481][T18432] __fput+0x288/0x920 [ 440.114485][T18432] task_work_run+0xdd/0x1a0 [ 440.114489][T18432] exit_to_user_mode_prepare+0x27e/0x290 [ 440.114494][T18432] syscall_exit_to_user_mode+0x19/0x60 [ 440.114498][T18432] do_syscall_64+0x42/0xb0 [ 440.114502][T18432] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 440.114506][T18432] [ 440.114509][T18432] other info that might help us debug this: [ 440.114513][T18432] [ 440.114515][T18432] Chain exists of: [ 440.114518][T18432] console_owner --> &port_lock_key --> &tty->write_wait [ 440.114537][T18432] [ 440.114540][T18432] Possible unsafe locking scenario: [ 440.114543][T18432] [ 440.114546][T18432] CPU0 CPU1 [ 440.114550][T18432] ---- ---- [ 440.114554][T18432] lock(&tty->write_wait); [ 440.114563][T18432] lock(&port_lock_key); [ 440.114572][T18432] lock(&tty->write_wait); [ 440.114582][T18432] lock(console_owner); [ 440.114590][T18432] [ 440.114592][T18432] *** DEADLOCK *** [ 440.114595][T18432] [ 440.114597][T18432] 3 locks held by syz-executor.3/18432: [ 440.114601][T18432] #0: ffff8880397811c0 (&tty->legacy_mutex/1){+.+.}-{3:3}, at: tty_lock+0xbd/0x120 [ 440.114622][T18432] #1: ffff888018e72528 (&tty->write_wait){-.-.}-{2:2}, at: __wake_up_common_lock+0xb4/0x130 [ 440.114641][T18432] #2: ffffffff8b968100 (console_lock){+.+.}-{0:0}, at: vprintk+0x8d/0x260 [ 440.114658][T18432] [ 440.114661][T18432] stack backtrace: [ 440.114665][T18432] CPU: 1 PID: 18432 Comm: syz-executor.3 Not tainted 5.14.0-rc3-syzkaller #0 [ 440.114672][T18432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.114678][T18432] Call Trace: [ 440.114681][T18432] dump_stack_lvl+0xcd/0x134 [ 440.114684][T18432] check_noncircular+0x25f/0x2e0 [ 440.114688][T18432] ? stack_trace_consume_entry+0x160/0x160 [ 440.114692][T18432] ? print_circular_bug+0x1e0/0x1e0 [ 440.114696][T18432] ? memcpy+0x39/0x60 [ 440.114699][T18432] ? lockdep_lock+0xc6/0x200 [ 440.114703][T18432] ? call_rcu_zapped+0xb0/0xb0 [ 440.114707][T18432] __lock_acquire+0x2a07/0x54a0 [ 440.114711][T18432] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 440.114715][T18432] lock_acquire+0x1ab/0x510 [ 440.114718][T18432] ? console_unlock+0x2e6/0xc40 [ 440.114722][T18432] ? lock_release+0x720/0x720 [ 440.114725][T18432] ? lock_downgrade+0x6e0/0x6e0 [ 440.114729][T18432] ? do_raw_spin_lock+0x120/0x2b0 [ 440.114733][T18432] ? rwlock_bug.part.0+0x90/0x90 [ 440.114737][T18432] console_unlock+0x359/0xc40 [ 440.114741][T18432] ? console_unlock+0x2e6/0xc40 [ 440.114744][T18432] ? devkmsg_read+0x7d0/0x7d0 [ 440.114748][T18432] ? lock_release+0x720/0x720 [ 440.114751][T18432] ? vprintk+0x8d/0x260 [ 440.114755][T18432] vprintk_emit+0x1ca/0x560 [ 440.114758][T18432] vprintk+0x8d/0x260 [ 440.114761][T18432] printk+0xba/0xed [ 440.114765][T18432] ? record_print_text.cold+0x16/0x16 [ 440.114769][T18432] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 440.114773][T18432] ? find_held_lock+0x2d/0x110 [ 440.114777][T18432] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 440.114781][T18432] ? report_bug.cold+0x66/0xab [ 440.114785][T18432] ? io_poll_double_wake+0x4fb/0x760 [ 440.114789][T18432] report_bug.cold+0x72/0xab [ 440.114792][T18432] handle_bug+0x3c/0x60 [ 440.114796][T18432] exc_invalid_op+0x14/0x40 [ 440.114799][T18432] asm_exc_invalid_op+0x12/0x20 [ 440.114803][T18432] RIP: 0010:io_poll_double_wake+0x4fb/0x760 [ 440.114811][T18432] Code: 13 dc ff f0 41 ff 4c 24 5c 0f 94 c3 31 ff 89 de e8 fa 5d 96 ff 84 db b8 01 00 00 00 0f 84 6f fc ff ff 89 04 24 e8 35 56 96 ff <0f> 0b 8b 04 24 e9 5d fc ff ff e8 26 56 96 ff 4c 89 e5 e9 a1 fb ff [ 440.114822][T18432] RSP: 0018:ffffc90002d17c20 EFLAGS: 00010093 [ 440.114829][T18432] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 [ 440.114835][T18432] RDX: ffff888087b68240 RSI: ffffffff81de7a9b RDI: 0000000000000003 [ 440.114841][T18432] RBP: ffff88801d9f495c R08: 0000000000000001 R09: 0000000000000001 [ 440.114847][T18432] R10: ffffffff81de7a86 R11: 0000000000000000 R12: ffff88801d9f4900 [ 440.114853][T18432] R13: 0000000000000000 R14: ffff88801d9f4930 R15: ffff88802ae72da0 [ 440.114858][T18432] ? io_poll_double_wake+0x4e6/0x760 [ 440.114862][T18432] ? io_poll_double_wake+0x4fb/0x760 [ 440.114866][T18432] __wake_up_common+0x147/0x650 [ 440.114870][T18432] __wake_up_common_lock+0xd0/0x130 [ 440.114874][T18432] ? __wake_up_common+0x650/0x650 [ 440.114878][T18432] ? rwlock_bug.part.0+0x90/0x90 [ 440.114881][T18432] ? _raw_spin_unlock_irq+0x1f/0x40 [ 440.114885][T18432] pty_close+0x224/0x4f0 [ 440.114889][T18432] ? ptmx_open+0x360/0x360 [ 440.114892][T18432] tty_release+0x45e/0x1200 [ 440.114896][T18432] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 440.114900][T18432] __fput+0x288/0x920 [ 440.114903][T18432] ? tty_release_struct+0xe0/0xe0 [ 440.114907][T18432] task_work_run+0xdd/0x1a0 [ 440.114911][T18432] exit_to_user_mode_prepare+0x27e/0x290 [ 440.114915][T18432] syscall_exit_to_user_mode+0x19/0x60 [ 440.114919][T18432] do_syscall_64+0x42/0xb0 [ 440.114923][T18432] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 440.114927][T18432] RIP: 0033:0x4193fb [ 440.114934][T18432] Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 [ 440.114945][T18432] RSP: 002b:00007fff995b6940 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 440.114965][T18432] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00000000004193fb [ 440.114971][T18432] RDX: 0000001b2e625c80 RSI: ffffffff81359292 RDI: 0000000000000005 [ 440.114977][T18432] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b2e6257f8 [ 440.114983][T18432] R10: 00000000000015db R11: 0000000000000293 R12: 000000000056cb00 [ 440.114989][T18432] R13: 000000000056cb00 R14: 000000000056bf80 R15: 000000000006b17d [ 440.114994][T18432] ? __cpu_to_node+0x82/0xb0 [ 441.194093][T18432] Shutting down cpus with NMI [ 442.164346][T18432] Kernel Offset: disabled [ 442.168659][T18432] Rebooting in 86400 seconds..