[ 32.418974] kauditd_printk_skb: 9 callbacks suppressed [ 32.418980] audit: type=1800 audit(1568783797.979:33): pid=6786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 32.445861] audit: type=1800 audit(1568783797.989:34): pid=6786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 37.245660] random: sshd: uninitialized urandom read (32 bytes read) [ 37.541179] audit: type=1400 audit(1568783803.109:35): avc: denied { map } for pid=6957 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 37.591060] random: sshd: uninitialized urandom read (32 bytes read) [ 38.206599] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.1.5' (ECDSA) to the list of known hosts. [ 43.779522] random: sshd: uninitialized urandom read (32 bytes read) 2019/09/18 05:16:49 fuzzer started [ 43.984175] audit: type=1400 audit(1568783809.549:36): avc: denied { map } for pid=6966 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 44.731251] random: cc1: uninitialized urandom read (8 bytes read) 2019/09/18 05:16:51 dialing manager at 10.128.0.105:44707 2019/09/18 05:16:51 syscalls: 2466 2019/09/18 05:16:51 code coverage: enabled 2019/09/18 05:16:51 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/09/18 05:16:51 extra coverage: extra coverage is not supported by the kernel 2019/09/18 05:16:51 setuid sandbox: enabled 2019/09/18 05:16:51 namespace sandbox: enabled 2019/09/18 05:16:51 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/18 05:16:51 fault injection: enabled 2019/09/18 05:16:51 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/18 05:16:51 net packet injection: enabled 2019/09/18 05:16:51 net device setup: enabled [ 46.654213] random: crng init done [ 55.855212] audit: type=1400 audit(1568783821.419:37): avc: denied { map } for pid=6983 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 05:18:04 executing program 2: 05:18:04 executing program 0: 05:18:04 executing program 5: 05:18:04 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, 0x0, &(0x7f00000002c0)) 05:18:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, 0x0, &(0x7f00000002c0)) 05:18:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='omfs\x00', 0x2000, &(0x7f0000000180)='\x00') [ 118.505424] audit: type=1400 audit(1568783884.069:38): avc: denied { map } for pid=6987 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13710 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 118.960995] IPVS: ftp: loaded support on port[0] = 21 [ 119.779819] chnl_net:caif_netlink_parms(): no params data found [ 119.791721] IPVS: ftp: loaded support on port[0] = 21 [ 119.824126] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.831532] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.838851] device bridge_slave_0 entered promiscuous mode [ 119.846316] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.852788] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.859655] device bridge_slave_1 entered promiscuous mode [ 119.874837] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 119.885103] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 119.909062] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 119.916612] team0: Port device team_slave_0 added [ 119.923787] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 119.931534] team0: Port device team_slave_1 added [ 119.938626] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 119.947841] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 120.002105] IPVS: ftp: loaded support on port[0] = 21 [ 120.008994] device hsr_slave_0 entered promiscuous mode [ 120.060441] device hsr_slave_1 entered promiscuous mode [ 120.100726] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 120.112796] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 120.168876] chnl_net:caif_netlink_parms(): no params data found [ 120.192153] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.198833] bridge0: port 2(bridge_slave_1) entered forwarding state [ 120.205728] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.212252] bridge0: port 1(bridge_slave_0) entered forwarding state [ 120.223183] IPVS: ftp: loaded support on port[0] = 21 [ 120.258224] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.265187] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.272215] device bridge_slave_0 entered promiscuous mode [ 120.279011] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.286567] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.293665] device bridge_slave_1 entered promiscuous mode [ 120.368239] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 120.379100] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 120.397656] chnl_net:caif_netlink_parms(): no params data found [ 120.412647] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 120.419783] team0: Port device team_slave_0 added [ 120.427181] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 120.434604] team0: Port device team_slave_1 added [ 120.454781] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 120.466792] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 120.473202] 8021q: adding VLAN 0 to HW filter on device bond0 [ 120.486330] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 120.502500] IPVS: ftp: loaded support on port[0] = 21 [ 120.523347] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 120.582977] device hsr_slave_0 entered promiscuous mode [ 120.620388] device hsr_slave_1 entered promiscuous mode [ 120.715971] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.725068] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.732362] device bridge_slave_0 entered promiscuous mode [ 120.739863] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 120.748075] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 120.772743] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.779173] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.786205] device bridge_slave_1 entered promiscuous mode [ 120.793064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.801942] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.808774] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.816239] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 120.827839] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 120.835555] 8021q: adding VLAN 0 to HW filter on device team0 [ 120.864062] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 120.875669] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 120.884705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 120.892713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 120.900827] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.907157] bridge0: port 1(bridge_slave_0) entered forwarding state [ 120.916871] chnl_net:caif_netlink_parms(): no params data found [ 120.929666] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 120.951263] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 120.958534] team0: Port device team_slave_0 added [ 120.968055] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 120.976166] team0: Port device team_slave_1 added [ 120.985836] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 120.993992] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 121.001850] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 121.009541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 121.017638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 121.018478] IPVS: ftp: loaded support on port[0] = 21 [ 121.027936] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.037890] bridge0: port 2(bridge_slave_1) entered forwarding state [ 121.049301] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 121.083375] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 121.093015] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 121.142616] device hsr_slave_0 entered promiscuous mode [ 121.190493] device hsr_slave_1 entered promiscuous mode [ 121.230373] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.236955] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.244518] device bridge_slave_0 entered promiscuous mode [ 121.250859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 121.258546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 121.306363] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 121.313651] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 121.320959] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.327316] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.334807] device bridge_slave_1 entered promiscuous mode [ 121.345428] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 121.359797] chnl_net:caif_netlink_parms(): no params data found [ 121.381917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 121.389751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 121.399295] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 121.417532] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 121.442274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 121.449963] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 121.459358] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 121.470566] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 121.478611] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 121.502812] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 121.509875] team0: Port device team_slave_0 added [ 121.524224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 121.532322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 121.543131] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 121.551880] team0: Port device team_slave_1 added [ 121.557352] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 121.568249] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 121.585530] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 121.593230] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 121.604398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 121.613071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 121.643486] 8021q: adding VLAN 0 to HW filter on device bond0 [ 121.652030] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 121.658083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 121.668645] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.675353] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.682803] device bridge_slave_0 entered promiscuous mode [ 121.694735] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.701836] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.709118] device bridge_slave_1 entered promiscuous mode [ 121.731062] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 121.741199] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 121.750695] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 121.802212] device hsr_slave_0 entered promiscuous mode [ 121.840588] device hsr_slave_1 entered promiscuous mode [ 121.919046] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 121.926714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 121.934931] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 121.950630] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 121.956727] 8021q: adding VLAN 0 to HW filter on device team0 [ 121.964294] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 121.972392] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 122.008805] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 122.024254] chnl_net:caif_netlink_parms(): no params data found [ 122.034268] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 122.041770] team0: Port device team_slave_0 added [ 122.047761] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 122.056456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.064549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.072783] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.079146] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.087680] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 122.096314] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 122.115978] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 122.124210] team0: Port device team_slave_1 added [ 122.134688] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 122.143390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.151009] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.157514] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.166521] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 122.174275] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 122.181893] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 122.205244] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 122.216083] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 122.227220] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 122.239233] 8021q: adding VLAN 0 to HW filter on device bond0 [ 122.282270] device hsr_slave_0 entered promiscuous mode [ 122.320398] device hsr_slave_1 entered promiscuous mode [ 122.380330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 122.388075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 122.398166] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 122.407681] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 122.414987] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.422535] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.429644] device bridge_slave_0 entered promiscuous mode [ 122.436771] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 122.444265] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 122.451443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 122.459039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 122.474250] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 122.484814] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 122.493231] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.499723] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.507527] device bridge_slave_1 entered promiscuous mode [ 122.518719] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 122.527160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 122.534963] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 122.542639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.549724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.559231] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 122.568797] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 122.577398] 8021q: adding VLAN 0 to HW filter on device team0 [ 122.596239] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 122.607347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 122.615217] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 122.626041] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 122.637033] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 122.655112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.663671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.671387] bridge0: port 1(bridge_slave_0) entered blocking state 05:18:08 executing program 0: 05:18:08 executing program 0: socket$packet(0x11, 0xa, 0x300) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x1) close(r2) r3 = socket(0x11, 0x3, 0x0) bind(r3, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x87ffd) sendfile(r2, r4, 0x0, 0x800000000024) [ 122.677794] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.686196] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 122.716554] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 122.735262] 8021q: adding VLAN 0 to HW filter on device bond0 [ 122.743386] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 122.754047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 122.762990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 122.771223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.778753] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.785144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.794198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 122.801981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 122.816580] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 122.823978] team0: Port device team_slave_0 added [ 122.829679] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 122.836930] team0: Port device team_slave_1 added [ 122.846526] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 122.855153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 122.867020] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 122.876740] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 122.893777] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 122.904983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 122.916046] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 122.929270] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 05:18:08 executing program 0: socket$packet(0x11, 0xa, 0x300) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x1) close(r2) r3 = socket(0x11, 0x3, 0x0) bind(r3, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x87ffd) sendfile(r2, r4, 0x0, 0x800000000024) [ 122.937796] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 122.946994] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 122.957878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 122.967349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.982943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.992198] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 122.999599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 123.008234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 123.027803] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 123.035192] 8021q: adding VLAN 0 to HW filter on device team0 [ 123.044203] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 123.072888] 8021q: adding VLAN 0 to HW filter on device batadv0 05:18:08 executing program 0: socket$packet(0x11, 0xa, 0x300) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x1) close(r2) r3 = socket(0x11, 0x3, 0x0) bind(r3, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x87ffd) sendfile(r2, r4, 0x0, 0x800000000024) [ 123.089402] 8021q: adding VLAN 0 to HW filter on device bond0 [ 123.098022] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 123.116794] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 123.153911] device hsr_slave_0 entered promiscuous mode [ 123.190782] protocol 88fb is buggy, dev hsr_slave_0 [ 123.196307] protocol 88fb is buggy, dev hsr_slave_1 [ 123.210467] device hsr_slave_1 entered promiscuous mode [ 123.270417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 123.280715] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 123.289433] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 123.304698] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 123.310158] protocol 88fb is buggy, dev hsr_slave_0 [ 123.314439] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 123.316529] protocol 88fb is buggy, dev hsr_slave_1 [ 123.326455] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 123.338810] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 123.349609] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 123.356987] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready 05:18:08 executing program 0: r0 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000700)) syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) r2 = gettid() kcmp(r2, r1, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 05:18:16 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xffffffc6) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x4) splice(r0, 0x0, r2, 0x0, 0x8, 0x0) 05:18:16 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 05:18:16 executing program 1: quotactl(0x0, 0x0, 0x0, &(0x7f0000000280)="b66fd00200e84fe6f5da49699d4b") prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0xff}, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) read$FUSE(r1, &(0x7f0000000400), 0xfffffffffffffdc7) 05:18:16 executing program 3: r0 = creat(0x0, 0x0) fallocate(r0, 0x3, 0x0, 0x8020001) writev(r0, &(0x7f0000000380), 0x0) lseek(r0, 0x400000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)=""/24, &(0x7f0000000400)=0x18) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) unshare(0x24020400) socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000480)="dbc80c76070f4c303ede22e2bd8734eb743a8fc4f8fd30398b43d52164487e0c959f07bd9c54daafdc69ecc460ef0ea413474bd11a5a177f8f9bced82f07be2dbb6973822a9e994d89ab034749576e622384e4f591985b356ceee2a5af80c3a741689d712bd86078ec6be4ca74dd0560f7fe292f2a7a8f77a2fe534bd4df07fa86c41ac977748155040ee782e87e515df36dcdf1cfe9cc6e0b98e62a4a74376cd85963d29f") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r5, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x364) epoll_wait(r5, &(0x7f0000000440)=[{}, {}, {}], 0x3, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) 05:18:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000eb"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x243, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x40, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pfifo_head_drop={{0x14, 0x1, 'pfifo_head_drop\x00'}, {0x8}}]}, 0x40}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x4c, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x28, 0x8, [{{0x1c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x2}}, {0x8, 0x2, [0x0, 0x0]}}]}]}, 0x4c}}, 0x0) 05:18:16 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 05:18:16 executing program 0: socket$packet(0x11, 0xa, 0x300) r0 = socket$inet6(0xa, 0x3, 0x1) close(r0) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x87ffd) sendfile(r0, r2, 0x0, 0x800000000024) 05:18:16 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 130.905348] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 05:18:16 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, 0x0) getpgid(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 05:18:16 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 05:18:16 executing program 4: shmctl$SHM_UNLOCK(0x0, 0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) 05:18:16 executing program 3: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) timer_delete(0x0) ptrace(0x11, r0) 05:18:17 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xffffffc6) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x4) splice(r0, 0x0, r2, 0x0, 0x8, 0x0) 05:18:17 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 05:18:17 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRES32], 0x1037b) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="a5fd894658c21392cfb6371b8fdea0ac3f8d155f"], 0x1a000) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0'}, 0xb) 05:18:17 executing program 4: r0 = creat(0x0, 0x0) fallocate(r0, 0x3, 0x0, 0x8020001) writev(r0, &(0x7f0000000380), 0x0) lseek(r0, 0x400000, 0x0) bind$isdn(0xffffffffffffffff, &(0x7f0000000280), 0x6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x40521, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) getgid() sendto$inet(r1, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4748, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000480)="dbc80c76070f4c303ede22e2bd8734eb743a8fc4f8fd30398b43d52164487e0c959f07bd9c54daafdc69ecc460ef0ea413474bd11a5a177f8f9bced82f07be2dbb6973822a9e994d89ab034749576e622384e4f591985b356ceee2a5af80c3a741689d712bd86078ec6be4ca74dd0560f7fe292f2a7a8f77a2fe534bd4df07fa86c41ac977748155040ee782e87e515df36dcdf1cfe9cc6e0b98e62a4a74376cd85963d29f") r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r6, r5, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x364) epoll_wait(r6, 0x0, 0x0, 0x2) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) 05:18:17 executing program 0: socket$packet(0x11, 0xa, 0x300) r0 = socket$inet6(0xa, 0x3, 0x1) close(r0) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r0, r2, 0x0, 0x800000000024) 05:18:17 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 05:18:17 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 05:18:17 executing program 0: socket$packet(0x11, 0xa, 0x300) r0 = socket$inet6(0xa, 0x3, 0x1) close(r0) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r0, r2, 0x0, 0x800000000024) 05:18:17 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 05:18:17 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 05:18:17 executing program 0: socket$packet(0x11, 0xa, 0x300) r0 = socket$inet6(0xa, 0x3, 0x1) close(r0) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r0, r2, 0x0, 0x800000000024) 05:18:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x120) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x52) shutdown(r2, 0x1) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) [ 131.948138] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:18:18 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000980)=ANY=[], &(0x7f0000000840)=""/200, 0x0, 0xc8, 0x1}, 0x20) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x10000) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbcq\x9a\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98q\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) gettid() open$dir(0x0, 0x6000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x3) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r3, 0x2000000000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 05:18:18 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{}], 0x1}, 0x0) 05:18:18 executing program 4: r0 = creat(0x0, 0x0) fallocate(r0, 0x3, 0x0, 0x8020001) writev(r0, &(0x7f0000000380), 0x0) lseek(r0, 0x400000, 0x0) bind$isdn(0xffffffffffffffff, &(0x7f0000000280), 0x6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x40521, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) getgid() sendto$inet(r1, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4748, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000480)="dbc80c76070f4c303ede22e2bd8734eb743a8fc4f8fd30398b43d52164487e0c959f07bd9c54daafdc69ecc460ef0ea413474bd11a5a177f8f9bced82f07be2dbb6973822a9e994d89ab034749576e622384e4f591985b356ceee2a5af80c3a741689d712bd86078ec6be4ca74dd0560f7fe292f2a7a8f77a2fe534bd4df07fa86c41ac977748155040ee782e87e515df36dcdf1cfe9cc6e0b98e62a4a74376cd85963d29f") r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r6, r5, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x364) epoll_wait(r6, 0x0, 0x0, 0x2) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) 05:18:18 executing program 0: socket$packet(0x11, 0xa, 0x300) r0 = socket$inet6(0xa, 0x3, 0x1) close(r0) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ftruncate(0xffffffffffffffff, 0x87ffd) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000000024) 05:18:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000080000bfa30000000000000703000000feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000000df0a00b7040000000100006a0af2fe00000000850000004b000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x13}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xe, 0x0, &(0x7f0000000240)="2cf03fc92d5ae538883da102c6f9", 0x0, 0x800}, 0x28) 05:18:18 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="a5fd894658c21392cfb6371b8fdea0ac3f8d155f"], 0x1a000) 05:18:18 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{}], 0x1}, 0x0) [ 132.470139] net_ratelimit: 2 callbacks suppressed [ 132.470144] protocol 88fb is buggy, dev hsr_slave_0 05:18:18 executing program 0: socket$packet(0x11, 0xa, 0x300) r0 = socket$inet6(0xa, 0x3, 0x1) close(r0) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ftruncate(0xffffffffffffffff, 0x87ffd) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000000024) 05:18:18 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{}], 0x1}, 0x0) 05:18:18 executing program 0: socket$packet(0x11, 0xa, 0x300) r0 = socket$inet6(0xa, 0x3, 0x1) close(r0) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ftruncate(0xffffffffffffffff, 0x87ffd) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000000024) 05:18:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000640)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) [ 132.702943] audit: type=1804 audit(1568783898.259:42): pid=7459 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir636094067/syzkaller.XK9RZf/18/bus" dev="sda1" ino=16591 res=1 [ 132.753980] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:18:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x120) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x52) shutdown(r2, 0x1) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 05:18:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 05:18:18 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000020008151e00f80ecdb4cb904014865160b0001", 0x17}], 0x1}, 0x0) 05:18:18 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000980)=ANY=[], &(0x7f0000000840)=""/200, 0x0, 0xc8, 0x1}, 0x20) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x10000) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbcq\x9a\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98q\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) gettid() open$dir(0x0, 0x6000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x3) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r3, 0x2000000000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 05:18:18 executing program 4: removexattr(&(0x7f0000000000)='./file0\x00', 0x0) 05:18:18 executing program 0: socket$packet(0x11, 0xa, 0x300) r0 = socket$inet6(0xa, 0x3, 0x1) close(r0) socket(0x11, 0x3, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x87ffd) sendfile(r0, r1, 0x0, 0x800000000024) 05:18:18 executing program 4: unlink(0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000000)={0x8000, 0x6, 0x1, {0xb, @raw_data="6ac733ce0d284a7c1f64f3cd83363a5ad6fddf16816127f4a1a68c7b2fd2f2544650b110fd93657a7324e9f29ad908c1845bde02d72baf0841d799e13cdc50e7fe8910af94a40283e7260a511088d29ec221e2a1f4e99beb4774bd797bf02b2bd134e3d343ccfb29dda2268e44115164f7c2ceab1da9a445b5fac1ce65ca73372e23d15b8919936ae94cfc7a414faba612b46bed98860d52df455943a7215d9167f51f9f59f9e43848c169f2e212bf9a20dca4da9541c41e0c8ba8a2968a5fa60887d7820f4a4831"}}) sendmmsg(r1, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = semget$private(0x0, 0x0, 0x0) semop(r3, &(0x7f0000000100)=[{0x5, 0x10001}, {0x2, 0x0, 0x800}, {0x0, 0xee4}], 0x3) semctl$IPC_RMID(r3, 0x0, 0x0) 05:18:18 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000020008151e00f80ecdb4cb904014865160b0001", 0x17}], 0x1}, 0x0) 05:18:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000240)=0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) getpriority(0x1, r1) 05:18:18 executing program 0: socket$packet(0x11, 0xa, 0x300) r0 = socket$inet6(0xa, 0x3, 0x1) close(r0) socket(0x11, 0x3, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x87ffd) sendfile(r0, r1, 0x0, 0x800000000024) [ 133.006719] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:18:18 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000020008151e00f80ecdb4cb904014865160b0001", 0x17}], 0x1}, 0x0) [ 133.063071] audit: type=1804 audit(1568783898.629:43): pid=7505 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir636094067/syzkaller.XK9RZf/19/bus" dev="sda1" ino=16615 res=1 05:18:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'irlan0\x00', 0x400}) 05:18:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x120) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x52) shutdown(r2, 0x1) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 05:18:19 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000020008151e00f80ecdb4cb904014865160b0001410b000000000500140e0006", 0x23}], 0x1}, 0x0) 05:18:19 executing program 0: socket$packet(0x11, 0xa, 0x300) r0 = socket$inet6(0xa, 0x3, 0x1) close(r0) socket(0x11, 0x3, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x87ffd) sendfile(r0, r1, 0x0, 0x800000000024) 05:18:19 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000980)=ANY=[], &(0x7f0000000840)=""/200, 0x0, 0xc8, 0x1}, 0x20) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x10000) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbcq\x9a\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98q\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) gettid() open$dir(0x0, 0x6000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x3) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r3, 0x2000000000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 05:18:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000001c0)={0x53, 0x0, 0x2b5, 0x0, @scatter={0x1, 0x3, &(0x7f0000000000)=[{&(0x7f0000000080)=""/193, 0xc1}]}, &(0x7f0000001280), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc070d3f500000000}) chroot(0x0) 05:18:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) tkill(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, 0x0) mq_open(&(0x7f0000000140)='@wlan0\\\x00', 0x0, 0x4, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000040)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) [ 133.824417] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:18:19 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 05:18:19 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000020008151e00f80ecdb4cb904014865160b0001410b000000000500140e0006", 0x23}], 0x1}, 0x0) 05:18:19 executing program 0: socket$packet(0x11, 0xa, 0x300) r0 = socket$inet6(0xa, 0x3, 0x1) close(r0) bind(0xffffffffffffffff, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x87ffd) sendfile(r0, r1, 0x0, 0x800000000024) 05:18:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649eac6d4cc29a315faf899c2e35d08b19741", 0x77, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 05:18:19 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000020008151e00f80ecdb4cb904014865160b0001410b000000000500140e0006", 0x23}], 0x1}, 0x0) [ 133.955055] audit: type=1804 audit(1568783899.519:44): pid=7547 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir636094067/syzkaller.XK9RZf/20/bus" dev="sda1" ino=16625 res=1 05:18:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005440)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000780)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) [ 134.244382] kasan: CONFIG_KASAN_INLINE enabled [ 134.249426] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 134.258421] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 134.264686] Modules linked in: [ 134.267898] CPU: 1 PID: 7538 Comm: syz-executor.3 Not tainted 4.14.144 #0 [ 134.274824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.284187] task: ffff88806304e5c0 task.stack: ffff888063050000 [ 134.290255] RIP: 0010:tcp_push+0xe9/0x610 [ 134.294397] RSP: 0018:ffff888063057a48 EFLAGS: 00010202 [ 134.299764] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90009468000 [ 134.307065] RDX: 0000000000000007 RSI: ffffffff85231b30 RDI: 0000000000000038 [ 134.314337] RBP: ffff888063057a98 R08: ffff8880a849b55c R09: ffff88806304ee60 [ 134.321607] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a849acc0 [ 134.328883] R13: 0000000000000000 R14: ffff8880a849b554 R15: 0000000000000000 [ 134.336153] FS: 00007f8f958ba700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 134.344384] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 134.350433] CR2: 0000000021000000 CR3: 0000000099be2000 CR4: 00000000001406e0 [ 134.357981] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 134.365245] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 134.372502] Call Trace: [ 134.375111] tcp_sendmsg_locked+0x2307/0x3200 [ 134.379719] ? tcp_sendpage+0x60/0x60 [ 134.383597] ? trace_hardirqs_on_caller+0x400/0x590 [ 134.388619] ? trace_hardirqs_on+0xd/0x10 [ 134.392764] tcp_sendmsg+0x30/0x50 [ 134.396287] inet_sendmsg+0x122/0x500 [ 134.400427] ? inet_recvmsg+0x500/0x500 [ 134.404434] sock_sendmsg+0xce/0x110 [ 134.408156] SYSC_sendto+0x206/0x310 [ 134.411862] ? SYSC_connect+0x2d0/0x2d0 [ 134.415833] ? kasan_check_read+0x11/0x20 [ 134.419971] ? _copy_to_user+0x87/0xd0 [ 134.423932] ? put_timespec64+0xb4/0x100 [ 134.427979] ? nsecs_to_jiffies+0x30/0x30 [ 134.432109] ? SyS_clock_gettime+0xf8/0x180 [ 134.436418] SyS_sendto+0x40/0x50 [ 134.439878] ? SyS_getpeername+0x30/0x30 [ 134.444010] do_syscall_64+0x1e8/0x640 [ 134.447893] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 134.452983] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 134.458161] RIP: 0033:0x4598e9 [ 134.461334] RSP: 002b:00007f8f958b9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 134.469218] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004598e9 [ 134.476475] RDX: 00000000fffffdda RSI: 00000000200000c0 RDI: 0000000000000006 [ 134.483831] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000001a [ 134.491115] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8f958ba6d4 [ 134.498373] R13: 00000000004c7880 R14: 00000000004dd188 R15: 00000000ffffffff [ 134.505773] Code: 00 4d 8d 84 24 9c 08 00 00 4c 89 45 b8 e8 c0 c7 39 fc 48 8d 7b 38 4c 8b 45 b8 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 06 0f 8e 1e 04 00 00 48 b8 00 00 00 00 00 [ 134.524882] RIP: tcp_push+0xe9/0x610 RSP: ffff888063057a48 [ 134.532504] kobject: 'loop4' (ffff8880a4aba220): kobject_uevent_env [ 134.535879] ---[ end trace 92e11aafd7ecd810 ]--- [ 134.538968] kobject: 'loop4' (ffff8880a4aba220): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 134.543760] Kernel panic - not syncing: Fatal exception [ 134.545489] Kernel Offset: disabled [ 134.564095] Rebooting in 86400 seconds..