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"}], 0x2, &(0x7f0000003140)=[@flowinfo={{0x14}}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003300)}}], 0x3, 0x0) 09:43:45 executing program 1: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SOUND_MIXER_INFO(0xffffffffffffffff, 0x805c4d65, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0x10, 0x3, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r0}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) 09:43:45 executing program 5: accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000001340), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) syz_open_procfs(0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)=""/101, 0x65}, {0x0}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x3}, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x0, 0x8}, {}, @quote}], 0xff33) 09:43:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r2, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3c0100dd09000000603b8f3e34d021af02b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 691.285240][T21105] netlink: 43 bytes leftover after parsing attributes in process `syz-executor.3'. 09:43:45 executing program 3: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SOUND_MIXER_INFO(0xffffffffffffffff, 0x805c4d65, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:43:45 executing program 1: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SOUND_MIXER_INFO(0xffffffffffffffff, 0x805c4d65, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0x10, 0x3, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r0}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) 09:43:45 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 691.964366][T21123] device bridge33 entered promiscuous mode [ 692.060702][T21125] netlink: 43 bytes leftover after parsing attributes in process `syz-executor.3'. 09:43:46 executing program 3: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SOUND_MIXER_INFO(0xffffffffffffffff, 0x805c4d65, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:43:46 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 09:43:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r2, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3c0100dd09000000603b8f3e34d021af02b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 09:43:46 executing program 1: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SOUND_MIXER_INFO(0xffffffffffffffff, 0x805c4d65, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) 09:43:46 executing program 5: accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000001340), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) syz_open_procfs(0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)=""/101, 0x65}, {0x0}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x3}, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x0, 0x8}, {}, @quote}], 0xff33) [ 692.684542][T21139] netlink: 43 bytes leftover after parsing attributes in process `syz-executor.3'. 09:43:46 executing program 3: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SOUND_MIXER_INFO(0xffffffffffffffff, 0x805c4d65, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 692.881093][T21145] device bridge34 entered promiscuous mode 09:43:47 executing program 1: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SOUND_MIXER_INFO(0xffffffffffffffff, 0x805c4d65, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) 09:43:47 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r4) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:43:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r2, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3c0100dd09000000603b8f3e34d021af02b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) [ 693.416414][T21153] netlink: 43 bytes leftover after parsing attributes in process `syz-executor.3'. 09:43:47 executing program 5: accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000001340), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) syz_open_procfs(0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)=""/101, 0x65}, {0x0}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x3}, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x0, 0x8}, {}, @quote}], 0xff33) 09:43:47 executing program 3: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SOUND_MIXER_INFO(0xffffffffffffffff, 0x805c4d65, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:43:47 executing program 1: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) [ 693.834079][T21163] device bridge35 entered promiscuous mode 09:43:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r2, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3c0100dd09000000603b8f3e34d021af02b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) [ 694.280541][T21171] netlink: 43 bytes leftover after parsing attributes in process `syz-executor.3'. [ 694.796070][T21177] device bridge36 entered promiscuous mode 09:43:49 executing program 0: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040), 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a84470080ffe006000000001f0000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 09:43:49 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:43:49 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007380)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)=[@rthdr={{0x18}}], 0x18}}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x98) 09:43:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) 09:43:49 executing program 3: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SOUND_MIXER_INFO(0xffffffffffffffff, 0x805c4d65, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:43:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r2, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3c0100dd09000000603b8f3e34d021af02b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x1c}}, 0x0) [ 695.493031][T21187] device bridge37 entered promiscuous mode 09:43:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0xa02000000000000, 0x60, &(0x7f0000000000)={'filter\x00', 0x2, 0x4, 0x3d0, 0x0, 0x0, 0x39e, 0x2e8, 0x2e8, 0x2e8, 0x4, 0x0, {[{{@uncond=[0x2], 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x1d8}}, {{@arp={@broadcast, @multicast2, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'netdevsim0\x00', 'ip6tnl0\x00'}, 0xc0, 0xf0}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x420) 09:43:49 executing program 3: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SOUND_MIXER_INFO(0xffffffffffffffff, 0x805c4d65, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:43:49 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r0}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) 09:43:49 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f0000000600)=[{&(0x7f0000000100)=""/75, 0x4b}], 0x1, 0x10a00) 09:43:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r2, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3c0100dd09000000603b8f3e34d021af02b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x1c}}, 0x0) 09:43:50 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:43:50 executing program 3: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SOUND_MIXER_INFO(0xffffffffffffffff, 0x805c4d65, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:43:50 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r0}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) [ 696.395109][T21216] device bridge38 entered promiscuous mode 09:43:50 executing program 0: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, &(0x7f00000003c0)) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a84470080ffe006000000001f0000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 09:43:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000001500)={0x2}) 09:43:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r2, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3c0100dd09000000603b8f3e34d021af02b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x1c}}, 0x0) 09:43:51 executing program 3: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SOUND_MIXER_INFO(0xffffffffffffffff, 0x805c4d65, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:43:51 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r0}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) 09:43:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') 09:43:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='illinois\x00', 0x9) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe83, 0x11, 0x0, 0x27) [ 697.279954][T21241] device bridge39 entered promiscuous mode [ 697.460209][T21246] netlink: 43 bytes leftover after parsing attributes in process `syz-executor.3'. 09:43:51 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:43:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r2, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3c0100dd09000000603b8f3e34d021af02b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1}, 0x1c}}, 0x0) 09:43:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 09:43:51 executing program 3: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:43:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800004000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x162}], 0x808480, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB='\x00'], 0x1) [ 698.143942][T21263] device bridge40 entered promiscuous mode [ 698.255402][T21264] netlink: 43 bytes leftover after parsing attributes in process `syz-executor.3'. 09:43:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 09:43:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) close(r0) 09:43:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r2, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3c0100dd09000000603b8f3e34d021af02b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1}, 0x1c}}, 0x0) 09:43:52 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:43:52 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:43:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)}}, 0xb9) 09:43:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 699.028875][T21286] device bridge41 entered promiscuous mode [ 699.092659][T21287] netlink: 43 bytes leftover after parsing attributes in process `syz-executor.3'. 09:43:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r2, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3c0100dd09000000603b8f3e34d021af02b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1}, 0x1c}}, 0x0) 09:43:53 executing program 3: r0 = socket$inet6(0x10, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:43:53 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300)='/dev/nvram\x00', 0x0, 0x0) 09:43:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 09:43:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="9c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000006c00128009000100766c616e000000005c0002800600010000000000040003804c0003800c000100ffffffff090000000c0001007f000000020000000c00010002000000070000000c00010000000000030000200c00010009000000fc0200000c00010004000000faffffff08000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="0b146e392b3ba126cc8b17259f50cd987d3939167645cceea2a221d43f826168d7689e5c63ef26c0d052c023368ef3fe56debc558223647d64d1287fc7e6706c4bbc19e7162d1e892ade53c8840ff3fc16d6f6b0a9068fc33af59f1f05f2215f85ff252d10f4d157bb57dae323a713a1052868a86f1edf20ea6c0acd335ea447749f53691d99e993d373820288c69f2e04cd412d10e5b9cc1f33f05f54ac6cd0fbdd2542acf780fffc3737e27489339ecfde39834f499d58b8fbce718c8ae645"], 0x9c}}, 0x0) 09:43:53 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 699.831255][T21307] device bridge42 entered promiscuous mode 09:43:54 executing program 3: r0 = socket$inet6(0x10, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:43:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 09:43:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 09:43:54 executing program 2: getpid() unshare(0x20000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) unlink(&(0x7f0000000080)='./file0\x00') 09:43:54 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) unshare(0x20000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) unlink(&(0x7f0000000080)='./file0\x00') 09:43:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 09:43:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000040), 0xc) 09:43:54 executing program 3: r0 = socket$inet6(0x10, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:43:55 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:43:55 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, &(0x7f0000000000)) 09:43:55 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x1e, &(0x7f00000001c0)="0b9daea423fd9340275e0bfc239693cb72e05d24065720c20d0af1a645d8a6511ae011fcdb41f09fc66dd0685fb98a2472f55cbf0ae22895d18054f182683162437f4ef26473770bfb9370720b03e18ddd1dac40a2d04ae89138caa8ebe0a979ee13e7afa1991a342bc14a76b1ff8a70ec9b9f6d6c24d8784391199217f3305172c6960d6f194e37f7a562d8d3269a7392f3fcf7600489a96f550308e64748ed566f254d123ea9bd32d0a9b48758ca496c96abfa4e67a53d150073c6dffd2c889b83c970be840884733f8a825ed282d88d1480e8061d9cc39a6a4e60857803cff7114672b04a7636e0384ae32c326a68e7342496924a9d8297f3431eb1e82399b2a86eb5d74da717ae77a1253e3233ac066c96287ab4f9be96ad5c48538b8f612def931c8268f9c7b99dadde78ee34dcc87a02e2e8fb9b7659b2cdf4d8eedf5d541b8d5a633856e66fae9bffc079607e53f8ca2b743725e4b5fd077749714d83574516da327c45f49e98fc16f03ff8324484d85d880f09a1f3b6b2bd4fe3c0fb8e878eb3707a33658f4114058acc75d8aa84acff3aa33f19b13b2fa596fb2262a1dcff70598871b5ad8ea2fe1da59dffca047962b0c2da7ef4a04ebc9adf06b348f577db64d4c1ceeadbd677b632e5ae2c2b0109ed11561277b3b40b2be4b40c0a7c384cb41bef8932d8358f2472e4062d5765c2fd7804da2e0b668c15f5478990b2905b235061e5c3316b2340db1e5f16f41a416eaa36a553a11185fbe543f7bf334c6e94415bd2b1348fe04ab1578cc92eb7e7f8a6eae6fd3beb8755f50beb6fa4b85641e690c4664b03118ed281324b5742f4dd1d0536cf06fc8175f2b36b1c019ded2807784c43c0f92a0edd3cbf64b4691d31523e53ff8f3e42ee969012135581b49e78aecf0fc31e1177da0732f1ea469896991004e6e333966dbc2eb957f9771173b2af3aac21ae3ba97789ff804e1ca140a37103ee77378ddfc71e8c12b1b31bfccbf7053f3e16ffbc244ff24ee862e3003c4d055f036ded6be7845874c33870233b484eb8d98b8832c65847ff067499503dc55fdf35e11cd76c603b7552a47701a73636aad7bfeee5e03eb4203caddfc2c88e77e636f74b206c64b9e2df65d8c5772eaae4de246f577dbed10b3f1b528b3004f63dff9414584e814f9e10a168326edccb1f481f18bac05ef220933a4aa0df6927b7a96ab4f9b16c34dbba0c19428535b4ae712c3bb4a99eb9d8b22a17a122c50efa9f094db69d3e6aaef7d1eb862b1af7f1ad6db6302273598d163769af3aee0881dcb7f6ff56385c4d7f44aad1ed7f7fb281e3f410ce3a81b12124eb4898976438b499f8acf6fbe04497284f1d86980f9beb8e28cdd7f96310eb0f3b2b056deabbf1fc66e37c20dd7adc9cd35e33a2dc467308f8b9e1c02fdd20c372146255fa89e87e21835428fa"}) 09:43:55 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000001500)={0x2, 0x0, [0x4b564d05]}) [ 701.405707][T21359] usb usb3: usbfs: interface 0 claimed by hub while 'syz-executor.2' sets config #0 09:43:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 09:43:55 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, &(0x7f0000000000)) 09:43:55 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:43:55 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, &(0x7f0000000000)) [ 701.875533][T21373] usb usb3: usbfs: interface 0 claimed by hub while 'syz-executor.2' sets config #0 09:43:56 executing program 0: socket(0x11, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3400000010000507593f00000000008347a0121f2246098ccb0000000000", @ANYRES32=r2, @ANYBLOB="00000000000000001400ffffffff0000000000000000000000000280"], 0x34}}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000340)=0x7) r4 = socket(0x10, 0x80002, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") epoll_pwait(r4, &(0x7f0000000280)=[{}, {}], 0x2, 0x0, &(0x7f00000002c0)={[0xf12]}, 0x8) r5 = socket$netlink(0x10, 0x3, 0x4) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$L2TP_CMD_SESSION_GET(r5, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="4c00000049a96c2e972a489c275acefc7ff4b16b2965c943837e722723418382669d7bf7130b20a227ad9bf92915759975c71355153c43d87ff646006a6f1ee7eee2bc4054bfa56da12052b6bef269b661076651c665e2f429af6b3a63725336619f9ff268066d02e9e66b16d848c275491ab7500c254428d7fbf9e3575f2f20407a9dede74b7d9e1273d7549bd338bae8b07c3d5c724972e426551d9ea7ae2610d3f5f4fa", @ANYRES16=0x0, @ANYBLOB="020225bd7000fedbdf25080000000c001000ffff00000000000006000e00ab06000005000500010000000c001600010000000000000008001700", @ANYRES32, @ANYBLOB="0500040036000000"], 0x4c}, 0x1, 0x0, 0x0, 0xc5}, 0x40000) sendmsg$IPSET_CMD_DESTROY(r5, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, 0x3, 0x6, 0x101, 0x0, 0x0, {0x1, 0x0, 0x6}}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x80) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000d80)=ANY=[@ANYRES16=r0, @ANYRES32=r2, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002883a8e17ad190b100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000050006000000000000000500000021e907fe770dffc6faad7dd208f7569fae8ebffe21d09a544c6bac20fcff60d3"], 0x3}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r7, r6, 0x0, 0x100000001) setsockopt$TIPC_DEST_DROPPABLE(r7, 0x10f, 0x81, &(0x7f0000000440)=0x4, 0x4) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_timeval(r8, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r8, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0xff, 0x7ff}, 0x10) [ 702.019314][T21379] netlink: 43 bytes leftover after parsing attributes in process `syz-executor.3'. 09:43:56 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:43:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 09:43:56 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000001500)={0x2, 0x0, [0x0, 0x20, 0xd9c]}) [ 702.282757][T21384] usb usb3: usbfs: interface 0 claimed by hub while 'syz-executor.2' sets config #0 09:43:56 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:43:56 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, &(0x7f0000000000)) [ 702.535273][T21391] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 702.687007][T21391] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=43337 sclass=netlink_tcpdiag_socket pid=21391 comm=syz-executor.0 [ 702.708230][T21398] netlink: 43 bytes leftover after parsing attributes in process `syz-executor.3'. 09:43:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 09:43:56 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, &(0x7f0000000000)) [ 702.817092][T21405] usb usb3: usbfs: interface 0 claimed by hub while 'syz-executor.2' sets config #0 [ 702.828700][T21391] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1539 sclass=netlink_tcpdiag_socket pid=21391 comm=syz-executor.0 09:43:57 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:43:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003c80), 0x38e, 0x62, 0x0) [ 703.145720][T21411] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 09:43:57 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 703.267672][T21417] usb usb3: usbfs: interface 0 claimed by hub while 'syz-executor.2' sets config #0 [ 703.283716][T21411] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=43337 sclass=netlink_tcpdiag_socket pid=21411 comm=syz-executor.0 [ 703.331017][T21391] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1539 sclass=netlink_tcpdiag_socket pid=21391 comm=syz-executor.0 [ 703.381396][T21418] netlink: 43 bytes leftover after parsing attributes in process `syz-executor.3'. 09:43:57 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, &(0x7f0000000000)) 09:43:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x54762024dee7ef41}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:43:57 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:43:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) 09:43:58 executing program 5: socket$inet_tcp(0x2, 0x3, 0x6) socket(0x11, 0x800000003, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) [ 704.000890][T21435] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21435 comm=syz-executor.3 09:43:58 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, &(0x7f0000000000)) 09:43:58 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:43:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) 09:43:58 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 704.546576][T21451] usb usb3: usbfs: interface 0 claimed by hub while 'syz-executor.2' sets config #0 09:43:58 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(0xffffffffffffffff, 0x80045505, &(0x7f0000000000)) [ 704.754821][T21454] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21454 comm=syz-executor.3 09:43:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) 09:43:59 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(0xffffffffffffffff, 0x80045505, &(0x7f0000000000)) 09:43:59 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:43:59 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) 09:43:59 executing program 5: socket$inet_tcp(0x2, 0x3, 0x6) socket(0x11, 0x800000003, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) 09:43:59 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 705.657801][T21476] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21476 comm=syz-executor.3 09:43:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) 09:43:59 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(0xffffffffffffffff, 0x80045505, &(0x7f0000000000)) 09:44:00 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:00 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) syz_open_dev$dri(&(0x7f0000000440)='/dev/dri/card#\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0xa02000000000000, 0x60, &(0x7f0000000000)={'filter\x00', 0x2, 0x4, 0x3d0, 0x0, 0x0, 0x39e, 0x2e8, 0x2e8, 0x2e8, 0x4, 0x0, {[{{@uncond=[0x2], 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x1d8}}, {{@arp={@broadcast, @multicast2, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'netdevsim0\x00', 'ip6tnl0\x00'}, 0xc0, 0xf0}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x420) pipe2$9p(0x0, 0x0) dup(0xffffffffffffffff) 09:44:00 executing program 2: r0 = syz_open_dev$usbfs(0x0, 0x4000000000000071, 0x28001) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, &(0x7f0000000000)) [ 706.317126][T21496] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21496 comm=syz-executor.3 09:44:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) 09:44:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0x698b47966327f9d9) 09:44:00 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:00 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:00 executing program 5: socket$inet_tcp(0x2, 0x3, 0x6) socket(0x11, 0x800000003, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) 09:44:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) 09:44:01 executing program 2: r0 = syz_open_dev$usbfs(0x0, 0x4000000000000071, 0x28001) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, &(0x7f0000000000)) [ 706.966843][ T32] audit: type=1400 audit(1583919841.029:130): avc: denied { watch watch_reads } for pid=21510 comm="syz-executor.0" path="/proc/21510" dev="proc" ino=93676 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 707.039403][T21514] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21514 comm=syz-executor.3 09:44:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002440300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0101000000000000000001000000440001000c00070000000000960000000c0006006c626c637200000008000b000a69700008000800000000000800090000000000080001000a0000000800050002000000"], 0x58}}, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x6b) socket$inet6(0xa, 0x80000, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) 09:44:01 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) 09:44:01 executing program 2: r0 = syz_open_dev$usbfs(0x0, 0x4000000000000071, 0x28001) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, &(0x7f0000000000)) 09:44:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 09:44:01 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2042, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="c4", 0x1}], 0x1) [ 707.826947][T21536] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21536 comm=syz-executor.3 09:44:02 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) 09:44:02 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:02 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x28001) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, &(0x7f0000000000)) 09:44:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000001500)={0x2, 0x0, [0xd90]}) [ 708.520184][T21557] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21557 comm=syz-executor.3 09:44:02 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x28001) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, &(0x7f0000000000)) 09:44:02 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) 09:44:03 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x28001) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, &(0x7f0000000000)) 09:44:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000007961e62273faa6884c44825cc4f142133d4a1cac53819fda"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3df}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b91803b700030000009e40f088641fffffe100004000638477fbac141412e0004301c699da153f09a0e6e380f60105f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 09:44:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000000)="2e0000001100810505000000dbc0b5f207c804a00f000000302e20000000a3030e001a0002000000aacc2b2043b2", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0) [ 709.351750][T21578] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21578 comm=syz-executor.3 09:44:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}}}}}]}, 0x40}}, 0x0) 09:44:03 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:03 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:03 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, &(0x7f0000000000)) 09:44:04 executing program 0: close(0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f00000047c0)) [ 710.033471][T21600] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21600 comm=syz-executor.3 09:44:04 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, &(0x7f0000000000)) 09:44:04 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001e40)={0xffffffffffffffff}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001}, 0x0, 0x0, 0x40000000, 0x982f5b80bff621e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000140)={'veth0_macvtap\x00', 0x400}) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0x9) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 09:44:04 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:04 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:04 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, &(0x7f0000000000)) 09:44:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000007961e62273faa6884c44825cc4f142133d4a1cac53819fda"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3df}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b91803b700030000009e40f088641fffffe100004000638477fbac141412e0004301c699da153f09a0e6e380f60105f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000280)={0x0, 0x0}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 09:44:05 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:05 executing program 0: close(0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f00000047c0)) 09:44:05 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:05 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, &(0x7f0000000000)) 09:44:06 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:06 executing program 0: close(0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f00000047c0)) [ 712.118144][T21643] usb usb3: usbfs: interface 0 claimed by hub while 'syz-executor.2' sets config #0 09:44:06 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:07 executing program 1: 09:44:07 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, &(0x7f0000000000)) 09:44:07 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:07 executing program 0: close(0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f00000047c0)) 09:44:07 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:07 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x10, 0x4, 0x4, 0x1, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000340), &(0x7f0000000400)='\a'}, 0x20) [ 713.834107][T21669] netlink: 83 bytes leftover after parsing attributes in process `syz-executor.3'. [ 713.895610][T21677] usb usb3: usbfs: interface 0 claimed by hub while 'syz-executor.2' sets config #0 09:44:08 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:08 executing program 0: close(0xffffffffffffffff) socketpair(0xf, 0x3, 0x2, &(0x7f00000047c0)) 09:44:08 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, &(0x7f0000000000)) 09:44:08 executing program 5: [ 714.458080][T21685] netlink: 83 bytes leftover after parsing attributes in process `syz-executor.3'. 09:44:08 executing program 0: socketpair(0xf, 0x3, 0x2, &(0x7f00000047c0)) 09:44:08 executing program 5: [ 714.615813][T21691] usb usb3: usbfs: interface 0 claimed by hub while 'syz-executor.2' sets config #0 [ 715.569814][ C1] not chained 30000 origins [ 715.574412][ C1] CPU: 1 PID: 11836 Comm: kworker/u4:0 Not tainted 5.6.0-rc2-syzkaller #0 [ 715.582903][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.592984][ C1] Workqueue: krdsd rds_connect_worker [ 715.598380][ C1] Call Trace: [ 715.601653][ C1] [ 715.604508][ C1] dump_stack+0x1c9/0x220 [ 715.608848][ C1] kmsan_internal_chain_origin+0x6f/0x130 [ 715.614572][ C1] ? should_fail+0x72/0x9e0 [ 715.619081][ C1] ? ret_from_fork+0x35/0x40 [ 715.623667][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 715.629846][ C1] ? arch_stack_walk+0x34c/0x3e0 [ 715.634896][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 715.640133][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 715.645369][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 715.651171][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 715.656415][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 715.662386][ C1] ? __msan_metadata_ptr_for_store_2+0x13/0x20 [ 715.668534][ C1] ? tcp_parse_options+0x1ada/0x1b90 [ 715.673820][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 715.679021][ C1] __msan_chain_origin+0x50/0x90 [ 715.683988][ C1] tcp_conn_request+0x174b/0x4d10 [ 715.689038][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 715.694223][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 715.699426][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 715.705220][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 715.710430][ C1] tcp_v4_conn_request+0x19b/0x240 [ 715.715549][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 715.720576][ C1] ? inet6_sk_rx_dst_set+0x3d0/0x3d0 [ 715.725846][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 715.731298][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 715.736501][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 715.742332][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 715.748480][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 715.753890][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 715.758476][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 715.763157][ C1] ? tcp_filter+0xf0/0xf0 [ 715.767574][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 715.773038][ C1] ip_local_deliver+0x62a/0x7c0 [ 715.777972][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 715.783429][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 715.789052][ C1] ip_rcv+0x6cf/0x750 [ 715.793024][ C1] ? ip_rcv_core+0x1270/0x1270 [ 715.797770][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 715.803993][ C1] process_backlog+0xf0b/0x1410 [ 715.808852][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 715.814476][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 715.820452][ C1] net_rx_action+0x786/0x1aa0 [ 715.825122][ C1] ? net_tx_action+0xc30/0xc30 [ 715.829870][ C1] __do_softirq+0x311/0x83d [ 715.834375][ C1] do_softirq_own_stack+0x49/0x80 [ 715.839381][ C1] [ 715.842332][ C1] __local_bh_enable_ip+0x184/0x1d0 [ 715.847536][ C1] local_bh_enable+0x36/0x40 [ 715.852109][ C1] ip_finish_output2+0x2115/0x2610 [ 715.857339][ C1] ? ctnetlink_net_exit_batch+0x180/0x180 [ 715.863056][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 715.869043][ C1] __ip_finish_output+0xaa7/0xd80 [ 715.874089][ C1] ip_finish_output+0x166/0x410 [ 715.878952][ C1] ip_output+0x593/0x680 [ 715.883211][ C1] ? ip_mc_finish_output+0x6c0/0x6c0 [ 715.888495][ C1] ? ip_finish_output+0x410/0x410 [ 715.893514][ C1] __ip_queue_xmit+0x1b5c/0x21a0 [ 715.898440][ C1] ? kmsan_set_origin_checked+0x95/0xf0 [ 715.904060][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 715.911281][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 715.916490][ C1] ip_queue_xmit+0xcc/0xf0 [ 715.921081][ C1] ? tcp_v4_fill_cb+0x580/0x580 [ 715.925923][ C1] __tcp_transmit_skb+0x439c/0x6090 [ 715.931121][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 715.936944][ C1] tcp_connect+0x4337/0x6920 [ 715.941608][ C1] ? __msan_poison_alloca+0xf0/0x120 [ 715.946892][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 715.952096][ C1] tcp_v4_connect+0x21fd/0x2370 [ 715.957072][ C1] ? tcp_twsk_unique+0xba0/0xba0 [ 715.962008][ C1] __inet_stream_connect+0x2fb/0x1340 [ 715.967715][ C1] ? __local_bh_enable_ip+0x97/0x1d0 [ 715.973059][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 715.978267][ C1] inet_stream_connect+0x101/0x180 [ 715.983599][ C1] ? __inet_stream_connect+0x1340/0x1340 [ 715.989412][ C1] rds_tcp_conn_path_connect+0x8a7/0xb80 [ 715.995055][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 716.000431][ C1] ? rds_tcp_state_change+0x390/0x390 [ 716.005850][ C1] rds_connect_worker+0x2a6/0x470 [ 716.012725][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 716.019406][ C1] ? rds_addr_cmp+0x200/0x200 [ 716.024086][ C1] process_one_work+0x1555/0x1f40 [ 716.029304][ C1] worker_thread+0xef6/0x2450 [ 716.033987][ C1] kthread+0x4b5/0x4f0 [ 716.038063][ C1] ? process_one_work+0x1f40/0x1f40 [ 716.043267][ C1] ? kthread_blkcg+0xf0/0xf0 [ 716.048114][ C1] ret_from_fork+0x35/0x40 [ 716.052517][ C1] Uninit was stored to memory at: [ 716.057535][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 716.063249][ C1] __msan_chain_origin+0x50/0x90 [ 716.068167][ C1] tcp_conn_request+0x1781/0x4d10 [ 716.073168][ C1] tcp_v4_conn_request+0x19b/0x240 [ 716.078257][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 716.083260][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 716.088696][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 716.093286][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 716.097774][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 716.103269][ C1] ip_local_deliver+0x62a/0x7c0 [ 716.108115][ C1] ip_rcv+0x6cf/0x750 [ 716.112184][ C1] process_backlog+0xf0b/0x1410 [ 716.117021][ C1] net_rx_action+0x786/0x1aa0 [ 716.121679][ C1] __do_softirq+0x311/0x83d [ 716.126156][ C1] [ 716.128468][ C1] Uninit was stored to memory at: [ 716.133471][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 716.139341][ C1] __msan_chain_origin+0x50/0x90 [ 716.144267][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 716.149547][ C1] tcp_conn_request+0x33d7/0x4d10 [ 716.154602][ C1] tcp_v4_conn_request+0x19b/0x240 [ 716.159714][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 716.164745][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 716.170196][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 716.174790][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 716.179285][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 716.185354][ C1] ip_local_deliver+0x62a/0x7c0 [ 716.190212][ C1] ip_rcv+0x6cf/0x750 [ 716.194187][ C1] process_backlog+0xf0b/0x1410 [ 716.199030][ C1] net_rx_action+0x786/0x1aa0 [ 716.203695][ C1] __do_softirq+0x311/0x83d [ 716.208245][ C1] [ 716.211081][ C1] Uninit was stored to memory at: [ 716.216099][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 716.221800][ C1] __msan_chain_origin+0x50/0x90 [ 716.226728][ C1] tcp_conn_request+0x1781/0x4d10 [ 716.231735][ C1] tcp_v4_conn_request+0x19b/0x240 [ 716.236832][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 716.241833][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 716.247188][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 716.251767][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 716.257225][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 716.262662][ C1] ip_local_deliver+0x62a/0x7c0 [ 716.267575][ C1] ip_rcv+0x6cf/0x750 [ 716.271548][ C1] process_backlog+0xf0b/0x1410 [ 716.276378][ C1] net_rx_action+0x786/0x1aa0 [ 716.281035][ C1] __do_softirq+0x311/0x83d [ 716.285507][ C1] [ 716.287817][ C1] Uninit was stored to memory at: [ 716.292925][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 716.298630][ C1] __msan_chain_origin+0x50/0x90 [ 716.303567][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 716.308845][ C1] tcp_conn_request+0x33d7/0x4d10 [ 716.313849][ C1] tcp_v4_conn_request+0x19b/0x240 [ 716.318939][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 716.323940][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 716.329293][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 716.333860][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 716.338341][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 716.344731][ C1] ip_local_deliver+0x62a/0x7c0 [ 716.349572][ C1] ip_rcv+0x6cf/0x750 [ 716.353551][ C1] process_backlog+0xf0b/0x1410 [ 716.358391][ C1] net_rx_action+0x786/0x1aa0 [ 716.363045][ C1] __do_softirq+0x311/0x83d [ 716.367518][ C1] [ 716.369820][ C1] Uninit was stored to memory at: [ 716.374824][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 716.380529][ C1] __msan_chain_origin+0x50/0x90 [ 716.385444][ C1] tcp_conn_request+0x1781/0x4d10 [ 716.390445][ C1] tcp_v4_conn_request+0x19b/0x240 [ 716.395534][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 716.400537][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 716.405906][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 716.410481][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 716.414988][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 716.420430][ C1] ip_local_deliver+0x62a/0x7c0 [ 716.425268][ C1] ip_rcv+0x6cf/0x750 [ 716.429236][ C1] process_backlog+0xf0b/0x1410 [ 716.434063][ C1] net_rx_action+0x786/0x1aa0 [ 716.438718][ C1] __do_softirq+0x311/0x83d [ 716.443207][ C1] [ 716.445522][ C1] Uninit was stored to memory at: [ 716.450534][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 716.456244][ C1] __msan_chain_origin+0x50/0x90 [ 716.461167][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 716.466705][ C1] tcp_conn_request+0x33d7/0x4d10 [ 716.471809][ C1] tcp_v4_conn_request+0x19b/0x240 [ 716.476901][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 716.481909][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 716.487619][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 716.492206][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 716.496688][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 716.503053][ C1] ip_local_deliver+0x62a/0x7c0 [ 716.507899][ C1] ip_rcv+0x6cf/0x750 [ 716.511865][ C1] process_backlog+0xf0b/0x1410 [ 716.516698][ C1] net_rx_action+0x786/0x1aa0 [ 716.521450][ C1] __do_softirq+0x311/0x83d [ 716.526099][ C1] [ 716.528492][ C1] Uninit was stored to memory at: [ 716.533497][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 716.539205][ C1] __msan_chain_origin+0x50/0x90 [ 716.544241][ C1] tcp_conn_request+0x1781/0x4d10 [ 716.549250][ C1] tcp_v4_conn_request+0x19b/0x240 [ 716.554347][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 716.559356][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 716.564723][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 716.569290][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 716.573787][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 716.579254][ C1] ip_local_deliver+0x62a/0x7c0 [ 716.584092][ C1] ip_rcv+0x6cf/0x750 [ 716.588100][ C1] process_backlog+0xf0b/0x1410 [ 716.592946][ C1] net_rx_action+0x786/0x1aa0 [ 716.597604][ C1] __do_softirq+0x311/0x83d [ 716.602089][ C1] [ 716.604400][ C1] Uninit was created at: [ 716.608627][ C1] kmsan_save_stack_with_flags+0x3c/0x90 [ 716.614252][ C1] kmsan_alloc_page+0x12a/0x310 [ 716.619080][ C1] __alloc_pages_nodemask+0x5712/0x5e80 [ 716.624606][ C1] alloc_pages_current+0x67d/0x990 [ 716.629696][ C1] alloc_slab_page+0x111/0x12f0 [ 716.634544][ C1] new_slab+0x2bc/0x1130 [ 716.638774][ C1] ___slab_alloc+0x1533/0x1f30 [ 716.643516][ C1] kmem_cache_alloc+0xb23/0xd70 [ 716.648345][ C1] inet_reqsk_alloc+0xac/0x830 [ 716.653082][ C1] tcp_conn_request+0x753/0x4d10 [ 716.658010][ C1] tcp_v4_conn_request+0x19b/0x240 [ 716.663105][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 716.668456][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 716.673034][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 716.677523][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 716.682964][ C1] ip_local_deliver+0x62a/0x7c0 [ 716.687791][ C1] ip_sublist_rcv+0x11fa/0x13c0 [ 716.692639][ C1] ip_list_rcv+0x8eb/0x950 [ 716.697039][ C1] __netif_receive_skb_list_core+0x1311/0x1380 [ 716.703186][ C1] netif_receive_skb_list_internal+0xf62/0x1620 [ 716.709430][ C1] napi_complete_done+0x2ef/0xb60 [ 716.714549][ C1] virtqueue_napi_complete+0xb9/0x1f0 [ 716.719920][ C1] virtnet_poll+0x1468/0x19f0 [ 716.724595][ C1] net_rx_action+0x786/0x1aa0 [ 716.729257][ C1] __do_softirq+0x311/0x83d 09:44:12 executing program 1: 09:44:12 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:12 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:12 executing program 2: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(0xffffffffffffffff, 0x80045505, &(0x7f0000000000)) 09:44:12 executing program 0: socketpair(0x0, 0x3, 0x2, &(0x7f00000047c0)) 09:44:12 executing program 5: 09:44:13 executing program 2: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(0xffffffffffffffff, 0x80045505, &(0x7f0000000000)) [ 719.056877][T21708] netlink: 83 bytes leftover after parsing attributes in process `syz-executor.3'. 09:44:13 executing program 5: 09:44:13 executing program 0: socketpair(0x0, 0x3, 0x2, &(0x7f00000047c0)) 09:44:13 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:13 executing program 2: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(0xffffffffffffffff, 0x80045505, &(0x7f0000000000)) 09:44:13 executing program 5: [ 719.679936][T21729] netlink: 43 bytes leftover after parsing attributes in process `syz-executor.3'. 09:44:17 executing program 1: 09:44:17 executing program 0: socketpair(0x0, 0x3, 0x2, &(0x7f00000047c0)) 09:44:17 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:17 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:17 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, 0x0) 09:44:17 executing program 5: 09:44:17 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, 0x0) [ 723.384863][T21746] netlink: 43 bytes leftover after parsing attributes in process `syz-executor.3'. 09:44:17 executing program 0: socketpair(0xf, 0x0, 0x2, &(0x7f00000047c0)) 09:44:17 executing program 5: 09:44:17 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:18 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045505, 0x0) [ 723.969055][T21764] netlink: 43 bytes leftover after parsing attributes in process `syz-executor.3'. 09:44:18 executing program 5: [ 725.892431][ C1] not chained 40000 origins [ 725.897006][ C1] CPU: 1 PID: 11836 Comm: kworker/u4:0 Not tainted 5.6.0-rc2-syzkaller #0 [ 725.905624][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.915680][ C1] Workqueue: krdsd rds_connect_worker [ 725.921050][ C1] Call Trace: [ 725.924373][ C1] [ 725.927228][ C1] dump_stack+0x1c9/0x220 [ 725.931659][ C1] kmsan_internal_chain_origin+0x6f/0x130 [ 725.937420][ C1] ? should_fail+0x72/0x9e0 [ 725.941921][ C1] ? ret_from_fork+0x35/0x40 [ 725.946501][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 725.952658][ C1] ? arch_stack_walk+0x34c/0x3e0 [ 725.957689][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 725.963011][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 725.968200][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 725.974220][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 725.979451][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 725.985244][ C1] ? __msan_metadata_ptr_for_store_2+0x13/0x20 [ 725.991385][ C1] ? tcp_parse_options+0x1ada/0x1b90 [ 725.996688][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 726.001958][ C1] __msan_chain_origin+0x50/0x90 [ 726.006907][ C1] tcp_conn_request+0x1781/0x4d10 [ 726.011934][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 726.017122][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 726.022305][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 726.028212][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 726.033416][ C1] tcp_v4_conn_request+0x19b/0x240 [ 726.038585][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 726.043600][ C1] ? inet6_sk_rx_dst_set+0x3d0/0x3d0 [ 726.049146][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 726.054553][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 726.059856][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 726.065651][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 726.072610][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 726.077843][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 726.082442][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 726.086970][ C1] ? tcp_filter+0xf0/0xf0 [ 726.091973][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 726.097447][ C1] ip_local_deliver+0x62a/0x7c0 [ 726.102334][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 726.107352][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 726.112975][ C1] ip_rcv+0x6cf/0x750 [ 726.116970][ C1] ? ip_rcv_core+0x1270/0x1270 [ 726.121731][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 726.127350][ C1] process_backlog+0xf0b/0x1410 [ 726.132181][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 726.137390][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 726.143014][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 726.148294][ C1] net_rx_action+0x786/0x1aa0 [ 726.153021][ C1] ? net_tx_action+0xc30/0xc30 [ 726.157790][ C1] __do_softirq+0x311/0x83d [ 726.162296][ C1] do_softirq_own_stack+0x49/0x80 [ 726.167406][ C1] [ 726.170359][ C1] __local_bh_enable_ip+0x184/0x1d0 [ 726.175565][ C1] local_bh_enable+0x36/0x40 [ 726.180155][ C1] ip_finish_output2+0x2115/0x2610 [ 726.185264][ C1] ? ctnetlink_net_exit_batch+0x180/0x180 [ 726.190970][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 726.196966][ C1] __ip_finish_output+0xaa7/0xd80 [ 726.201999][ C1] ip_finish_output+0x166/0x410 [ 726.206847][ C1] ip_output+0x593/0x680 [ 726.211081][ C1] ? ip_mc_finish_output+0x6c0/0x6c0 [ 726.216353][ C1] ? ip_finish_output+0x410/0x410 [ 726.221357][ C1] __ip_queue_xmit+0x1b5c/0x21a0 [ 726.226284][ C1] ? kmsan_set_origin_checked+0x95/0xf0 [ 726.231825][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 726.237035][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 726.246764][ C1] ip_queue_xmit+0xcc/0xf0 [ 726.251174][ C1] ? tcp_v4_fill_cb+0x580/0x580 [ 726.256334][ C1] __tcp_transmit_skb+0x439c/0x6090 [ 726.261572][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 726.267393][ C1] tcp_connect+0x4337/0x6920 [ 726.271991][ C1] ? __msan_poison_alloca+0xf0/0x120 [ 726.277333][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 726.282543][ C1] tcp_v4_connect+0x21fd/0x2370 [ 726.287438][ C1] ? tcp_twsk_unique+0xba0/0xba0 [ 726.292375][ C1] __inet_stream_connect+0x2fb/0x1340 [ 726.300002][ C1] ? __local_bh_enable_ip+0x97/0x1d0 [ 726.305305][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 726.310494][ C1] inet_stream_connect+0x101/0x180 [ 726.315599][ C1] ? __inet_stream_connect+0x1340/0x1340 [ 726.321228][ C1] rds_tcp_conn_path_connect+0x8a7/0xb80 [ 726.326948][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 726.332144][ C1] ? rds_tcp_state_change+0x390/0x390 [ 726.337515][ C1] rds_connect_worker+0x2a6/0x470 [ 726.342884][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 726.349407][ C1] ? rds_addr_cmp+0x200/0x200 [ 726.354081][ C1] process_one_work+0x1555/0x1f40 [ 726.359119][ C1] worker_thread+0xef6/0x2450 [ 726.363809][ C1] kthread+0x4b5/0x4f0 [ 726.367867][ C1] ? process_one_work+0x1f40/0x1f40 [ 726.373071][ C1] ? kthread_blkcg+0xf0/0xf0 [ 726.377657][ C1] ret_from_fork+0x35/0x40 [ 726.382059][ C1] Uninit was stored to memory at: [ 726.387066][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 726.392786][ C1] __msan_chain_origin+0x50/0x90 [ 726.397724][ C1] tcp_conn_request+0x1781/0x4d10 [ 726.402729][ C1] tcp_v4_conn_request+0x19b/0x240 [ 726.407905][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 726.412923][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 726.418295][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 726.422865][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 726.427358][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 726.432810][ C1] ip_local_deliver+0x62a/0x7c0 [ 726.437667][ C1] ip_rcv+0x6cf/0x750 [ 726.441759][ C1] process_backlog+0xf0b/0x1410 [ 726.447049][ C1] net_rx_action+0x786/0x1aa0 [ 726.451706][ C1] __do_softirq+0x311/0x83d [ 726.456206][ C1] [ 726.458538][ C1] Uninit was stored to memory at: [ 726.463546][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 726.469244][ C1] __msan_chain_origin+0x50/0x90 [ 726.474176][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 726.479452][ C1] tcp_conn_request+0x33d7/0x4d10 [ 726.484455][ C1] tcp_v4_conn_request+0x19b/0x240 [ 726.489715][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 726.494738][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 726.500111][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 726.504680][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 726.509168][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 726.514730][ C1] ip_local_deliver+0x62a/0x7c0 [ 726.519616][ C1] ip_rcv+0x6cf/0x750 [ 726.523673][ C1] process_backlog+0xf0b/0x1410 [ 726.528517][ C1] net_rx_action+0x786/0x1aa0 [ 726.533192][ C1] __do_softirq+0x311/0x83d [ 726.537695][ C1] [ 726.540001][ C1] Uninit was stored to memory at: [ 726.545007][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 726.550733][ C1] __msan_chain_origin+0x50/0x90 [ 726.555672][ C1] tcp_conn_request+0x1781/0x4d10 [ 726.560697][ C1] tcp_v4_conn_request+0x19b/0x240 [ 726.565829][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 726.570835][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 726.576190][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 726.580759][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 726.585251][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 726.590690][ C1] ip_local_deliver+0x62a/0x7c0 [ 726.595532][ C1] ip_rcv+0x6cf/0x750 [ 726.599502][ C1] process_backlog+0xf0b/0x1410 [ 726.604340][ C1] net_rx_action+0x786/0x1aa0 [ 726.608996][ C1] __do_softirq+0x311/0x83d [ 726.613650][ C1] [ 726.615974][ C1] Uninit was stored to memory at: [ 726.621010][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 726.626708][ C1] __msan_chain_origin+0x50/0x90 [ 726.631624][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 726.636903][ C1] tcp_conn_request+0x33d7/0x4d10 [ 726.641916][ C1] tcp_v4_conn_request+0x19b/0x240 [ 726.647006][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 726.652013][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 726.657384][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 726.661954][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 726.666436][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 726.671870][ C1] ip_local_deliver+0x62a/0x7c0 [ 726.676708][ C1] ip_rcv+0x6cf/0x750 [ 726.680673][ C1] process_backlog+0xf0b/0x1410 [ 726.685514][ C1] net_rx_action+0x786/0x1aa0 [ 726.690185][ C1] __do_softirq+0x311/0x83d [ 726.694864][ C1] [ 726.697194][ C1] Uninit was stored to memory at: [ 726.702203][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 726.707905][ C1] __msan_chain_origin+0x50/0x90 [ 726.712833][ C1] tcp_conn_request+0x1781/0x4d10 [ 726.718563][ C1] tcp_v4_conn_request+0x19b/0x240 [ 726.723656][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 726.728657][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 726.734016][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 726.738598][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 726.743079][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 726.748510][ C1] ip_local_deliver+0x62a/0x7c0 [ 726.753346][ C1] ip_rcv+0x6cf/0x750 [ 726.757319][ C1] process_backlog+0xf0b/0x1410 [ 726.762150][ C1] net_rx_action+0x786/0x1aa0 [ 726.767500][ C1] __do_softirq+0x311/0x83d [ 726.771976][ C1] [ 726.774289][ C1] Uninit was stored to memory at: [ 726.779316][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 726.785033][ C1] __msan_chain_origin+0x50/0x90 [ 726.789962][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 726.795351][ C1] tcp_conn_request+0x33d7/0x4d10 [ 726.800371][ C1] tcp_v4_conn_request+0x19b/0x240 [ 726.805477][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 726.810481][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 726.815851][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 726.820434][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 726.824916][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 726.830351][ C1] ip_local_deliver+0x62a/0x7c0 [ 726.835189][ C1] ip_rcv+0x6cf/0x750 [ 726.839164][ C1] process_backlog+0xf0b/0x1410 [ 726.844010][ C1] net_rx_action+0x786/0x1aa0 [ 726.848664][ C1] __do_softirq+0x311/0x83d [ 726.853146][ C1] [ 726.855461][ C1] Uninit was stored to memory at: [ 726.860469][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 726.866164][ C1] __msan_chain_origin+0x50/0x90 [ 726.871096][ C1] tcp_conn_request+0x1781/0x4d10 [ 726.876108][ C1] tcp_v4_conn_request+0x19b/0x240 [ 726.881195][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 726.886200][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 726.891557][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 726.896127][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 726.900606][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 726.906058][ C1] ip_local_deliver+0x62a/0x7c0 [ 726.910895][ C1] ip_rcv+0x6cf/0x750 [ 726.914872][ C1] process_backlog+0xf0b/0x1410 [ 726.919717][ C1] net_rx_action+0x786/0x1aa0 [ 726.924515][ C1] __do_softirq+0x311/0x83d [ 726.929039][ C1] [ 726.931358][ C1] Uninit was created at: [ 726.935598][ C1] kmsan_save_stack_with_flags+0x3c/0x90 [ 726.941240][ C1] kmsan_alloc_page+0x12a/0x310 [ 726.946082][ C1] __alloc_pages_nodemask+0x5712/0x5e80 [ 726.951620][ C1] alloc_pages_current+0x67d/0x990 [ 726.956737][ C1] alloc_slab_page+0x111/0x12f0 [ 726.961569][ C1] new_slab+0x2bc/0x1130 [ 726.965789][ C1] ___slab_alloc+0x1533/0x1f30 [ 726.970545][ C1] kmem_cache_alloc+0xb23/0xd70 [ 726.975403][ C1] inet_reqsk_alloc+0xac/0x830 [ 726.980424][ C1] tcp_conn_request+0x753/0x4d10 [ 726.985345][ C1] tcp_v4_conn_request+0x19b/0x240 [ 726.990460][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 726.995820][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 727.000419][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 727.004917][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 727.010362][ C1] ip_local_deliver+0x62a/0x7c0 [ 727.015209][ C1] ip_sublist_rcv+0x11fa/0x13c0 [ 727.020082][ C1] ip_list_rcv+0x8eb/0x950 [ 727.024484][ C1] __netif_receive_skb_list_core+0x1311/0x1380 [ 727.030988][ C1] netif_receive_skb_list_internal+0xf62/0x1620 [ 727.037214][ C1] napi_complete_done+0x2ef/0xb60 [ 727.042319][ C1] virtqueue_napi_complete+0xb9/0x1f0 [ 727.047696][ C1] virtnet_poll+0x1468/0x19f0 [ 727.052363][ C1] net_rx_action+0x786/0x1aa0 [ 727.057033][ C1] __do_softirq+0x311/0x83d 09:44:21 executing program 1: 09:44:21 executing program 0: socketpair(0xf, 0x0, 0x2, &(0x7f00000047c0)) 09:44:21 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:21 executing program 2: 09:44:21 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}}}}}]}, 0x40}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:21 executing program 5: [ 727.866235][T21784] netlink: 51 bytes leftover after parsing attributes in process `syz-executor.3'. 09:44:22 executing program 2: 09:44:22 executing program 0: socketpair(0xf, 0x0, 0x2, &(0x7f00000047c0)) 09:44:22 executing program 5: 09:44:22 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}}}}}]}, 0x40}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:22 executing program 5: 09:44:22 executing program 0: socketpair(0xf, 0x3, 0x0, &(0x7f00000047c0)) [ 728.556418][T21799] netlink: 51 bytes leftover after parsing attributes in process `syz-executor.3'. 09:44:26 executing program 1: 09:44:26 executing program 2: 09:44:26 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:26 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}}}}}]}, 0x40}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:26 executing program 5: 09:44:26 executing program 0: socketpair(0xf, 0x3, 0x0, &(0x7f00000047c0)) 09:44:26 executing program 5: [ 732.377097][T21816] netlink: 51 bytes leftover after parsing attributes in process `syz-executor.3'. 09:44:26 executing program 2: 09:44:26 executing program 0: socketpair(0xf, 0x3, 0x0, &(0x7f00000047c0)) 09:44:26 executing program 3: socket$inet6(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:26 executing program 5: 09:44:27 executing program 2: [ 736.032007][ C1] not chained 50000 origins [ 736.036643][ C1] CPU: 1 PID: 11836 Comm: kworker/u4:0 Not tainted 5.6.0-rc2-syzkaller #0 [ 736.045135][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 736.055195][ C1] Workqueue: krdsd rds_connect_worker [ 736.060563][ C1] Call Trace: [ 736.063842][ C1] [ 736.066697][ C1] dump_stack+0x1c9/0x220 [ 736.071014][ C1] kmsan_internal_chain_origin+0x6f/0x130 [ 736.076717][ C1] ? should_fail+0x72/0x9e0 [ 736.081200][ C1] ? ret_from_fork+0x35/0x40 [ 736.085787][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 736.092024][ C1] ? arch_stack_walk+0x34c/0x3e0 [ 736.096966][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 736.102158][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 736.107390][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 736.113227][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 736.118366][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 736.125129][ C1] ? __msan_metadata_ptr_for_store_2+0x13/0x20 [ 736.131644][ C1] ? tcp_parse_options+0x1ada/0x1b90 [ 736.136938][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 736.142325][ C1] __msan_chain_origin+0x50/0x90 [ 736.147275][ C1] tcp_conn_request+0x1781/0x4d10 [ 736.152343][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 736.157745][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 736.163094][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 736.169868][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 736.175076][ C1] tcp_v4_conn_request+0x19b/0x240 [ 736.180249][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 736.185276][ C1] ? inet6_sk_rx_dst_set+0x3d0/0x3d0 [ 736.190553][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 736.196049][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 736.201708][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 736.207556][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 736.213628][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 736.218842][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 736.223830][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 736.228408][ C1] ? tcp_filter+0xf0/0xf0 [ 736.232769][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 736.238416][ C1] ip_local_deliver+0x62a/0x7c0 [ 736.243458][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 736.248485][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 736.254229][ C1] ip_rcv+0x6cf/0x750 [ 736.258266][ C1] ? ip_rcv_core+0x1270/0x1270 [ 736.263038][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 736.268692][ C1] process_backlog+0xf0b/0x1410 [ 736.273692][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 736.279342][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 736.284632][ C1] net_rx_action+0x786/0x1aa0 [ 736.289343][ C1] ? net_tx_action+0xc30/0xc30 [ 736.295151][ C1] __do_softirq+0x311/0x83d [ 736.300524][ C1] do_softirq_own_stack+0x49/0x80 [ 736.305540][ C1] [ 736.308626][ C1] __local_bh_enable_ip+0x184/0x1d0 [ 736.313864][ C1] local_bh_enable+0x36/0x40 [ 736.318576][ C1] ip_finish_output2+0x2115/0x2610 [ 736.323687][ C1] ? ctnetlink_net_exit_batch+0x180/0x180 [ 736.332081][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 736.338082][ C1] __ip_finish_output+0xaa7/0xd80 [ 736.343129][ C1] ip_finish_output+0x166/0x410 [ 736.347982][ C1] ip_output+0x593/0x680 [ 736.352316][ C1] ? ip_mc_finish_output+0x6c0/0x6c0 [ 736.357607][ C1] ? ip_finish_output+0x410/0x410 [ 736.362627][ C1] __ip_queue_xmit+0x1b5c/0x21a0 [ 736.367575][ C1] ? kmsan_set_origin_checked+0x95/0xf0 [ 736.373123][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 736.378339][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 736.383656][ C1] ip_queue_xmit+0xcc/0xf0 [ 736.391891][ C1] ? tcp_v4_fill_cb+0x580/0x580 [ 736.396743][ C1] __tcp_transmit_skb+0x439c/0x6090 [ 736.401931][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 736.407749][ C1] tcp_connect+0x4337/0x6920 [ 736.412346][ C1] ? __msan_poison_alloca+0xf0/0x120 [ 736.417630][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 736.422868][ C1] tcp_v4_connect+0x21fd/0x2370 [ 736.427752][ C1] ? tcp_twsk_unique+0xba0/0xba0 [ 736.432679][ C1] __inet_stream_connect+0x2fb/0x1340 [ 736.438051][ C1] ? __local_bh_enable_ip+0x97/0x1d0 [ 736.443357][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 736.449782][ C1] inet_stream_connect+0x101/0x180 [ 736.454894][ C1] ? __inet_stream_connect+0x1340/0x1340 [ 736.460530][ C1] rds_tcp_conn_path_connect+0x8a7/0xb80 [ 736.466261][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 736.471473][ C1] ? rds_tcp_state_change+0x390/0x390 [ 736.476831][ C1] rds_connect_worker+0x2a6/0x470 [ 736.481843][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 736.487938][ C1] ? rds_addr_cmp+0x200/0x200 [ 736.492618][ C1] process_one_work+0x1555/0x1f40 [ 736.497706][ C1] worker_thread+0xef6/0x2450 [ 736.502450][ C1] kthread+0x4b5/0x4f0 [ 736.506629][ C1] ? process_one_work+0x1f40/0x1f40 [ 736.511857][ C1] ? kthread_blkcg+0xf0/0xf0 [ 736.516480][ C1] ret_from_fork+0x35/0x40 [ 736.520912][ C1] Uninit was stored to memory at: [ 736.525945][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 736.531673][ C1] __msan_chain_origin+0x50/0x90 [ 736.536610][ C1] tcp_conn_request+0x1781/0x4d10 [ 736.541638][ C1] tcp_v4_conn_request+0x19b/0x240 [ 736.546734][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 736.551787][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 736.557149][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 736.561749][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 736.566251][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 736.571695][ C1] ip_local_deliver+0x62a/0x7c0 [ 736.576525][ C1] ip_rcv+0x6cf/0x750 [ 736.580503][ C1] process_backlog+0xf0b/0x1410 [ 736.585351][ C1] net_rx_action+0x786/0x1aa0 [ 736.590106][ C1] __do_softirq+0x311/0x83d [ 736.594601][ C1] [ 736.596914][ C1] Uninit was stored to memory at: [ 736.601940][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 736.607713][ C1] __msan_chain_origin+0x50/0x90 [ 736.612655][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 736.617923][ C1] tcp_conn_request+0x33d7/0x4d10 [ 736.622975][ C1] tcp_v4_conn_request+0x19b/0x240 [ 736.628103][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 736.633178][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 736.638532][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 736.643112][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 736.647617][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 736.653570][ C1] ip_local_deliver+0x62a/0x7c0 [ 736.658409][ C1] ip_rcv+0x6cf/0x750 [ 736.662383][ C1] process_backlog+0xf0b/0x1410 [ 736.667231][ C1] net_rx_action+0x786/0x1aa0 [ 736.671907][ C1] __do_softirq+0x311/0x83d [ 736.676398][ C1] [ 736.678706][ C1] Uninit was stored to memory at: [ 736.683721][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 736.689447][ C1] __msan_chain_origin+0x50/0x90 [ 736.694381][ C1] tcp_conn_request+0x1781/0x4d10 [ 736.699387][ C1] tcp_v4_conn_request+0x19b/0x240 [ 736.704492][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 736.709516][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 736.714880][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 736.719453][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 736.723949][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 736.729410][ C1] ip_local_deliver+0x62a/0x7c0 [ 736.734255][ C1] ip_rcv+0x6cf/0x750 [ 736.738222][ C1] process_backlog+0xf0b/0x1410 [ 736.743066][ C1] net_rx_action+0x786/0x1aa0 [ 736.747748][ C1] __do_softirq+0x311/0x83d [ 736.752225][ C1] [ 736.754530][ C1] Uninit was stored to memory at: [ 736.759538][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 736.765249][ C1] __msan_chain_origin+0x50/0x90 [ 736.770368][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 736.775639][ C1] tcp_conn_request+0x33d7/0x4d10 [ 736.780647][ C1] tcp_v4_conn_request+0x19b/0x240 [ 736.785752][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 736.790757][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 736.796136][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 736.800710][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 736.805235][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 736.810688][ C1] ip_local_deliver+0x62a/0x7c0 [ 736.815529][ C1] ip_rcv+0x6cf/0x750 [ 736.819513][ C1] process_backlog+0xf0b/0x1410 [ 736.824362][ C1] net_rx_action+0x786/0x1aa0 [ 736.829045][ C1] __do_softirq+0x311/0x83d [ 736.833540][ C1] [ 736.835854][ C1] Uninit was stored to memory at: [ 736.840867][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 736.846586][ C1] __msan_chain_origin+0x50/0x90 [ 736.851605][ C1] tcp_conn_request+0x1781/0x4d10 [ 736.856707][ C1] tcp_v4_conn_request+0x19b/0x240 [ 736.861902][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 736.867012][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 736.872378][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 736.876980][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 736.881465][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 736.886905][ C1] ip_local_deliver+0x62a/0x7c0 [ 736.891738][ C1] ip_rcv+0x6cf/0x750 [ 736.895699][ C1] process_backlog+0xf0b/0x1410 [ 736.900532][ C1] net_rx_action+0x786/0x1aa0 [ 736.905206][ C1] __do_softirq+0x311/0x83d [ 736.909688][ C1] [ 736.912152][ C1] Uninit was stored to memory at: [ 736.917209][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 736.922932][ C1] __msan_chain_origin+0x50/0x90 [ 736.927872][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 736.934211][ C1] tcp_conn_request+0x33d7/0x4d10 [ 736.939239][ C1] tcp_v4_conn_request+0x19b/0x240 [ 736.944363][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 736.949384][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 736.954778][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 736.959374][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 736.963874][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 736.969343][ C1] ip_local_deliver+0x62a/0x7c0 [ 736.974189][ C1] ip_rcv+0x6cf/0x750 [ 736.978157][ C1] process_backlog+0xf0b/0x1410 [ 736.983014][ C1] net_rx_action+0x786/0x1aa0 [ 736.987712][ C1] __do_softirq+0x311/0x83d [ 736.992217][ C1] [ 736.994532][ C1] Uninit was stored to memory at: [ 736.999546][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 737.005251][ C1] __msan_chain_origin+0x50/0x90 [ 737.010180][ C1] tcp_conn_request+0x1781/0x4d10 [ 737.015309][ C1] tcp_v4_conn_request+0x19b/0x240 [ 737.020408][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 737.025486][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 737.030859][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 737.035515][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 737.040006][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 737.045568][ C1] ip_local_deliver+0x62a/0x7c0 [ 737.050477][ C1] ip_rcv+0x6cf/0x750 [ 737.054500][ C1] process_backlog+0xf0b/0x1410 [ 737.059351][ C1] net_rx_action+0x786/0x1aa0 [ 737.064022][ C1] __do_softirq+0x311/0x83d [ 737.068515][ C1] [ 737.070837][ C1] Uninit was created at: [ 737.075088][ C1] kmsan_save_stack_with_flags+0x3c/0x90 [ 737.080722][ C1] kmsan_alloc_page+0x12a/0x310 [ 737.085568][ C1] __alloc_pages_nodemask+0x5712/0x5e80 [ 737.092245][ C1] alloc_pages_current+0x67d/0x990 [ 737.097346][ C1] alloc_slab_page+0x111/0x12f0 [ 737.102194][ C1] new_slab+0x2bc/0x1130 [ 737.106520][ C1] ___slab_alloc+0x1533/0x1f30 [ 737.111271][ C1] kmem_cache_alloc+0xb23/0xd70 [ 737.116113][ C1] inet_reqsk_alloc+0xac/0x830 [ 737.120869][ C1] tcp_conn_request+0x753/0x4d10 [ 737.125868][ C1] tcp_v4_conn_request+0x19b/0x240 [ 737.131225][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 737.136877][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 737.141447][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 737.145943][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 737.151916][ C1] ip_local_deliver+0x62a/0x7c0 [ 737.156750][ C1] ip_sublist_rcv+0x11fa/0x13c0 [ 737.161582][ C1] ip_list_rcv+0x8eb/0x950 [ 737.165984][ C1] __netif_receive_skb_list_core+0x1311/0x1380 [ 737.172116][ C1] netif_receive_skb_list_internal+0xf62/0x1620 [ 737.178359][ C1] napi_complete_done+0x2ef/0xb60 09:44:31 executing program 1: 09:44:31 executing program 0: socketpair(0xf, 0x3, 0x2, 0x0) 09:44:31 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:31 executing program 3: socket$inet6(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:31 executing program 5: 09:44:31 executing program 2: [ 737.183470][ C1] virtqueue_napi_complete+0xb9/0x1f0 [ 737.188872][ C1] virtnet_poll+0x1468/0x19f0 [ 737.193544][ C1] net_rx_action+0x786/0x1aa0 [ 737.198214][ C1] __do_softirq+0x311/0x83d 09:44:31 executing program 5: 09:44:31 executing program 2: 09:44:31 executing program 0: socketpair(0xf, 0x3, 0x2, 0x0) 09:44:31 executing program 3: socket$inet6(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r1}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:44:32 executing program 5: 09:44:32 executing program 2: 09:44:35 executing program 1: 09:44:35 executing program 0: socketpair(0xf, 0x3, 0x2, 0x0) 09:44:35 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x800, 0x0, 0x0) 09:44:35 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:35 executing program 5: 09:44:35 executing program 2: 09:44:35 executing program 5: 09:44:35 executing program 2: 09:44:35 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x800, 0x0, 0x0) 09:44:36 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:36 executing program 0: 09:44:36 executing program 5: 09:44:39 executing program 1: 09:44:39 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x800, 0x0, 0x0) 09:44:39 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:39 executing program 2: 09:44:39 executing program 5: 09:44:39 executing program 0: 09:44:40 executing program 5: 09:44:40 executing program 2: 09:44:40 executing program 0: 09:44:40 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x800, 0x0, 0x0) 09:44:40 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:40 executing program 5: [ 746.833263][ C1] not chained 60000 origins [ 746.837833][ C1] CPU: 1 PID: 13681 Comm: kworker/u4:3 Not tainted 5.6.0-rc2-syzkaller #0 [ 746.846368][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.856450][ C1] Workqueue: krdsd rds_connect_worker [ 746.861838][ C1] Call Trace: [ 746.865132][ C1] [ 746.868004][ C1] dump_stack+0x1c9/0x220 [ 746.872361][ C1] kmsan_internal_chain_origin+0x6f/0x130 [ 746.878093][ C1] ? should_fail+0x72/0x9e0 [ 746.882601][ C1] ? ret_from_fork+0x35/0x40 [ 746.887329][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 746.893392][ C1] ? arch_stack_walk+0x34c/0x3e0 [ 746.898327][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 746.903552][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 746.908850][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 746.914664][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 746.919786][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 746.925707][ C1] ? __msan_metadata_ptr_for_store_2+0x13/0x20 [ 746.932046][ C1] ? tcp_parse_options+0x1ada/0x1b90 [ 746.937366][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 746.942562][ C1] __msan_chain_origin+0x50/0x90 [ 746.947499][ C1] tcp_conn_request+0x174b/0x4d10 [ 746.952550][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 746.957887][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 746.963116][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 746.969152][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 746.974646][ C1] tcp_v4_conn_request+0x19b/0x240 [ 746.979766][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 746.984786][ C1] ? inet6_sk_rx_dst_set+0x3d0/0x3d0 [ 746.990083][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 746.995454][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 747.000650][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 747.006452][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 747.012794][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 747.018082][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 747.022855][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 747.027395][ C1] ? tcp_filter+0xf0/0xf0 [ 747.031729][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 747.037215][ C1] ip_local_deliver+0x62a/0x7c0 [ 747.042096][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 747.047125][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 747.052751][ C1] ip_rcv+0x6cf/0x750 [ 747.056740][ C1] ? ip_rcv_core+0x1270/0x1270 [ 747.061501][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 747.067127][ C1] process_backlog+0xf0b/0x1410 [ 747.071978][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 747.077620][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 747.082911][ C1] net_rx_action+0x786/0x1aa0 [ 747.087617][ C1] ? net_tx_action+0xc30/0xc30 [ 747.092385][ C1] __do_softirq+0x311/0x83d [ 747.096903][ C1] do_softirq_own_stack+0x49/0x80 [ 747.101913][ C1] [ 747.104850][ C1] __local_bh_enable_ip+0x184/0x1d0 [ 747.110051][ C1] local_bh_enable+0x36/0x40 [ 747.114662][ C1] ip_finish_output2+0x2115/0x2610 [ 747.120113][ C1] ? ctnetlink_net_exit_batch+0x180/0x180 [ 747.125846][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 747.131997][ C1] __ip_finish_output+0xaa7/0xd80 [ 747.137035][ C1] ip_finish_output+0x166/0x410 [ 747.141890][ C1] ip_output+0x593/0x680 [ 747.146151][ C1] ? ip_mc_finish_output+0x6c0/0x6c0 [ 747.151453][ C1] ? ip_finish_output+0x410/0x410 [ 747.156475][ C1] __ip_queue_xmit+0x1b5c/0x21a0 [ 747.161432][ C1] ? kmsan_set_origin_checked+0x95/0xf0 [ 747.167108][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 747.172327][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 747.177650][ C1] ip_queue_xmit+0xcc/0xf0 [ 747.182072][ C1] ? tcp_v4_fill_cb+0x580/0x580 [ 747.186933][ C1] __tcp_transmit_skb+0x439c/0x6090 [ 747.192139][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 747.197987][ C1] tcp_connect+0x4337/0x6920 [ 747.202590][ C1] ? __msan_poison_alloca+0xf0/0x120 [ 747.208121][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 747.213351][ C1] tcp_v4_connect+0x21fd/0x2370 [ 747.218251][ C1] ? tcp_twsk_unique+0xba0/0xba0 [ 747.223199][ C1] __inet_stream_connect+0x2fb/0x1340 [ 747.228590][ C1] ? __local_bh_enable_ip+0x97/0x1d0 [ 747.233887][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 747.239087][ C1] inet_stream_connect+0x101/0x180 [ 747.244372][ C1] ? __inet_stream_connect+0x1340/0x1340 [ 747.250021][ C1] rds_tcp_conn_path_connect+0x8a7/0xb80 [ 747.255670][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 747.260885][ C1] ? rds_tcp_state_change+0x390/0x390 [ 747.266271][ C1] rds_connect_worker+0x2a6/0x470 [ 747.271297][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 747.277383][ C1] ? rds_addr_cmp+0x200/0x200 [ 747.282075][ C1] process_one_work+0x1555/0x1f40 [ 747.287133][ C1] worker_thread+0xef6/0x2450 [ 747.291896][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 747.297716][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 747.302942][ C1] kthread+0x4b5/0x4f0 [ 747.307009][ C1] ? process_one_work+0x1f40/0x1f40 [ 747.312212][ C1] ? kthread_blkcg+0xf0/0xf0 [ 747.316898][ C1] ret_from_fork+0x35/0x40 [ 747.321320][ C1] Uninit was stored to memory at: [ 747.326477][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 747.332382][ C1] __msan_chain_origin+0x50/0x90 [ 747.337329][ C1] tcp_conn_request+0x1781/0x4d10 [ 747.342349][ C1] tcp_v4_conn_request+0x19b/0x240 [ 747.347460][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 747.352486][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 747.358406][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 747.363077][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 747.367580][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 747.373049][ C1] ip_local_deliver+0x62a/0x7c0 [ 747.377895][ C1] ip_rcv+0x6cf/0x750 [ 747.381886][ C1] process_backlog+0xf0b/0x1410 [ 747.386733][ C1] net_rx_action+0x786/0x1aa0 [ 747.391437][ C1] __do_softirq+0x311/0x83d [ 747.395946][ C1] [ 747.398279][ C1] Uninit was stored to memory at: [ 747.403319][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 747.409035][ C1] __msan_chain_origin+0x50/0x90 [ 747.414229][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 747.419697][ C1] tcp_conn_request+0x33d7/0x4d10 [ 747.424717][ C1] tcp_v4_conn_request+0x19b/0x240 [ 747.429815][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 747.434831][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 747.440191][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 747.444774][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 747.449280][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 747.454849][ C1] ip_local_deliver+0x62a/0x7c0 [ 747.459739][ C1] ip_rcv+0x6cf/0x750 [ 747.463721][ C1] process_backlog+0xf0b/0x1410 [ 747.468569][ C1] net_rx_action+0x786/0x1aa0 [ 747.473255][ C1] __do_softirq+0x311/0x83d [ 747.477742][ C1] [ 747.480061][ C1] Uninit was stored to memory at: [ 747.485093][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 747.490902][ C1] __msan_chain_origin+0x50/0x90 [ 747.495833][ C1] tcp_conn_request+0x1781/0x4d10 [ 747.500850][ C1] tcp_v4_conn_request+0x19b/0x240 [ 747.505951][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 747.510965][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 747.516340][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 747.520921][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 747.525413][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 747.530859][ C1] ip_local_deliver+0x62a/0x7c0 [ 747.535695][ C1] ip_rcv+0x6cf/0x750 [ 747.539665][ C1] process_backlog+0xf0b/0x1410 [ 747.544504][ C1] net_rx_action+0x786/0x1aa0 [ 747.549168][ C1] __do_softirq+0x311/0x83d [ 747.553660][ C1] [ 747.555974][ C1] Uninit was stored to memory at: [ 747.560988][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 747.566695][ C1] __msan_chain_origin+0x50/0x90 [ 747.571633][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 747.576908][ C1] tcp_conn_request+0x33d7/0x4d10 [ 747.581940][ C1] tcp_v4_conn_request+0x19b/0x240 [ 747.587041][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 747.592051][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 747.597427][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 747.602005][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 747.606497][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 747.612742][ C1] ip_local_deliver+0x62a/0x7c0 [ 747.617594][ C1] ip_rcv+0x6cf/0x750 [ 747.621567][ C1] process_backlog+0xf0b/0x1410 [ 747.626409][ C1] net_rx_action+0x786/0x1aa0 [ 747.631074][ C1] __do_softirq+0x311/0x83d [ 747.635569][ C1] [ 747.637881][ C1] Uninit was stored to memory at: [ 747.642899][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 747.648623][ C1] __msan_chain_origin+0x50/0x90 [ 747.653549][ C1] tcp_conn_request+0x1781/0x4d10 [ 747.658562][ C1] tcp_v4_conn_request+0x19b/0x240 [ 747.663682][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 747.668691][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 747.674137][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 747.678732][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 747.683222][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 747.688679][ C1] ip_local_deliver+0x62a/0x7c0 [ 747.693524][ C1] ip_rcv+0x6cf/0x750 [ 747.697510][ C1] process_backlog+0xf0b/0x1410 [ 747.703491][ C1] net_rx_action+0x786/0x1aa0 [ 747.708154][ C1] __do_softirq+0x311/0x83d [ 747.712642][ C1] [ 747.714975][ C1] Uninit was stored to memory at: [ 747.720013][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 747.725733][ C1] __msan_chain_origin+0x50/0x90 [ 747.730668][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 747.735950][ C1] tcp_conn_request+0x33d7/0x4d10 [ 747.740967][ C1] tcp_v4_conn_request+0x19b/0x240 [ 747.746072][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 747.751098][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 747.756470][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 747.761071][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 747.765563][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 747.771178][ C1] ip_local_deliver+0x62a/0x7c0 [ 747.776151][ C1] ip_rcv+0x6cf/0x750 [ 747.780164][ C1] process_backlog+0xf0b/0x1410 [ 747.785009][ C1] net_rx_action+0x786/0x1aa0 [ 747.789700][ C1] __do_softirq+0x311/0x83d [ 747.796270][ C1] [ 747.798587][ C1] Uninit was stored to memory at: [ 747.803602][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 747.809312][ C1] __msan_chain_origin+0x50/0x90 [ 747.814253][ C1] tcp_conn_request+0x1781/0x4d10 [ 747.819287][ C1] tcp_v4_conn_request+0x19b/0x240 [ 747.824734][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 747.829742][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 747.835101][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 747.839676][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 747.844189][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 747.849646][ C1] ip_local_deliver+0x62a/0x7c0 [ 747.854747][ C1] ip_rcv+0x6cf/0x750 [ 747.858725][ C1] process_backlog+0xf0b/0x1410 [ 747.863573][ C1] net_rx_action+0x786/0x1aa0 [ 747.868237][ C1] __do_softirq+0x311/0x83d [ 747.872719][ C1] [ 747.875034][ C1] Uninit was created at: [ 747.879266][ C1] kmsan_save_stack_with_flags+0x3c/0x90 [ 747.884886][ C1] kmsan_alloc_page+0x12a/0x310 [ 747.889725][ C1] __alloc_pages_nodemask+0x5712/0x5e80 [ 747.895272][ C1] alloc_pages_current+0x67d/0x990 [ 747.900371][ C1] alloc_slab_page+0x111/0x12f0 [ 747.905215][ C1] new_slab+0x2bc/0x1130 [ 747.909445][ C1] ___slab_alloc+0x1533/0x1f30 [ 747.914209][ C1] kmem_cache_alloc+0xb23/0xd70 [ 747.919065][ C1] inet_reqsk_alloc+0xac/0x830 [ 747.923819][ C1] tcp_conn_request+0x753/0x4d10 [ 747.928744][ C1] tcp_v4_conn_request+0x19b/0x240 [ 747.933857][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 747.939225][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 747.943820][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 747.948314][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 747.953763][ C1] ip_local_deliver+0x62a/0x7c0 [ 747.958618][ C1] ip_sublist_rcv+0x11fa/0x13c0 [ 747.963461][ C1] ip_list_rcv+0x8eb/0x950 [ 747.967871][ C1] __netif_receive_skb_list_core+0x1311/0x1380 [ 747.974043][ C1] netif_receive_skb_list_internal+0xf62/0x1620 [ 747.980275][ C1] napi_complete_done+0x2ef/0xb60 [ 747.985466][ C1] virtqueue_napi_complete+0xb9/0x1f0 [ 747.990836][ C1] virtnet_poll+0x1468/0x19f0 [ 747.995519][ C1] net_rx_action+0x786/0x1aa0 [ 748.000192][ C1] __do_softirq+0x311/0x83d 09:44:44 executing program 1: 09:44:44 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x800, 0x0, 0x0) 09:44:44 executing program 0: 09:44:44 executing program 2: 09:44:44 executing program 5: 09:44:44 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:44 executing program 2: 09:44:44 executing program 5: 09:44:44 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x800, 0x0, 0x0) 09:44:45 executing program 0: 09:44:45 executing program 2: 09:44:45 executing program 5: [ 753.703741][ T0] NOHZ: local_softirq_pending 08 [ 753.708904][ T0] NOHZ: local_softirq_pending 08 09:44:48 executing program 1: 09:44:48 executing program 2: 09:44:48 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x1, 0x0, 0x0, 0x0) 09:44:48 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:48 executing program 5: 09:44:48 executing program 0: 09:44:49 executing program 2: 09:44:49 executing program 5: 09:44:49 executing program 0: 09:44:49 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x1, 0x0, 0x0, 0x0) 09:44:49 executing program 0: 09:44:49 executing program 2: [ 756.527485][ C0] not chained 70000 origins [ 756.532260][ C0] CPU: 0 PID: 13684 Comm: kworker/u4:4 Not tainted 5.6.0-rc2-syzkaller #0 [ 756.540945][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 756.551110][ C0] Workqueue: krdsd rds_connect_worker [ 756.556518][ C0] Call Trace: [ 756.559788][ C0] [ 756.562627][ C0] dump_stack+0x1c9/0x220 [ 756.567026][ C0] kmsan_internal_chain_origin+0x6f/0x130 [ 756.572964][ C0] ? xfrm_lookup_route+0x2c1/0x370 [ 756.578076][ C0] ? ip_route_output_flow+0x35a/0x3d0 [ 756.583494][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 756.588707][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 756.593914][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 756.599722][ C0] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 756.606234][ C0] ? tcp_select_initial_window+0x60d/0x6c0 [ 756.612048][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 756.617245][ C0] __msan_chain_origin+0x50/0x90 [ 756.622331][ C0] tcp_openreq_init_rwin+0xc22/0xc80 [ 756.627636][ C0] tcp_conn_request+0x33d7/0x4d10 [ 756.632697][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 756.637904][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 756.643124][ C0] tcp_v4_conn_request+0x19b/0x240 [ 756.648239][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 756.653269][ C0] ? inet6_sk_rx_dst_set+0x3d0/0x3d0 [ 756.658657][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 756.664120][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 756.669795][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 756.675728][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 756.681791][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 756.687003][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 756.691679][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 756.696212][ C0] ? tcp_filter+0xf0/0xf0 [ 756.700527][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 756.705979][ C0] ip_local_deliver+0x62a/0x7c0 [ 756.711439][ C0] ? ip_local_deliver+0x7c0/0x7c0 [ 756.716447][ C0] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 756.722099][ C0] ip_rcv+0x6cf/0x750 [ 756.726085][ C0] ? ip_rcv_core+0x1270/0x1270 [ 756.731172][ C0] ? ip_local_deliver_finish+0x350/0x350 [ 756.736803][ C0] process_backlog+0xf0b/0x1410 [ 756.741648][ C0] ? ip_local_deliver_finish+0x350/0x350 [ 756.747278][ C0] ? rps_trigger_softirq+0x2e0/0x2e0 [ 756.752551][ C0] net_rx_action+0x786/0x1aa0 [ 756.757225][ C0] ? net_tx_action+0xc30/0xc30 [ 756.761992][ C0] __do_softirq+0x311/0x83d [ 756.766502][ C0] do_softirq_own_stack+0x49/0x80 [ 756.771520][ C0] [ 756.774454][ C0] __local_bh_enable_ip+0x184/0x1d0 [ 756.779818][ C0] local_bh_enable+0x36/0x40 [ 756.784612][ C0] ip_finish_output2+0x2115/0x2610 [ 756.789725][ C0] ? ctnetlink_net_exit_batch+0x180/0x180 [ 756.795526][ C0] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 756.801607][ C0] __ip_finish_output+0xaa7/0xd80 [ 756.806640][ C0] ip_finish_output+0x166/0x410 [ 756.811480][ C0] ip_output+0x593/0x680 [ 756.815716][ C0] ? ip_mc_finish_output+0x6c0/0x6c0 [ 756.821001][ C0] ? ip_finish_output+0x410/0x410 [ 756.826031][ C0] __ip_queue_xmit+0x1b5c/0x21a0 [ 756.830976][ C0] ? kmsan_set_origin_checked+0x95/0xf0 [ 756.836543][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 756.841750][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 756.846951][ C0] ip_queue_xmit+0xcc/0xf0 [ 756.851365][ C0] ? tcp_v4_fill_cb+0x580/0x580 [ 756.856217][ C0] __tcp_transmit_skb+0x439c/0x6090 [ 756.861416][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 756.867243][ C0] tcp_connect+0x4337/0x6920 [ 756.871822][ C0] ? __msan_poison_alloca+0xf0/0x120 [ 756.877096][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 756.882321][ C0] tcp_v4_connect+0x21fd/0x2370 [ 756.887200][ C0] ? tcp_twsk_unique+0xba0/0xba0 [ 756.892285][ C0] __inet_stream_connect+0x2fb/0x1340 [ 756.897774][ C0] ? __local_bh_enable_ip+0x97/0x1d0 [ 756.904119][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 756.909312][ C0] inet_stream_connect+0x101/0x180 [ 756.914428][ C0] ? __inet_stream_connect+0x1340/0x1340 [ 756.920162][ C0] rds_tcp_conn_path_connect+0x8a7/0xb80 [ 756.925814][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 756.931022][ C0] ? rds_tcp_state_change+0x390/0x390 [ 756.936408][ C0] rds_connect_worker+0x2a6/0x470 [ 756.941425][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 756.947489][ C0] ? rds_addr_cmp+0x200/0x200 [ 756.952150][ C0] process_one_work+0x1555/0x1f40 [ 756.957198][ C0] worker_thread+0xef6/0x2450 [ 756.961869][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 756.967766][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 756.973010][ C0] kthread+0x4b5/0x4f0 [ 756.977068][ C0] ? process_one_work+0x1f40/0x1f40 [ 756.982527][ C0] ? kthread_blkcg+0xf0/0xf0 [ 756.987498][ C0] ret_from_fork+0x35/0x40 [ 756.991911][ C0] Uninit was stored to memory at: [ 756.997207][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 757.002919][ C0] __msan_chain_origin+0x50/0x90 [ 757.007840][ C0] tcp_conn_request+0x1781/0x4d10 [ 757.012885][ C0] tcp_v4_conn_request+0x19b/0x240 [ 757.017983][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 757.023115][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 757.028473][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 757.033074][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 757.037567][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 757.043165][ C0] ip_local_deliver+0x62a/0x7c0 [ 757.048122][ C0] ip_rcv+0x6cf/0x750 [ 757.052093][ C0] process_backlog+0xf0b/0x1410 [ 757.056948][ C0] net_rx_action+0x786/0x1aa0 [ 757.061639][ C0] __do_softirq+0x311/0x83d [ 757.066134][ C0] [ 757.068447][ C0] Uninit was stored to memory at: [ 757.073468][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 757.079348][ C0] __msan_chain_origin+0x50/0x90 [ 757.084267][ C0] tcp_openreq_init_rwin+0xc22/0xc80 [ 757.089544][ C0] tcp_conn_request+0x33d7/0x4d10 [ 757.094695][ C0] tcp_v4_conn_request+0x19b/0x240 [ 757.099803][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 757.104843][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 757.110204][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 757.114873][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 757.119355][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 757.124794][ C0] ip_local_deliver+0x62a/0x7c0 [ 757.129629][ C0] ip_rcv+0x6cf/0x750 [ 757.133596][ C0] process_backlog+0xf0b/0x1410 [ 757.138425][ C0] net_rx_action+0x786/0x1aa0 [ 757.143080][ C0] __do_softirq+0x311/0x83d [ 757.147568][ C0] [ 757.149980][ C0] Uninit was stored to memory at: [ 757.154996][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 757.160732][ C0] __msan_chain_origin+0x50/0x90 [ 757.166360][ C0] tcp_conn_request+0x1781/0x4d10 [ 757.171365][ C0] tcp_v4_conn_request+0x19b/0x240 [ 757.176453][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 757.181468][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 757.186821][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 757.191392][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 757.195873][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 757.202263][ C0] ip_local_deliver+0x62a/0x7c0 [ 757.207158][ C0] ip_rcv+0x6cf/0x750 [ 757.211117][ C0] process_backlog+0xf0b/0x1410 [ 757.215946][ C0] net_rx_action+0x786/0x1aa0 [ 757.220605][ C0] __do_softirq+0x311/0x83d [ 757.225079][ C0] [ 757.227382][ C0] Uninit was stored to memory at: [ 757.232388][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 757.238086][ C0] __msan_chain_origin+0x50/0x90 [ 757.243010][ C0] tcp_openreq_init_rwin+0xc22/0xc80 [ 757.248275][ C0] tcp_conn_request+0x33d7/0x4d10 [ 757.253276][ C0] tcp_v4_conn_request+0x19b/0x240 [ 757.258366][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 757.263367][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 757.268719][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 757.273285][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 757.277767][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 757.283213][ C0] ip_local_deliver+0x62a/0x7c0 [ 757.288037][ C0] ip_rcv+0x6cf/0x750 [ 757.292086][ C0] process_backlog+0xf0b/0x1410 [ 757.296916][ C0] net_rx_action+0x786/0x1aa0 [ 757.301573][ C0] __do_softirq+0x311/0x83d [ 757.306092][ C0] [ 757.308397][ C0] Uninit was stored to memory at: [ 757.313846][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 757.319543][ C0] __msan_chain_origin+0x50/0x90 [ 757.324471][ C0] tcp_conn_request+0x1781/0x4d10 [ 757.329744][ C0] tcp_v4_conn_request+0x19b/0x240 [ 757.334832][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 757.339841][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 757.345197][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 757.349765][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 757.354250][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 757.360203][ C0] ip_local_deliver+0x62a/0x7c0 [ 757.365035][ C0] ip_rcv+0x6cf/0x750 [ 757.369040][ C0] process_backlog+0xf0b/0x1410 [ 757.373879][ C0] net_rx_action+0x786/0x1aa0 [ 757.378539][ C0] __do_softirq+0x311/0x83d [ 757.383018][ C0] [ 757.386278][ C0] Uninit was stored to memory at: [ 757.391291][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 757.396996][ C0] __msan_chain_origin+0x50/0x90 [ 757.401935][ C0] tcp_openreq_init_rwin+0xc22/0xc80 [ 757.407261][ C0] tcp_conn_request+0x33d7/0x4d10 [ 757.412299][ C0] tcp_v4_conn_request+0x19b/0x240 [ 757.417410][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 757.423167][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 757.428549][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 757.433129][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 757.437613][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 757.443050][ C0] ip_local_deliver+0x62a/0x7c0 [ 757.448834][ C0] ip_rcv+0x6cf/0x750 [ 757.452798][ C0] process_backlog+0xf0b/0x1410 [ 757.457625][ C0] net_rx_action+0x786/0x1aa0 [ 757.462307][ C0] __do_softirq+0x311/0x83d [ 757.466802][ C0] [ 757.469107][ C0] Uninit was stored to memory at: [ 757.474119][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 757.479941][ C0] __msan_chain_origin+0x50/0x90 [ 757.484919][ C0] tcp_conn_request+0x1781/0x4d10 [ 757.489965][ C0] tcp_v4_conn_request+0x19b/0x240 [ 757.495062][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 757.500098][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 757.505473][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 757.510060][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 757.514548][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 757.526293][ C0] ip_local_deliver+0x62a/0x7c0 [ 757.531148][ C0] ip_rcv+0x6cf/0x750 [ 757.535111][ C0] process_backlog+0xf0b/0x1410 [ 757.539937][ C0] net_rx_action+0x786/0x1aa0 [ 757.544605][ C0] __do_softirq+0x311/0x83d [ 757.549088][ C0] [ 757.551403][ C0] Uninit was created at: [ 757.555626][ C0] kmsan_save_stack_with_flags+0x3c/0x90 [ 757.561252][ C0] kmsan_alloc_page+0x12a/0x310 [ 757.566095][ C0] __alloc_pages_nodemask+0x5712/0x5e80 [ 757.571626][ C0] alloc_pages_current+0x67d/0x990 [ 757.576717][ C0] alloc_slab_page+0x111/0x12f0 [ 757.581541][ C0] new_slab+0x2bc/0x1130 [ 757.585761][ C0] ___slab_alloc+0x1533/0x1f30 [ 757.590498][ C0] kmem_cache_alloc+0xb23/0xd70 [ 757.595476][ C0] inet_reqsk_alloc+0xac/0x830 [ 757.600228][ C0] tcp_conn_request+0x753/0x4d10 [ 757.605201][ C0] tcp_v4_conn_request+0x19b/0x240 [ 757.610313][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 757.615667][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 757.620241][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 757.624784][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 757.630242][ C0] ip_local_deliver+0x62a/0x7c0 [ 757.635073][ C0] ip_sublist_rcv+0x11fa/0x13c0 [ 757.639922][ C0] ip_list_rcv+0x8eb/0x950 [ 757.644332][ C0] __netif_receive_skb_list_core+0x1311/0x1380 [ 757.650469][ C0] netif_receive_skb_list_internal+0xf62/0x1620 [ 757.656709][ C0] napi_complete_done+0x2ef/0xb60 [ 757.661897][ C0] virtqueue_napi_complete+0xb9/0x1f0 [ 757.667275][ C0] virtnet_poll+0x1468/0x19f0 [ 757.671940][ C0] net_rx_action+0x786/0x1aa0 [ 757.676599][ C0] __do_softirq+0x311/0x83d 09:44:53 executing program 1: 09:44:53 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r2}, [@IFLA_GTP_FD1={0x8, 0x4}]}}}}]}, 0x48}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x1, 0x0, 0x0, 0x0) 09:44:53 executing program 5: 09:44:53 executing program 0: 09:44:53 executing program 2: 09:44:53 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x5eb05a) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:54 executing program 2: 09:44:54 executing program 5: 09:44:54 executing program 0: 09:44:54 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x5eb05a) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:54 executing program 3: 09:44:54 executing program 0: 09:44:58 executing program 1: 09:44:58 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x5eb05a) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:58 executing program 0: 09:44:58 executing program 3: 09:44:58 executing program 2: 09:44:58 executing program 5: 09:44:58 executing program 0: 09:44:58 executing program 3: 09:44:58 executing program 2: 09:44:58 executing program 5: 09:44:58 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:44:59 executing program 5: [ 766.039277][ C1] not chained 80000 origins [ 766.044521][ C1] CPU: 1 PID: 13681 Comm: kworker/u4:3 Not tainted 5.6.0-rc2-syzkaller #0 [ 766.053012][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 766.063072][ C1] Workqueue: krdsd rds_connect_worker [ 766.068467][ C1] Call Trace: [ 766.071777][ C1] [ 766.074653][ C1] dump_stack+0x1c9/0x220 [ 766.078995][ C1] kmsan_internal_chain_origin+0x6f/0x130 [ 766.084716][ C1] ? should_fail+0x72/0x9e0 [ 766.089231][ C1] ? ret_from_fork+0x35/0x40 [ 766.093826][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 766.099898][ C1] ? arch_stack_walk+0x34c/0x3e0 [ 766.104835][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 766.110119][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 766.115314][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 766.121634][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 766.126739][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 766.132543][ C1] ? __msan_metadata_ptr_for_store_2+0x13/0x20 [ 766.138706][ C1] ? tcp_parse_options+0x1ada/0x1b90 [ 766.144001][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 766.149296][ C1] __msan_chain_origin+0x50/0x90 [ 766.154236][ C1] tcp_conn_request+0x1781/0x4d10 [ 766.159282][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 766.164472][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 766.169655][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 766.175448][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 766.180644][ C1] tcp_v4_conn_request+0x19b/0x240 [ 766.185754][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 766.190770][ C1] ? inet6_sk_rx_dst_set+0x3d0/0x3d0 [ 766.196053][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 766.201429][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 766.206621][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 766.212430][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 766.218508][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 766.223698][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 766.228398][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 766.232970][ C1] ? tcp_filter+0xf0/0xf0 [ 766.237359][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 766.242812][ C1] ip_local_deliver+0x62a/0x7c0 [ 766.247662][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 766.252682][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 766.258319][ C1] ip_rcv+0x6cf/0x750 [ 766.262292][ C1] ? ip_rcv_core+0x1270/0x1270 [ 766.267062][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 766.272686][ C1] process_backlog+0xf0b/0x1410 [ 766.277547][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 766.283603][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 766.288870][ C1] net_rx_action+0x786/0x1aa0 [ 766.293565][ C1] ? net_tx_action+0xc30/0xc30 [ 766.298328][ C1] __do_softirq+0x311/0x83d [ 766.302840][ C1] do_softirq_own_stack+0x49/0x80 [ 766.307865][ C1] [ 766.310788][ C1] __local_bh_enable_ip+0x184/0x1d0 [ 766.316852][ C1] local_bh_enable+0x36/0x40 [ 766.321435][ C1] ip_finish_output2+0x2115/0x2610 [ 766.326536][ C1] ? ctnetlink_net_exit_batch+0x180/0x180 [ 766.332250][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 766.338238][ C1] __ip_finish_output+0xaa7/0xd80 [ 766.343262][ C1] ip_finish_output+0x166/0x410 [ 766.348096][ C1] ip_output+0x593/0x680 [ 766.352357][ C1] ? ip_mc_finish_output+0x6c0/0x6c0 [ 766.357638][ C1] ? ip_finish_output+0x410/0x410 [ 766.362642][ C1] __ip_queue_xmit+0x1b5c/0x21a0 [ 766.367571][ C1] ? kmsan_set_origin_checked+0x95/0xf0 [ 766.373202][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 766.378470][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 766.383922][ C1] ip_queue_xmit+0xcc/0xf0 [ 766.388327][ C1] ? tcp_v4_fill_cb+0x580/0x580 [ 766.393171][ C1] __tcp_transmit_skb+0x439c/0x6090 [ 766.398364][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 766.404175][ C1] tcp_connect+0x4337/0x6920 [ 766.408749][ C1] ? __msan_poison_alloca+0xf0/0x120 [ 766.414033][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 766.419251][ C1] tcp_v4_connect+0x21fd/0x2370 [ 766.424116][ C1] ? tcp_twsk_unique+0xba0/0xba0 [ 766.429038][ C1] __inet_stream_connect+0x2fb/0x1340 [ 766.438391][ C1] ? __local_bh_enable_ip+0x97/0x1d0 [ 766.444633][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 766.449830][ C1] inet_stream_connect+0x101/0x180 [ 766.454949][ C1] ? __inet_stream_connect+0x1340/0x1340 [ 766.460579][ C1] rds_tcp_conn_path_connect+0x8a7/0xb80 [ 766.466906][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 766.472176][ C1] ? rds_tcp_state_change+0x390/0x390 [ 766.477537][ C1] rds_connect_worker+0x2a6/0x470 [ 766.482556][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 766.488640][ C1] ? rds_addr_cmp+0x200/0x200 [ 766.493321][ C1] process_one_work+0x1555/0x1f40 [ 766.498353][ C1] worker_thread+0xef6/0x2450 [ 766.503023][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 766.508821][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 766.514655][ C1] kthread+0x4b5/0x4f0 [ 766.518729][ C1] ? process_one_work+0x1f40/0x1f40 [ 766.523921][ C1] ? kthread_blkcg+0xf0/0xf0 [ 766.528503][ C1] ret_from_fork+0x35/0x40 [ 766.532952][ C1] Uninit was stored to memory at: [ 766.538040][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 766.543845][ C1] __msan_chain_origin+0x50/0x90 [ 766.548782][ C1] tcp_conn_request+0x1781/0x4d10 [ 766.553810][ C1] tcp_v4_conn_request+0x19b/0x240 [ 766.559699][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 766.564712][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 766.570061][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 766.574645][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 766.579138][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 766.584587][ C1] ip_local_deliver+0x62a/0x7c0 [ 766.589411][ C1] ip_rcv+0x6cf/0x750 [ 766.593385][ C1] process_backlog+0xf0b/0x1410 [ 766.598245][ C1] net_rx_action+0x786/0x1aa0 [ 766.602902][ C1] __do_softirq+0x311/0x83d [ 766.607388][ C1] [ 766.609693][ C1] Uninit was stored to memory at: [ 766.614708][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 766.620416][ C1] __msan_chain_origin+0x50/0x90 [ 766.625334][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 766.630594][ C1] tcp_conn_request+0x33d7/0x4d10 [ 766.635610][ C1] tcp_v4_conn_request+0x19b/0x240 [ 766.640709][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 766.645714][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 766.651081][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 766.655654][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 766.660149][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 766.665620][ C1] ip_local_deliver+0x62a/0x7c0 [ 766.670460][ C1] ip_rcv+0x6cf/0x750 [ 766.674448][ C1] process_backlog+0xf0b/0x1410 [ 766.679306][ C1] net_rx_action+0x786/0x1aa0 [ 766.683971][ C1] __do_softirq+0x311/0x83d [ 766.688451][ C1] [ 766.690756][ C1] Uninit was stored to memory at: [ 766.695762][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 766.701461][ C1] __msan_chain_origin+0x50/0x90 [ 766.706377][ C1] tcp_conn_request+0x1781/0x4d10 [ 766.711504][ C1] tcp_v4_conn_request+0x19b/0x240 [ 766.716598][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 766.721601][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 766.727104][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 766.731679][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 766.736180][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 766.741626][ C1] ip_local_deliver+0x62a/0x7c0 [ 766.746453][ C1] ip_rcv+0x6cf/0x750 [ 766.750432][ C1] process_backlog+0xf0b/0x1410 [ 766.755283][ C1] net_rx_action+0x786/0x1aa0 [ 766.759947][ C1] __do_softirq+0x311/0x83d [ 766.765083][ C1] [ 766.767392][ C1] Uninit was stored to memory at: [ 766.773366][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 766.779079][ C1] __msan_chain_origin+0x50/0x90 [ 766.784016][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 766.789279][ C1] tcp_conn_request+0x33d7/0x4d10 [ 766.794299][ C1] tcp_v4_conn_request+0x19b/0x240 [ 766.799415][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 766.804431][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 766.809785][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 766.814370][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 766.818870][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 766.824310][ C1] ip_local_deliver+0x62a/0x7c0 [ 766.829137][ C1] ip_rcv+0x6cf/0x750 [ 766.833119][ C1] process_backlog+0xf0b/0x1410 [ 766.838053][ C1] net_rx_action+0x786/0x1aa0 [ 766.842711][ C1] __do_softirq+0x311/0x83d [ 766.847191][ C1] [ 766.849503][ C1] Uninit was stored to memory at: [ 766.855052][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 766.860771][ C1] __msan_chain_origin+0x50/0x90 [ 766.865700][ C1] tcp_conn_request+0x1781/0x4d10 [ 766.870715][ C1] tcp_v4_conn_request+0x19b/0x240 [ 766.875815][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 766.881034][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 766.886395][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 766.890976][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 766.895474][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 766.900941][ C1] ip_local_deliver+0x62a/0x7c0 [ 766.905775][ C1] ip_rcv+0x6cf/0x750 [ 766.909755][ C1] process_backlog+0xf0b/0x1410 [ 766.914603][ C1] net_rx_action+0x786/0x1aa0 [ 766.919276][ C1] __do_softirq+0x311/0x83d [ 766.923759][ C1] [ 766.926785][ C1] Uninit was stored to memory at: [ 766.931793][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 766.937512][ C1] __msan_chain_origin+0x50/0x90 [ 766.942450][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 766.948438][ C1] tcp_conn_request+0x33d7/0x4d10 [ 766.953463][ C1] tcp_v4_conn_request+0x19b/0x240 [ 766.958564][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 766.963579][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 766.969067][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 766.973652][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 766.978152][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 766.983593][ C1] ip_local_deliver+0x62a/0x7c0 [ 766.988424][ C1] ip_rcv+0x6cf/0x750 [ 766.992400][ C1] process_backlog+0xf0b/0x1410 [ 766.997616][ C1] net_rx_action+0x786/0x1aa0 [ 767.003231][ C1] __do_softirq+0x311/0x83d [ 767.007704][ C1] [ 767.010015][ C1] Uninit was stored to memory at: [ 767.018157][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 767.023859][ C1] __msan_chain_origin+0x50/0x90 [ 767.028788][ C1] tcp_conn_request+0x1781/0x4d10 [ 767.033813][ C1] tcp_v4_conn_request+0x19b/0x240 [ 767.038937][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 767.044445][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 767.049825][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 767.054405][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 767.058916][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 767.064374][ C1] ip_local_deliver+0x62a/0x7c0 [ 767.069212][ C1] ip_rcv+0x6cf/0x750 [ 767.074041][ C1] process_backlog+0xf0b/0x1410 [ 767.078900][ C1] net_rx_action+0x786/0x1aa0 [ 767.083610][ C1] __do_softirq+0x311/0x83d [ 767.088347][ C1] [ 767.090652][ C1] Uninit was created at: [ 767.094887][ C1] kmsan_save_stack_with_flags+0x3c/0x90 [ 767.100515][ C1] kmsan_alloc_page+0x12a/0x310 [ 767.105352][ C1] __alloc_pages_nodemask+0x5712/0x5e80 [ 767.110877][ C1] alloc_pages_current+0x67d/0x990 [ 767.116839][ C1] alloc_slab_page+0x111/0x12f0 [ 767.121823][ C1] new_slab+0x2bc/0x1130 [ 767.126065][ C1] ___slab_alloc+0x1533/0x1f30 [ 767.130808][ C1] kmem_cache_alloc+0xb23/0xd70 [ 767.135641][ C1] inet_reqsk_alloc+0xac/0x830 [ 767.140387][ C1] tcp_conn_request+0x753/0x4d10 [ 767.145317][ C1] tcp_v4_conn_request+0x19b/0x240 [ 767.150409][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 767.155774][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 767.160344][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 767.164889][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 767.170335][ C1] ip_local_deliver+0x62a/0x7c0 [ 767.175186][ C1] ip_sublist_rcv+0x11fa/0x13c0 [ 767.180075][ C1] ip_list_rcv+0x8eb/0x950 [ 767.184485][ C1] __netif_receive_skb_list_core+0x1311/0x1380 [ 767.190622][ C1] netif_receive_skb_list_internal+0xf62/0x1620 [ 767.196846][ C1] napi_complete_done+0x2ef/0xb60 [ 767.201863][ C1] virtqueue_napi_complete+0xb9/0x1f0 [ 767.207233][ C1] virtnet_poll+0x1468/0x19f0 [ 767.211903][ C1] net_rx_action+0x786/0x1aa0 [ 767.216567][ C1] __do_softirq+0x311/0x83d 09:45:03 executing program 1: 09:45:03 executing program 3: 09:45:03 executing program 0: 09:45:03 executing program 2: 09:45:03 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:45:03 executing program 5: 09:45:03 executing program 2: 09:45:03 executing program 3: 09:45:03 executing program 0: 09:45:03 executing program 5: 09:45:03 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:45:04 executing program 3: 09:45:07 executing program 1: 09:45:07 executing program 5: 09:45:07 executing program 2: 09:45:07 executing program 0: 09:45:07 executing program 3: 09:45:07 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:45:08 executing program 3: 09:45:08 executing program 0: 09:45:08 executing program 2: 09:45:08 executing program 5: 09:45:08 executing program 3: 09:45:08 executing program 2: [ 776.117723][ T0] NOHZ: local_softirq_pending 08 [ 776.867631][ C1] not chained 90000 origins [ 776.872183][ C1] CPU: 1 PID: 305 Comm: kworker/u4:14 Not tainted 5.6.0-rc2-syzkaller #0 [ 776.880770][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.890878][ C1] Workqueue: krdsd rds_tcp_accept_worker [ 776.896491][ C1] Call Trace: [ 776.899754][ C1] [ 776.902611][ C1] dump_stack+0x1c9/0x220 [ 776.907045][ C1] kmsan_internal_chain_origin+0x6f/0x130 [ 776.912753][ C1] ? tcp_fin+0x1f9/0x890 [ 776.916976][ C1] ? tcp_data_queue+0x24ce/0x9c40 [ 776.921998][ C1] ? tcp_rcv_state_process+0x67db/0x7140 [ 776.928051][ C1] ? tcp_v4_do_rcv+0xb0f/0xd70 [ 776.932816][ C1] ? tcp_v4_rcv+0x4398/0x4d00 [ 776.937473][ C1] ? ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 776.943099][ C1] ? ip_local_deliver+0x62a/0x7c0 [ 776.948116][ C1] ? ip_rcv+0x6cf/0x750 [ 776.952264][ C1] ? process_backlog+0xf0b/0x1410 [ 776.957284][ C1] ? net_rx_action+0x786/0x1aa0 [ 776.962114][ C1] ? __do_softirq+0x311/0x83d [ 776.966772][ C1] ? do_softirq_own_stack+0x49/0x80 [ 776.971961][ C1] ? kmsan_internal_chain_origin+0x30/0x130 [ 776.977846][ C1] ? ip_finish_output2+0x2115/0x2610 [ 776.983121][ C1] ? __ip_finish_output+0xaa7/0xd80 [ 776.988334][ C1] ? ip_finish_output+0x166/0x410 [ 776.993354][ C1] ? ip_output+0x593/0x680 [ 776.997762][ C1] ? __ip_queue_xmit+0x1b5c/0x21a0 [ 777.002860][ C1] ? ip_queue_xmit+0xcc/0xf0 [ 777.007441][ C1] ? __tcp_transmit_skb+0x439c/0x6090 [ 777.012803][ C1] ? tcp_write_xmit+0x30e1/0xb470 [ 777.017829][ C1] ? __tcp_push_pending_frames+0x124/0x4e0 [ 777.023639][ C1] ? tcp_send_fin+0x131e/0x1570 [ 777.028496][ C1] ? tcp_shutdown+0x188/0x200 [ 777.033721][ C1] ? inet_shutdown+0x342/0x5e0 [ 777.038476][ C1] ? kernel_sock_shutdown+0x9d/0xc0 [ 777.043678][ C1] ? rds_tcp_accept_one+0xe17/0x1060 [ 777.048965][ C1] ? rds_tcp_accept_worker+0x61/0x160 [ 777.055018][ C1] ? process_one_work+0x1555/0x1f40 [ 777.060206][ C1] ? worker_thread+0xef6/0x2450 [ 777.065062][ C1] ? kthread+0x4b5/0x4f0 [ 777.069645][ C1] ? ret_from_fork+0x35/0x40 [ 777.074249][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 777.079426][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 777.085227][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 777.091287][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 777.096485][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 777.102819][ C1] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 777.109095][ C1] ? __msan_get_context_state+0x9/0x20 [ 777.114547][ C1] ? __module_get+0x19/0x230 [ 777.119140][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 777.124339][ C1] __msan_chain_origin+0x50/0x90 [ 777.129279][ C1] __inet_twsk_schedule+0x24e/0x2c0 [ 777.134476][ C1] tcp_time_wait+0xaca/0x10b0 [ 777.139158][ C1] tcp_fin+0x1f9/0x890 [ 777.143228][ C1] tcp_data_queue+0x24ce/0x9c40 [ 777.148093][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 777.153953][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 777.160033][ C1] tcp_rcv_state_process+0x67db/0x7140 [ 777.165832][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 777.171041][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 777.176231][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 777.180956][ C1] tcp_v4_rcv+0x4398/0x4d00 [ 777.185497][ C1] ? tcp_filter+0xf0/0xf0 [ 777.189811][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 777.195260][ C1] ip_local_deliver+0x62a/0x7c0 [ 777.200116][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 777.206105][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 777.211750][ C1] ip_rcv+0x6cf/0x750 [ 777.216865][ C1] ? ip_rcv_core+0x1270/0x1270 [ 777.221610][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 777.227254][ C1] process_backlog+0xf0b/0x1410 [ 777.232101][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 777.237726][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 777.243004][ C1] net_rx_action+0x786/0x1aa0 [ 777.247689][ C1] ? net_tx_action+0xc30/0xc30 [ 777.252447][ C1] __do_softirq+0x311/0x83d [ 777.256939][ C1] do_softirq_own_stack+0x49/0x80 [ 777.261934][ C1] [ 777.264894][ C1] __local_bh_enable_ip+0x184/0x1d0 [ 777.270103][ C1] local_bh_enable+0x36/0x40 [ 777.274795][ C1] ip_finish_output2+0x2115/0x2610 [ 777.280595][ C1] ? ctnetlink_net_exit_batch+0x180/0x180 [ 777.286311][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 777.292465][ C1] __ip_finish_output+0xaa7/0xd80 [ 777.297514][ C1] ip_finish_output+0x166/0x410 [ 777.302372][ C1] ip_output+0x593/0x680 [ 777.306616][ C1] ? ip_mc_finish_output+0x6c0/0x6c0 [ 777.311878][ C1] ? ip_finish_output+0x410/0x410 [ 777.316884][ C1] __ip_queue_xmit+0x1b5c/0x21a0 [ 777.321814][ C1] ? kmsan_set_origin_checked+0x95/0xf0 [ 777.327353][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 777.332550][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 777.337744][ C1] ip_queue_xmit+0xcc/0xf0 [ 777.342154][ C1] ? tcp_v6_send_response+0x2920/0x2920 [ 777.347693][ C1] __tcp_transmit_skb+0x439c/0x6090 [ 777.352914][ C1] tcp_write_xmit+0x30e1/0xb470 [ 777.357793][ C1] __tcp_push_pending_frames+0x124/0x4e0 [ 777.363429][ C1] tcp_send_fin+0x131e/0x1570 [ 777.368116][ C1] tcp_shutdown+0x188/0x200 [ 777.372613][ C1] ? tcp_set_state+0x9d0/0x9d0 [ 777.377368][ C1] inet_shutdown+0x342/0x5e0 [ 777.381943][ C1] ? inet_recvmsg+0x7d0/0x7d0 [ 777.386607][ C1] kernel_sock_shutdown+0x9d/0xc0 [ 777.391631][ C1] rds_tcp_accept_one+0xe17/0x1060 [ 777.396726][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 777.402003][ C1] rds_tcp_accept_worker+0x61/0x160 [ 777.407207][ C1] ? rds_tcp_exit_net+0xcb0/0xcb0 [ 777.412227][ C1] process_one_work+0x1555/0x1f40 [ 777.417337][ C1] worker_thread+0xef6/0x2450 [ 777.422037][ C1] kthread+0x4b5/0x4f0 [ 777.426102][ C1] ? process_one_work+0x1f40/0x1f40 [ 777.431318][ C1] ? kthread_blkcg+0xf0/0xf0 [ 777.435902][ C1] ret_from_fork+0x35/0x40 [ 777.440323][ C1] Uninit was stored to memory at: [ 777.445353][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 777.451079][ C1] __msan_chain_origin+0x50/0x90 [ 777.456013][ C1] inet_twsk_alloc+0xab6/0xba0 [ 777.460773][ C1] tcp_time_wait+0xcd/0x10b0 [ 777.465357][ C1] tcp_fin+0x1f9/0x890 [ 777.469416][ C1] tcp_data_queue+0x24ce/0x9c40 [ 777.474244][ C1] tcp_rcv_state_process+0x67db/0x7140 [ 777.479680][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 777.484950][ C1] tcp_v4_rcv+0x4398/0x4d00 [ 777.489441][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 777.494889][ C1] ip_local_deliver+0x62a/0x7c0 [ 777.500677][ C1] ip_rcv+0x6cf/0x750 [ 777.504664][ C1] process_backlog+0xf0b/0x1410 [ 777.509514][ C1] net_rx_action+0x786/0x1aa0 [ 777.514236][ C1] __do_softirq+0x311/0x83d [ 777.518721][ C1] [ 777.521031][ C1] Uninit was stored to memory at: [ 777.526040][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 777.531754][ C1] __msan_chain_origin+0x50/0x90 [ 777.536683][ C1] __inet_twsk_schedule+0x24e/0x2c0 [ 777.542006][ C1] tcp_time_wait+0xaca/0x10b0 [ 777.546665][ C1] tcp_fin+0x1f9/0x890 [ 777.551321][ C1] tcp_data_queue+0x24ce/0x9c40 [ 777.556151][ C1] tcp_rcv_state_process+0x67db/0x7140 [ 777.561594][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 777.566195][ C1] tcp_v4_rcv+0x4398/0x4d00 [ 777.570678][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 777.576118][ C1] ip_local_deliver+0x62a/0x7c0 [ 777.580943][ C1] ip_rcv+0x6cf/0x750 [ 777.584925][ C1] process_backlog+0xf0b/0x1410 [ 777.589764][ C1] net_rx_action+0x786/0x1aa0 [ 777.594431][ C1] __do_softirq+0x311/0x83d [ 777.598905][ C1] [ 777.601211][ C1] Uninit was stored to memory at: [ 777.606231][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 777.611933][ C1] __msan_chain_origin+0x50/0x90 [ 777.617814][ C1] tcp_time_wait+0xb7e/0x10b0 [ 777.622475][ C1] tcp_fin+0x1f9/0x890 [ 777.626530][ C1] tcp_data_queue+0x24ce/0x9c40 [ 777.631356][ C1] tcp_rcv_state_process+0x67db/0x7140 [ 777.636879][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 777.641461][ C1] tcp_v4_rcv+0x4398/0x4d00 [ 777.645958][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 777.652032][ C1] ip_local_deliver+0x62a/0x7c0 [ 777.656865][ C1] ip_rcv+0x6cf/0x750 [ 777.660851][ C1] process_backlog+0xf0b/0x1410 [ 777.665689][ C1] net_rx_action+0x786/0x1aa0 [ 777.670351][ C1] __do_softirq+0x311/0x83d [ 777.674827][ C1] [ 777.677130][ C1] Uninit was stored to memory at: [ 777.682142][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 777.688723][ C1] __msan_chain_origin+0x50/0x90 [ 777.693747][ C1] inet_twsk_alloc+0xab6/0xba0 [ 777.698490][ C1] tcp_time_wait+0xcd/0x10b0 [ 777.703072][ C1] tcp_fin+0x1f9/0x890 [ 777.707131][ C1] tcp_data_queue+0x24ce/0x9c40 [ 777.711964][ C1] tcp_rcv_state_process+0x67db/0x7140 [ 777.717415][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 777.721984][ C1] tcp_v4_rcv+0x4398/0x4d00 [ 777.726468][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 777.731904][ C1] ip_local_deliver+0x62a/0x7c0 [ 777.736739][ C1] ip_rcv+0x6cf/0x750 [ 777.740700][ C1] process_backlog+0xf0b/0x1410 [ 777.745530][ C1] net_rx_action+0x786/0x1aa0 [ 777.750182][ C1] __do_softirq+0x311/0x83d [ 777.754660][ C1] [ 777.756974][ C1] Uninit was stored to memory at: [ 777.761975][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 777.767676][ C1] __msan_chain_origin+0x50/0x90 [ 777.772594][ C1] __inet_twsk_schedule+0x24e/0x2c0 [ 777.777771][ C1] tcp_time_wait+0xaca/0x10b0 [ 777.782430][ C1] tcp_fin+0x1f9/0x890 [ 777.786485][ C1] tcp_data_queue+0x24ce/0x9c40 [ 777.791309][ C1] tcp_rcv_state_process+0x67db/0x7140 [ 777.796744][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 777.801308][ C1] tcp_v4_rcv+0x4398/0x4d00 [ 777.805801][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 777.811247][ C1] ip_local_deliver+0x62a/0x7c0 [ 777.816084][ C1] ip_rcv+0x6cf/0x750 [ 777.820058][ C1] process_backlog+0xf0b/0x1410 [ 777.824897][ C1] net_rx_action+0x786/0x1aa0 [ 777.829566][ C1] __do_softirq+0x311/0x83d [ 777.834049][ C1] [ 777.836354][ C1] Uninit was stored to memory at: [ 777.841358][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 777.847070][ C1] __msan_chain_origin+0x50/0x90 [ 777.851986][ C1] tcp_time_wait+0xb7e/0x10b0 [ 777.857439][ C1] tcp_fin+0x1f9/0x890 [ 777.861554][ C1] tcp_data_queue+0x24ce/0x9c40 [ 777.866420][ C1] tcp_rcv_state_process+0x67db/0x7140 [ 777.871895][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 777.876469][ C1] tcp_v4_rcv+0x4398/0x4d00 [ 777.880951][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 777.886397][ C1] ip_local_deliver+0x62a/0x7c0 [ 777.891229][ C1] ip_rcv+0x6cf/0x750 [ 777.895197][ C1] process_backlog+0xf0b/0x1410 [ 777.900031][ C1] net_rx_action+0x786/0x1aa0 [ 777.904699][ C1] __do_softirq+0x311/0x83d [ 777.909189][ C1] [ 777.911506][ C1] Uninit was stored to memory at: [ 777.916510][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 777.922205][ C1] __msan_chain_origin+0x50/0x90 [ 777.927128][ C1] inet_twsk_alloc+0xab6/0xba0 [ 777.932208][ C1] tcp_time_wait+0xcd/0x10b0 [ 777.936840][ C1] tcp_fin+0x1f9/0x890 [ 777.940907][ C1] tcp_data_queue+0x24ce/0x9c40 [ 777.945887][ C1] tcp_rcv_state_process+0x67db/0x7140 [ 777.951354][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 777.955949][ C1] tcp_v4_rcv+0x4398/0x4d00 [ 777.960444][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 777.965892][ C1] ip_local_deliver+0x62a/0x7c0 [ 777.970738][ C1] ip_rcv+0x6cf/0x750 [ 777.974811][ C1] process_backlog+0xf0b/0x1410 [ 777.979664][ C1] net_rx_action+0x786/0x1aa0 [ 777.984343][ C1] __do_softirq+0x311/0x83d [ 777.988834][ C1] [ 777.991157][ C1] Uninit was created at: [ 777.995397][ C1] kmsan_save_stack_with_flags+0x3c/0x90 [ 778.005087][ C1] kmsan_alloc_page+0x12a/0x310 [ 778.010623][ C1] __alloc_pages_nodemask+0x5712/0x5e80 [ 778.016152][ C1] alloc_pages_current+0x67d/0x990 [ 778.021238][ C1] alloc_slab_page+0x111/0x12f0 [ 778.026073][ C1] new_slab+0x2bc/0x1130 [ 778.030305][ C1] ___slab_alloc+0x1533/0x1f30 [ 778.035053][ C1] kmem_cache_alloc+0xb23/0xd70 [ 778.039892][ C1] inet_twsk_alloc+0x135/0xba0 [ 778.044991][ C1] tcp_time_wait+0xcd/0x10b0 [ 778.049597][ C1] tcp_fin+0x1f9/0x890 [ 778.053658][ C1] tcp_data_queue+0x24ce/0x9c40 [ 778.058509][ C1] tcp_rcv_state_process+0x67db/0x7140 [ 778.063963][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 778.068665][ C1] tcp_v4_rcv+0x4398/0x4d00 09:45:12 executing program 1: 09:45:12 executing program 0: 09:45:12 executing program 5: 09:45:12 executing program 2: 09:45:12 executing program 3: 09:45:12 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 778.073170][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 778.078753][ C1] ip_local_deliver+0x62a/0x7c0 [ 778.083599][ C1] ip_rcv+0x6cf/0x750 [ 778.087573][ C1] process_backlog+0xf0b/0x1410 [ 778.092425][ C1] net_rx_action+0x786/0x1aa0 [ 778.097105][ C1] __do_softirq+0x311/0x83d 09:45:12 executing program 2: 09:45:12 executing program 5: 09:45:12 executing program 3: 09:45:12 executing program 0: 09:45:12 executing program 2: 09:45:12 executing program 5: 09:45:16 executing program 1: 09:45:16 executing program 2: 09:45:16 executing program 5: 09:45:16 executing program 0: 09:45:16 executing program 3: 09:45:16 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:45:16 executing program 5: 09:45:16 executing program 2: 09:45:16 executing program 3: 09:45:16 executing program 0: 09:45:17 executing program 5: 09:45:17 executing program 3: 09:45:20 executing program 1: 09:45:20 executing program 2: 09:45:20 executing program 0: 09:45:20 executing program 3: 09:45:20 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:45:20 executing program 5: 09:45:21 executing program 5: 09:45:21 executing program 0: 09:45:21 executing program 3: 09:45:21 executing program 2: 09:45:21 executing program 3: 09:45:21 executing program 0: [ 789.225820][ C1] not chained 100000 origins [ 789.230519][ C1] CPU: 1 PID: 13684 Comm: kworker/u4:4 Not tainted 5.6.0-rc2-syzkaller #0 [ 789.239061][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 789.249116][ C1] Workqueue: krdsd rds_connect_worker [ 789.254472][ C1] Call Trace: [ 789.257748][ C1] [ 789.260591][ C1] dump_stack+0x1c9/0x220 [ 789.265700][ C1] kmsan_internal_chain_origin+0x6f/0x130 [ 789.271421][ C1] ? should_fail+0x72/0x9e0 [ 789.275925][ C1] ? ret_from_fork+0x35/0x40 [ 789.280509][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 789.286562][ C1] ? arch_stack_walk+0x34c/0x3e0 [ 789.291494][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 789.296957][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 789.302147][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 789.307936][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 789.313075][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 789.318925][ C1] ? __msan_metadata_ptr_for_store_2+0x13/0x20 [ 789.325076][ C1] ? tcp_parse_options+0x1ada/0x1b90 [ 789.331258][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 789.336459][ C1] __msan_chain_origin+0x50/0x90 [ 789.341384][ C1] tcp_conn_request+0x13ce/0x4d10 [ 789.346398][ C1] ? rb_first+0x31/0x100 [ 789.350639][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 789.355928][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 789.361123][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 789.366319][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 789.372128][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 789.377312][ C1] tcp_v4_conn_request+0x19b/0x240 [ 789.382407][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 789.387518][ C1] ? inet6_sk_rx_dst_set+0x3d0/0x3d0 [ 789.392793][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 789.398153][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 789.403350][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 789.409145][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 789.415203][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 789.420390][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 789.424992][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 789.429504][ C1] ? tcp_filter+0xf0/0xf0 [ 789.433815][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 789.439347][ C1] ip_local_deliver+0x62a/0x7c0 [ 789.444200][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 789.449215][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 789.456569][ C1] ip_rcv+0x6cf/0x750 [ 789.460550][ C1] ? ip_rcv_core+0x1270/0x1270 [ 789.465308][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 789.470921][ C1] process_backlog+0xf0b/0x1410 [ 789.476902][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 789.482538][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 789.487812][ C1] net_rx_action+0x786/0x1aa0 [ 789.493224][ C1] ? net_tx_action+0xc30/0xc30 [ 789.497995][ C1] __do_softirq+0x311/0x83d [ 789.502500][ C1] do_softirq_own_stack+0x49/0x80 [ 789.507517][ C1] [ 789.510448][ C1] __local_bh_enable_ip+0x184/0x1d0 [ 789.515634][ C1] local_bh_enable+0x36/0x40 [ 789.520208][ C1] ip_finish_output2+0x2115/0x2610 [ 789.525313][ C1] ? ctnetlink_net_exit_batch+0x180/0x180 [ 789.531041][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 789.537068][ C1] __ip_finish_output+0xaa7/0xd80 [ 789.542110][ C1] ip_finish_output+0x166/0x410 [ 789.546955][ C1] ip_output+0x593/0x680 [ 789.551205][ C1] ? ip_mc_finish_output+0x6c0/0x6c0 [ 789.556487][ C1] ? ip_finish_output+0x410/0x410 [ 789.561492][ C1] __ip_queue_xmit+0x1b5c/0x21a0 [ 789.566413][ C1] ? kmsan_set_origin_checked+0x95/0xf0 [ 789.571943][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 789.577132][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 789.582353][ C1] ip_queue_xmit+0xcc/0xf0 [ 789.586772][ C1] ? tcp_v4_fill_cb+0x580/0x580 [ 789.591605][ C1] __tcp_transmit_skb+0x439c/0x6090 [ 789.596791][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 789.602605][ C1] tcp_connect+0x4337/0x6920 [ 789.607193][ C1] ? __msan_poison_alloca+0xf0/0x120 [ 789.615350][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 789.620546][ C1] tcp_v4_connect+0x21fd/0x2370 [ 789.625404][ C1] ? tcp_twsk_unique+0xba0/0xba0 [ 789.630362][ C1] __inet_stream_connect+0x2fb/0x1340 [ 789.635720][ C1] ? __local_bh_enable_ip+0x97/0x1d0 [ 789.641000][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 789.646197][ C1] inet_stream_connect+0x101/0x180 [ 789.651318][ C1] ? __inet_stream_connect+0x1340/0x1340 [ 789.656935][ C1] rds_tcp_conn_path_connect+0x8a7/0xb80 [ 789.662559][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 789.667752][ C1] ? rds_tcp_state_change+0x390/0x390 [ 789.673108][ C1] rds_connect_worker+0x2a6/0x470 [ 789.678113][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 789.684235][ C1] ? rds_addr_cmp+0x200/0x200 [ 789.690044][ C1] process_one_work+0x1555/0x1f40 [ 789.695090][ C1] worker_thread+0xef6/0x2450 [ 789.699756][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 789.705565][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 789.710918][ C1] kthread+0x4b5/0x4f0 [ 789.714976][ C1] ? process_one_work+0x1f40/0x1f40 [ 789.720177][ C1] ? kthread_blkcg+0xf0/0xf0 [ 789.724854][ C1] ret_from_fork+0x35/0x40 [ 789.729268][ C1] Uninit was stored to memory at: [ 789.734278][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 789.739980][ C1] __msan_chain_origin+0x50/0x90 [ 789.744900][ C1] tcp_conn_request+0x1781/0x4d10 [ 789.751740][ C1] tcp_v4_conn_request+0x19b/0x240 [ 789.756858][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 789.761892][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 789.767312][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 789.772081][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 789.776569][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 789.782023][ C1] ip_local_deliver+0x62a/0x7c0 [ 789.786855][ C1] ip_rcv+0x6cf/0x750 [ 789.790880][ C1] process_backlog+0xf0b/0x1410 [ 789.796080][ C1] net_rx_action+0x786/0x1aa0 [ 789.800748][ C1] __do_softirq+0x311/0x83d [ 789.805234][ C1] [ 789.807542][ C1] Uninit was stored to memory at: [ 789.812563][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 789.818266][ C1] __msan_chain_origin+0x50/0x90 [ 789.823200][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 789.828469][ C1] tcp_conn_request+0x33d7/0x4d10 [ 789.833539][ C1] tcp_v4_conn_request+0x19b/0x240 [ 789.838766][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 789.843938][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 789.849292][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 789.853909][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 789.858406][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 789.863850][ C1] ip_local_deliver+0x62a/0x7c0 [ 789.868703][ C1] ip_rcv+0x6cf/0x750 [ 789.872675][ C1] process_backlog+0xf0b/0x1410 [ 789.877538][ C1] net_rx_action+0x786/0x1aa0 [ 789.882202][ C1] __do_softirq+0x311/0x83d [ 789.886682][ C1] [ 789.889005][ C1] Uninit was stored to memory at: [ 789.894015][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 789.899722][ C1] __msan_chain_origin+0x50/0x90 [ 789.904649][ C1] tcp_conn_request+0x1781/0x4d10 [ 789.909654][ C1] tcp_v4_conn_request+0x19b/0x240 [ 789.914763][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 789.919790][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 789.925144][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 789.929718][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 789.934201][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 789.939642][ C1] ip_local_deliver+0x62a/0x7c0 [ 789.944483][ C1] ip_rcv+0x6cf/0x750 [ 789.948459][ C1] process_backlog+0xf0b/0x1410 [ 789.953291][ C1] net_rx_action+0x786/0x1aa0 [ 789.958048][ C1] __do_softirq+0x311/0x83d [ 789.962533][ C1] [ 789.964847][ C1] Uninit was stored to memory at: [ 789.970479][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 789.976202][ C1] __msan_chain_origin+0x50/0x90 [ 789.981134][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 789.986407][ C1] tcp_conn_request+0x33d7/0x4d10 [ 789.991432][ C1] tcp_v4_conn_request+0x19b/0x240 [ 789.996523][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 790.001521][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 790.007009][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 790.011642][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 790.016142][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 790.021582][ C1] ip_local_deliver+0x62a/0x7c0 [ 790.026442][ C1] ip_rcv+0x6cf/0x750 [ 790.030408][ C1] process_backlog+0xf0b/0x1410 [ 790.035237][ C1] net_rx_action+0x786/0x1aa0 [ 790.039905][ C1] __do_softirq+0x311/0x83d [ 790.044463][ C1] [ 790.046778][ C1] Uninit was stored to memory at: [ 790.051878][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 790.057593][ C1] __msan_chain_origin+0x50/0x90 [ 790.062524][ C1] tcp_conn_request+0x1781/0x4d10 [ 790.067529][ C1] tcp_v4_conn_request+0x19b/0x240 [ 790.072621][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 790.077623][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 790.082972][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 790.087539][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 790.093074][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 790.098506][ C1] ip_local_deliver+0x62a/0x7c0 [ 790.103333][ C1] ip_rcv+0x6cf/0x750 [ 790.107295][ C1] process_backlog+0xf0b/0x1410 [ 790.112121][ C1] net_rx_action+0x786/0x1aa0 [ 790.116779][ C1] __do_softirq+0x311/0x83d [ 790.121343][ C1] [ 790.123656][ C1] Uninit was stored to memory at: [ 790.128668][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 790.134368][ C1] __msan_chain_origin+0x50/0x90 [ 790.139289][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 790.144550][ C1] tcp_conn_request+0x33d7/0x4d10 [ 790.149554][ C1] tcp_v4_conn_request+0x19b/0x240 [ 790.154818][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 790.159833][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 790.165184][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 790.169764][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 790.174257][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 790.179722][ C1] ip_local_deliver+0x62a/0x7c0 [ 790.184624][ C1] ip_rcv+0x6cf/0x750 [ 790.188614][ C1] process_backlog+0xf0b/0x1410 [ 790.193446][ C1] net_rx_action+0x786/0x1aa0 [ 790.198107][ C1] __do_softirq+0x311/0x83d [ 790.202599][ C1] [ 790.204909][ C1] Uninit was stored to memory at: [ 790.209925][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 790.219533][ C1] __msan_chain_origin+0x50/0x90 [ 790.225178][ C1] tcp_conn_request+0x1781/0x4d10 [ 790.230180][ C1] tcp_v4_conn_request+0x19b/0x240 [ 790.235272][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 790.240289][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 790.245636][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 790.250202][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 790.254679][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 790.260123][ C1] ip_local_deliver+0x62a/0x7c0 [ 790.264951][ C1] ip_rcv+0x6cf/0x750 [ 790.268922][ C1] process_backlog+0xf0b/0x1410 [ 790.273750][ C1] net_rx_action+0x786/0x1aa0 [ 790.278408][ C1] __do_softirq+0x311/0x83d [ 790.282895][ C1] [ 790.285208][ C1] Uninit was created at: [ 790.289435][ C1] kmsan_save_stack_with_flags+0x3c/0x90 [ 790.295051][ C1] kmsan_alloc_page+0x12a/0x310 [ 790.299880][ C1] __alloc_pages_nodemask+0x5712/0x5e80 [ 790.305409][ C1] alloc_pages_current+0x67d/0x990 [ 790.310504][ C1] alloc_slab_page+0x111/0x12f0 [ 790.315330][ C1] new_slab+0x2bc/0x1130 [ 790.319562][ C1] ___slab_alloc+0x1533/0x1f30 [ 790.324329][ C1] kmem_cache_alloc+0xb23/0xd70 [ 790.329162][ C1] inet_reqsk_alloc+0xac/0x830 [ 790.333916][ C1] tcp_conn_request+0x753/0x4d10 [ 790.338882][ C1] tcp_v4_conn_request+0x19b/0x240 [ 790.344070][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 790.349443][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 790.354044][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 790.358528][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 790.363966][ C1] ip_local_deliver+0x62a/0x7c0 [ 790.368796][ C1] ip_sublist_rcv+0x11fa/0x13c0 [ 790.373626][ C1] ip_list_rcv+0x8eb/0x950 [ 790.378036][ C1] __netif_receive_skb_list_core+0x1311/0x1380 [ 790.384167][ C1] netif_receive_skb_list_internal+0xf62/0x1620 [ 790.390384][ C1] napi_complete_done+0x2ef/0xb60 [ 790.395388][ C1] virtqueue_napi_complete+0xb9/0x1f0 [ 790.400748][ C1] virtnet_poll+0x1468/0x19f0 [ 790.405418][ C1] net_rx_action+0x786/0x1aa0 [ 790.410216][ C1] __do_softirq+0x311/0x83d 09:45:27 executing program 1: 09:45:27 executing program 2: 09:45:27 executing program 5: 09:45:27 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:45:27 executing program 3: 09:45:27 executing program 0: 09:45:27 executing program 3: 09:45:27 executing program 2: 09:45:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x100000000011, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r0, &(0x7f00000001c0)="ee0107200c9f8fbf5ca312794d57d7c84858f6d02a", 0x15) 09:45:27 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) 09:45:27 executing program 3: r0 = socket$inet(0x11, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x108, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f000087dfc8)={&(0x7f000005e000)=@nfc={0x27, 0x7}, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000001e00)={0x0, 0x0, 0x0}, 0x2000) 09:45:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x20, 0x2, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_HELP_NAME={0xa, 0x6, 'Q.931\x00'}]}, 0x20}}, 0x0) [ 797.213669][ T0] NOHZ: local_softirq_pending 08 [ 797.218802][ T0] NOHZ: local_softirq_pending 08 09:45:31 executing program 1: r0 = socket$inet(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0xfffffffd, 0x4) sendmsg(r0, &(0x7f000087dfc8)={&(0x7f000005e000)=@nfc={0x27, 0x7}, 0x80, 0x0}, 0x0) 09:45:31 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000003000/0x9000)=nil, 0x9000, 0x0, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) ftruncate(r2, 0x208200) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x51, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xe0b7}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) 09:45:31 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:45:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) fstatfs(r2, &(0x7f0000000000)=""/135) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000002f000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000034000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000100)="6766c7442400130000006766c7442402000800006766c744240600000000670f011c2466b9860800000f3266b9800000c00f326635004000000f30f30f090f086766c7442400fd7f00006766c7442402000000006766c744240600000000670f011c240f015b2b0f219af0312f0f30", 0x6f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:45:31 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) 09:45:31 executing program 3: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 797.599520][T22237] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 09:45:31 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x400002200006007, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS64(r0, 0x401870cb, 0x0) 09:45:32 executing program 2: perf_event_open(&(0x7f0000000840)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x42000) dup3(r0, r1, 0x0) 09:45:32 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:45:32 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8059}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000000000006ada01000000000000000000000000000000000000ab54d8aad9d035ed000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000"], 0x1) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) 09:45:32 executing program 2: setpriority(0x0, 0x0, 0xffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000140)=0xb3) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x2) 09:45:33 executing program 5: perf_event_open(&(0x7f0000000840)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) dup3(r0, r1, 0x0) [ 799.159068][T22244] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 799.215547][T22255] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 800.668696][ C0] not chained 110000 origins [ 800.673312][ C0] CPU: 0 PID: 305 Comm: kworker/u4:14 Not tainted 5.6.0-rc2-syzkaller #0 [ 800.681807][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 800.692013][ C0] Workqueue: krdsd rds_connect_worker [ 800.697373][ C0] Call Trace: [ 800.700654][ C0] [ 800.703503][ C0] dump_stack+0x1c9/0x220 [ 800.707824][ C0] kmsan_internal_chain_origin+0x6f/0x130 [ 800.713525][ C0] ? should_fail+0x72/0x9e0 [ 800.718009][ C0] ? ret_from_fork+0x35/0x40 [ 800.722576][ C0] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 800.728632][ C0] ? arch_stack_walk+0x34c/0x3e0 [ 800.733567][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 800.738766][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 800.743955][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 800.749837][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 800.754935][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 800.760811][ C0] ? __msan_metadata_ptr_for_store_2+0x13/0x20 [ 800.767385][ C0] ? tcp_parse_options+0x1ada/0x1b90 [ 800.772756][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 800.777935][ C0] __msan_chain_origin+0x50/0x90 [ 800.782907][ C0] tcp_conn_request+0x13ce/0x4d10 [ 800.787930][ C0] ? rb_first+0x31/0x100 [ 800.793111][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 800.798401][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 800.803581][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 800.808759][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 800.814896][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 800.820084][ C0] tcp_v4_conn_request+0x19b/0x240 [ 800.825187][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 800.830713][ C0] ? inet6_sk_rx_dst_set+0x3d0/0x3d0 [ 800.835975][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 800.841335][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 800.846530][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 800.852330][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 800.858404][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 800.863628][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 800.868209][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 800.872726][ C0] ? tcp_filter+0xf0/0xf0 [ 800.877051][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 800.882512][ C0] ip_local_deliver+0x62a/0x7c0 [ 800.887375][ C0] ? ip_local_deliver+0x7c0/0x7c0 [ 800.892394][ C0] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 800.898022][ C0] ip_rcv+0x6cf/0x750 [ 800.901992][ C0] ? ip_rcv_core+0x1270/0x1270 [ 800.906737][ C0] ? ip_local_deliver_finish+0x350/0x350 [ 800.912362][ C0] process_backlog+0xf0b/0x1410 [ 800.917203][ C0] ? ip_local_deliver_finish+0x350/0x350 [ 800.922822][ C0] ? rps_trigger_softirq+0x2e0/0x2e0 [ 800.928083][ C0] net_rx_action+0x786/0x1aa0 [ 800.932754][ C0] ? net_tx_action+0xc30/0xc30 [ 800.937564][ C0] __do_softirq+0x311/0x83d [ 800.942099][ C0] do_softirq_own_stack+0x49/0x80 [ 800.947106][ C0] [ 800.950033][ C0] __local_bh_enable_ip+0x184/0x1d0 [ 800.955287][ C0] local_bh_enable+0x36/0x40 [ 800.959876][ C0] ip_finish_output2+0x2115/0x2610 [ 800.964978][ C0] ? ctnetlink_net_exit_batch+0x180/0x180 [ 800.970730][ C0] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 800.976714][ C0] __ip_finish_output+0xaa7/0xd80 [ 800.982648][ C0] ip_finish_output+0x166/0x410 [ 800.987509][ C0] ip_output+0x593/0x680 [ 800.991742][ C0] ? ip_mc_finish_output+0x6c0/0x6c0 [ 800.997015][ C0] ? ip_finish_output+0x410/0x410 [ 801.002035][ C0] __ip_queue_xmit+0x1b5c/0x21a0 [ 801.006957][ C0] ? kmsan_set_origin_checked+0x95/0xf0 [ 801.013104][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 801.018292][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 801.023486][ C0] ip_queue_xmit+0xcc/0xf0 [ 801.027885][ C0] ? tcp_v4_fill_cb+0x580/0x580 [ 801.032754][ C0] __tcp_transmit_skb+0x439c/0x6090 [ 801.037990][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 801.043809][ C0] tcp_connect+0x4337/0x6920 [ 801.049169][ C0] ? __msan_poison_alloca+0xf0/0x120 [ 801.054567][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 801.059767][ C0] tcp_v4_connect+0x21fd/0x2370 [ 801.064726][ C0] ? tcp_twsk_unique+0xba0/0xba0 [ 801.069660][ C0] __inet_stream_connect+0x2fb/0x1340 [ 801.075020][ C0] ? __local_bh_enable_ip+0x97/0x1d0 [ 801.080319][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 801.085506][ C0] inet_stream_connect+0x101/0x180 [ 801.090608][ C0] ? __inet_stream_connect+0x1340/0x1340 [ 801.096226][ C0] rds_tcp_conn_path_connect+0x8a7/0xb80 [ 801.101854][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 801.107040][ C0] ? rds_tcp_state_change+0x390/0x390 [ 801.112393][ C0] rds_connect_worker+0x2a6/0x470 [ 801.117407][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 801.123469][ C0] ? rds_addr_cmp+0x200/0x200 [ 801.128166][ C0] process_one_work+0x1555/0x1f40 [ 801.133199][ C0] worker_thread+0xef6/0x2450 [ 801.137935][ C0] kthread+0x4b5/0x4f0 [ 801.141983][ C0] ? process_one_work+0x1f40/0x1f40 [ 801.147220][ C0] ? kthread_blkcg+0xf0/0xf0 [ 801.151794][ C0] ret_from_fork+0x35/0x40 [ 801.156197][ C0] Uninit was stored to memory at: [ 801.161204][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 801.166919][ C0] __msan_chain_origin+0x50/0x90 [ 801.171833][ C0] tcp_conn_request+0x1781/0x4d10 [ 801.176845][ C0] tcp_v4_conn_request+0x19b/0x240 [ 801.181946][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 801.186979][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 801.192342][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 801.196942][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 801.201430][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 801.206873][ C0] ip_local_deliver+0x62a/0x7c0 [ 801.211705][ C0] ip_rcv+0x6cf/0x750 [ 801.215668][ C0] process_backlog+0xf0b/0x1410 [ 801.220498][ C0] net_rx_action+0x786/0x1aa0 [ 801.225163][ C0] __do_softirq+0x311/0x83d [ 801.229644][ C0] [ 801.231947][ C0] Uninit was stored to memory at: [ 801.236948][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 801.242654][ C0] __msan_chain_origin+0x50/0x90 [ 801.247580][ C0] tcp_openreq_init_rwin+0xc22/0xc80 [ 801.252848][ C0] tcp_conn_request+0x33d7/0x4d10 [ 801.257854][ C0] tcp_v4_conn_request+0x19b/0x240 [ 801.267685][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 801.272688][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 801.278038][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 801.282665][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 801.287272][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 801.292728][ C0] ip_local_deliver+0x62a/0x7c0 [ 801.297560][ C0] ip_rcv+0x6cf/0x750 [ 801.301578][ C0] process_backlog+0xf0b/0x1410 [ 801.306414][ C0] net_rx_action+0x786/0x1aa0 [ 801.311855][ C0] __do_softirq+0x311/0x83d [ 801.316367][ C0] [ 801.318680][ C0] Uninit was stored to memory at: [ 801.323689][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 801.329386][ C0] __msan_chain_origin+0x50/0x90 [ 801.334304][ C0] tcp_conn_request+0x1781/0x4d10 [ 801.339309][ C0] tcp_v4_conn_request+0x19b/0x240 [ 801.344412][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 801.349430][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 801.354795][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 801.359384][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 801.363872][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 801.369308][ C0] ip_local_deliver+0x62a/0x7c0 [ 801.374139][ C0] ip_rcv+0x6cf/0x750 [ 801.378114][ C0] process_backlog+0xf0b/0x1410 [ 801.383045][ C0] net_rx_action+0x786/0x1aa0 [ 801.387702][ C0] __do_softirq+0x311/0x83d [ 801.392186][ C0] [ 801.394505][ C0] Uninit was stored to memory at: [ 801.399511][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 801.405317][ C0] __msan_chain_origin+0x50/0x90 [ 801.410232][ C0] tcp_openreq_init_rwin+0xc22/0xc80 [ 801.415494][ C0] tcp_conn_request+0x33d7/0x4d10 [ 801.420498][ C0] tcp_v4_conn_request+0x19b/0x240 [ 801.425584][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 801.430605][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 801.435962][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 801.440535][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 801.445050][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 801.450485][ C0] ip_local_deliver+0x62a/0x7c0 [ 801.455322][ C0] ip_rcv+0x6cf/0x750 [ 801.459294][ C0] process_backlog+0xf0b/0x1410 [ 801.464123][ C0] net_rx_action+0x786/0x1aa0 [ 801.468779][ C0] __do_softirq+0x311/0x83d [ 801.473263][ C0] [ 801.475583][ C0] Uninit was stored to memory at: [ 801.480599][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 801.486297][ C0] __msan_chain_origin+0x50/0x90 [ 801.491224][ C0] tcp_conn_request+0x1781/0x4d10 [ 801.496240][ C0] tcp_v4_conn_request+0x19b/0x240 [ 801.501342][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 801.506355][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 801.511868][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 801.516452][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 801.520936][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 801.526387][ C0] ip_local_deliver+0x62a/0x7c0 [ 801.531235][ C0] ip_rcv+0x6cf/0x750 [ 801.535217][ C0] process_backlog+0xf0b/0x1410 [ 801.540064][ C0] net_rx_action+0x786/0x1aa0 [ 801.544741][ C0] __do_softirq+0x311/0x83d [ 801.549220][ C0] [ 801.551531][ C0] Uninit was stored to memory at: [ 801.556557][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 801.562256][ C0] __msan_chain_origin+0x50/0x90 [ 801.567198][ C0] tcp_openreq_init_rwin+0xc22/0xc80 [ 801.572478][ C0] tcp_conn_request+0x33d7/0x4d10 [ 801.577483][ C0] tcp_v4_conn_request+0x19b/0x240 [ 801.582571][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 801.587592][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 801.592974][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 801.597594][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 801.602239][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 801.607701][ C0] ip_local_deliver+0x62a/0x7c0 [ 801.612534][ C0] ip_rcv+0x6cf/0x750 [ 801.616499][ C0] process_backlog+0xf0b/0x1410 [ 801.621342][ C0] net_rx_action+0x786/0x1aa0 [ 801.626159][ C0] __do_softirq+0x311/0x83d [ 801.630707][ C0] [ 801.633022][ C0] Uninit was stored to memory at: [ 801.638195][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 801.643917][ C0] __msan_chain_origin+0x50/0x90 [ 801.648851][ C0] tcp_conn_request+0x1781/0x4d10 [ 801.653868][ C0] tcp_v4_conn_request+0x19b/0x240 [ 801.658967][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 801.663989][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 801.669358][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 801.673930][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 801.678427][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 801.683903][ C0] ip_local_deliver+0x62a/0x7c0 [ 801.688748][ C0] ip_rcv+0x6cf/0x750 [ 801.692724][ C0] process_backlog+0xf0b/0x1410 [ 801.697554][ C0] net_rx_action+0x786/0x1aa0 [ 801.702226][ C0] __do_softirq+0x311/0x83d [ 801.706716][ C0] [ 801.709024][ C0] Uninit was created at: [ 801.713268][ C0] kmsan_save_stack_with_flags+0x3c/0x90 [ 801.718887][ C0] kmsan_alloc_page+0x12a/0x310 [ 801.723732][ C0] __alloc_pages_nodemask+0x5712/0x5e80 [ 801.729255][ C0] alloc_pages_current+0x67d/0x990 [ 801.734343][ C0] alloc_slab_page+0x111/0x12f0 [ 801.739189][ C0] new_slab+0x2bc/0x1130 [ 801.743412][ C0] ___slab_alloc+0x1533/0x1f30 [ 801.748153][ C0] kmem_cache_alloc+0xb23/0xd70 [ 801.752983][ C0] inet_reqsk_alloc+0xac/0x830 [ 801.757750][ C0] tcp_conn_request+0x753/0x4d10 [ 801.762685][ C0] tcp_v4_conn_request+0x19b/0x240 [ 801.767795][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 801.774100][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 801.778682][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 801.783179][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 801.788616][ C0] ip_local_deliver+0x62a/0x7c0 [ 801.793460][ C0] ip_sublist_rcv+0x11fa/0x13c0 [ 801.798298][ C0] ip_list_rcv+0x8eb/0x950 [ 801.802717][ C0] __netif_receive_skb_list_core+0x1311/0x1380 [ 801.808878][ C0] netif_receive_skb_list_internal+0xf62/0x1620 [ 801.815122][ C0] napi_complete_done+0x2ef/0xb60 [ 801.820134][ C0] virtqueue_napi_complete+0xb9/0x1f0 [ 801.825502][ C0] virtnet_poll+0x1468/0x19f0 [ 801.830174][ C0] net_rx_action+0x786/0x1aa0 [ 801.834831][ C0] __do_softirq+0x311/0x83d 09:45:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 09:45:39 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_REG(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000300)={0x14, r1, 0x78d, 0x0, 0x0, {0x6b}}, 0x14}}, 0x0) 09:45:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4010, r1, 0xffffc000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) stat(0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000700)='nl80211\x00') geteuid() r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f0000000440)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r6, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r7 = accept4$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14, 0x40000) fsetxattr$system_posix_acl(r7, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000e80)=ANY=[@ANYBLOB="2195f5bd2bc47308e2f50000", @ANYRES32, @ANYBLOB="0200040087cc0b35db8e1817a64c21428b6da5a57efb0532195fef59aabd99773f7db19416d4ea128a77e448e387b005621a2fa447aa743800f23da5b1cd8eca0f5ad8bcca660aff15eee15898c01ef2597f78ad0f68643dd86c2576b1b40a2d412f63728476a26d77059aecd1fcd486c04212d2f1a587f240e9357d7fa6334ff93dba40205e485ed04991e77f195bdfa14e0deaacf44e01a0b01c41fe2638c7bb7e9e24a4e24506630fbb3d22f38df02c102052aed000"/199, @ANYRES32, @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYPTR64, @ANYRES16], @ANYRES32=0x0, @ANYBLOB="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"], 0x7, 0x0) memfd_create(&(0x7f0000000000)='dummY0\x00', 0x1) geteuid() geteuid() sendmsg$NL80211_CMD_START_SCHED_SCAN(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="555ecb87f2427ae688ba7a73089f956627b9", @ANYRES16=r5, @ANYBLOB, @ANYRES16, @ANYRESHEX=0x0], 0x5}, 0x1, 0x0, 0x0, 0x40008c1}, 0x24000811) fstat(r4, &(0x7f00000003c0)) setresgid(0x0, 0x0, 0x0) stat(&(0x7f0000000480)='./bus\x00', &(0x7f0000000580)) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x10, 0xffffffffffffffff, 0x3544000) r8 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, 0x0) 09:45:39 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:45:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000100)) 09:45:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x4010, r1, 0xffffc000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) stat(0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000700)='nl80211\x00') geteuid() r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f0000000440)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r5, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r6 = accept4$packet(r5, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14, 0x40000) fsetxattr$system_posix_acl(r6, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000e80)=ANY=[@ANYBLOB="2195f5bd2bc47308e2f50000", @ANYRES32, @ANYBLOB="0200040087cc0b35db8e1817a64c21428b6da5a57efb0532195fef59aabd99773f7db19416d4ea128a77e448e387b005621a2fa447aa743800f23da5b1cd8eca0f5ad8bcca660aff15eee15898c01ef2597f78ad0f68643dd86c2576b1b40a2d412f63728476a26d77059aecd1fcd486c04212d2f1a587f240e9357d7fa6334ff93dba40205e485ed04991e77f195bdfa14e0deaacf44e01a0b01c41fe2638c7bb7e9e24a4e24506630fbb3d22f38df02c102052aed000"/201, @ANYRES32, @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES16], @ANYRES32=0x0, @ANYBLOB="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"], 0x7, 0x0) r7 = memfd_create(&(0x7f0000000000)='dummY0\x00', 0x1) r8 = geteuid() r9 = geteuid() fsetxattr$system_posix_acl(r7, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="020000000100000000000000", @ANYRES32=r8, @ANYBLOB="020004", @ANYRES32=r9, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="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"/616], 0x7, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="555ecb87f2427ae688ba7a73089f956627b9", @ANYRES16, @ANYBLOB="010029bd7000fddbdf254b00000024047d80620002003f5e2709de1a3d979d525d1c275240b6ef7500cc9a2011230e80b9428ebe3b49d80e67c0bca8220de4b9bcf78bb02e297efb97e710976dfe99b0dc84d46745ba2043688ee81bce0e7b10f3d9827cf71eabfc8eb4b0c8dad2c7ba1400814b000000010200fd41b8c065e8a4eb36ad603ac05fd0cfab01d5403380a1599af57947962c81f3b2356ea4dd3cca53f2778ce9bc185c51c63a89990b8d0e77cdf62e99cff7d7b6d67f393ecb2f58afac7e9b46db77d39e03b8da4f0fc50490c31805dcc539a77a4a37554e869b1c2a1497b70e3ac28fc983cd71c55d28ceb747641d1e90c26f9bbbe8a98e83eb943b76c3cfd41002fcd2ea58424875b3854d8d3240fb725a9cc858b743d77b72663bbcc6112f6a802479ca45fdd6895440549f5ac15947da61945ed80d5bb583f069dc3f465869f88333c3b10e148cb9b96b1914755e5ffa4b21c8846d6114e9c9527ccba4af57053e7ed74006043f352e79be33fc26a4000100e85eb74d1049cd151d73dc2ddd6cbb5ff9b9a91e91ac241267745c66ccaf87483bd79f159bf50c32f5574fcc83e20590d8f6d412458c0b1a5695b86aa8e57e334024d8a31122887c1650df5c852965ddf4aafa2b133eb5b6a5560bde1bc9b0e494b5e3bfd975085237d3e2bb8b1778cf58a0d02b0e2cfc2af4f09043fb4e2f082feed11cd4c14a8026a8ef47a6844ca31935446377ae5cd6153f18ae970422aade0000009af66e045530d1690b56d8dc47ed988368143ac895324de188a30129f6376ded5f1d594e64ca9a580b8babe5ffbe0eb9a492453a61733bc1718f1cb90d75c465063f60d929261ae576f473baf429a1cc00902ae30d7f0f1c9914d7a4569d5156cbffeaeb9c78736addf1c4f7de718f9f08095ff58143ee9914de6ddd7265151c5d523be670f44e42fd9ee97e76dd47f547d5887b9a705d52ec159bb85a6cfdd49f5406c8ebc70802390191471f58ad580507df4da3926dbfb4f19a3b59836a1d9d59929f174aec15f166b5dcadc7ca8624c8358518736b829aceff64ae3d4ce7000004000200f100000095c189b9a13a7bdf94a1b87919f69fc6fe7c0486e1e4659c13242cf71cf1b6ec4c9abdfdf9b14e6ff988f3a0d3343dfcab1ba061a45e776317ac1a2022758a25fbd0aff9695f52c5efb4527d3bea10d4655640b4192fd193fa857c7466553d5d462519b4d8916c93c35297473bd334c5ee729cbacbee2d5b655e9212bf946432f8d96197eb60f897f2f1b08d5931c5fd0cd242ea4d797acfdb6cde4f61c9ee0576b14b22f2fa962cd12e30d2b09ae0bb151761b4565bbe51ce", @ANYRESOCT=r9, @ANYRESHEX=0x0], 0x5}, 0x1, 0x0, 0x0, 0x40008c1}, 0x24000811) fstat(r4, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, 0x0, r10) setresgid(0x0, 0x0, 0x0) stat(&(0x7f0000000480)='./bus\x00', &(0x7f0000000580)) bind$inet6(r5, &(0x7f0000d84000)={0xa, 0xfffc, 0x0, @mcast2}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x10, 0xffffffffffffffff, 0x3544000) r11 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x40082406, 0x0) 09:45:39 executing program 3: creat(0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000510000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e30000000000000000000000003f00000000006a6d9900002bb19d7e1f24d209d461d9c4705841df"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) [ 805.392080][ T32] audit: type=1400 audit(1583919939.449:131): avc: denied { map } for pid=22285 comm="syz-executor.3" path="socket:[158110]" dev="sockfs" ino=158110 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=udp_socket permissive=1 09:45:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0xa8000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) dup2(r4, 0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0x10) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x7a, &(0x7f0000000080)={r5}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000280)=ANY=[@ANYRES32=r5, @ANYBLOB="2800000017e15526d26d59e0698266c1a4c27c50709ff1fa1dd40f8933f87b846026e519cc4360c832ea"], &(0x7f0000001540)=0x2) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e24, 0x5, @local, 0x6}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000440)={r5, 0x0, 0x6, 0x3ff, 0x8000, 0x0, 0x82e, 0x4, {r6, @in6={{0xa, 0x4e23, 0x5, @empty, 0x3ff}}, 0x10, 0x5, 0x3f, 0x8000, 0xffffffff}}, &(0x7f0000000140)=0xb0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000040)=""/1, 0x1) 09:45:39 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/cpuinfo\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001fc0)=[{{&(0x7f0000000100)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x87, 0x0) 09:45:39 executing program 0: r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCFLSH(r2, 0x5413, 0x722000) 09:45:40 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r1, 0x2468825185d9173d, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) 09:45:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) [ 806.692988][T22334] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 806.849390][ T0] NOHZ: local_softirq_pending 08 09:45:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@remote, @in6=@remote}, {}, {0x0, 0x0, 0x0, 0x2}}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) 09:45:43 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:45:43 executing program 2: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x1, 0x948, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x998) 09:45:43 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x2, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @broadcast}, {0x0, 0x883e, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 09:45:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@remote, @in6=@remote}, {}, {0x0, 0x0, 0x0, 0x2}}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x42, 0x0) 09:45:43 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000200)=0x98) [ 809.537698][T22346] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x2 [ 809.617103][T22346] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x2 [ 809.636512][T22351] BFS-fs: bfs_fill_super(): loop0 is unclean, continuing 09:45:43 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x2, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @broadcast}, {0x0, 0x883e, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 09:45:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@remote, @in6=@remote}, {}, {0x0, 0x0, 0x0, 0x2}}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) 09:45:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x4030ae7b, &(0x7f0000000300)={0x0, 0x0, @ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x5f}]}}) 09:45:44 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$can_raw(r0, &(0x7f0000000180), 0x10) setsockopt(r0, 0x65, 0x1, &(0x7f0000000080), 0x1d0) close(r0) [ 810.053996][T22367] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x2 09:45:44 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 810.478858][T22372] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 09:45:44 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 812.006403][ C1] not chained 120000 origins [ 812.011014][ C1] CPU: 1 PID: 11836 Comm: kworker/u4:0 Not tainted 5.6.0-rc2-syzkaller #0 [ 812.019494][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 812.029551][ C1] Workqueue: krdsd rds_connect_worker [ 812.034905][ C1] Call Trace: [ 812.038177][ C1] [ 812.041024][ C1] dump_stack+0x1c9/0x220 [ 812.045363][ C1] kmsan_internal_chain_origin+0x6f/0x130 [ 812.051067][ C1] ? should_fail+0x72/0x9e0 [ 812.055557][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 812.060739][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 812.065926][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 812.071726][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 812.076827][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 812.082631][ C1] ? __msan_metadata_ptr_for_store_2+0x13/0x20 [ 812.088805][ C1] ? tcp_parse_options+0x1ada/0x1b90 [ 812.094093][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 812.099284][ C1] __msan_chain_origin+0x50/0x90 [ 812.104221][ C1] tcp_conn_request+0x174b/0x4d10 [ 812.109257][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 812.114452][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 812.119632][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 812.125435][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 812.130634][ C1] tcp_v4_conn_request+0x19b/0x240 [ 812.137567][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 812.143052][ C1] ? inet6_sk_rx_dst_set+0x3d0/0x3d0 [ 812.148355][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 812.153727][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 812.159980][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 812.165784][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 812.171852][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 812.177070][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 812.181683][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 812.186248][ C1] ? tcp_filter+0xf0/0xf0 [ 812.190647][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 812.196110][ C1] ip_local_deliver+0x62a/0x7c0 [ 812.200955][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 812.205970][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 812.211588][ C1] ip_rcv+0x6cf/0x750 [ 812.215567][ C1] ? ip_rcv_core+0x1270/0x1270 [ 812.220317][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 812.226033][ C1] process_backlog+0xf0b/0x1410 [ 812.230879][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 812.236646][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 812.241922][ C1] net_rx_action+0x786/0x1aa0 [ 812.246730][ C1] ? net_tx_action+0xc30/0xc30 [ 812.251482][ C1] __do_softirq+0x311/0x83d [ 812.255988][ C1] do_softirq_own_stack+0x49/0x80 [ 812.260997][ C1] [ 812.263937][ C1] __local_bh_enable_ip+0x184/0x1d0 [ 812.269142][ C1] local_bh_enable+0x36/0x40 [ 812.273719][ C1] ip_finish_output2+0x2115/0x2610 [ 812.278814][ C1] ? ctnetlink_net_exit_batch+0x180/0x180 [ 812.284548][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 812.290569][ C1] __ip_finish_output+0xaa7/0xd80 [ 812.295618][ C1] ip_finish_output+0x166/0x410 [ 812.300474][ C1] ip_output+0x593/0x680 [ 812.304739][ C1] ? ip_mc_finish_output+0x6c0/0x6c0 [ 812.310026][ C1] ? ip_finish_output+0x410/0x410 [ 812.315094][ C1] __ip_queue_xmit+0x1b5c/0x21a0 [ 812.320022][ C1] ? kmsan_set_origin_checked+0x95/0xf0 [ 812.325566][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 812.330774][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 812.335965][ C1] ip_queue_xmit+0xcc/0xf0 [ 812.340369][ C1] ? tcp_v4_fill_cb+0x580/0x580 [ 812.345222][ C1] __tcp_transmit_skb+0x439c/0x6090 [ 812.350428][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 812.356919][ C1] tcp_connect+0x4337/0x6920 [ 812.362564][ C1] ? __msan_poison_alloca+0xf0/0x120 [ 812.367893][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 812.373339][ C1] tcp_v4_connect+0x21fd/0x2370 [ 812.378209][ C1] ? tcp_twsk_unique+0xba0/0xba0 [ 812.383157][ C1] __inet_stream_connect+0x2fb/0x1340 [ 812.388536][ C1] ? __local_bh_enable_ip+0x97/0x1d0 [ 812.393820][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 812.399031][ C1] inet_stream_connect+0x101/0x180 [ 812.404155][ C1] ? __inet_stream_connect+0x1340/0x1340 [ 812.409791][ C1] rds_tcp_conn_path_connect+0x8a7/0xb80 [ 812.415456][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 812.420753][ C1] ? rds_tcp_state_change+0x390/0x390 [ 812.426116][ C1] rds_connect_worker+0x2a6/0x470 [ 812.431130][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 812.437188][ C1] ? rds_addr_cmp+0x200/0x200 [ 812.441854][ C1] process_one_work+0x1555/0x1f40 [ 812.446879][ C1] worker_thread+0xef6/0x2450 [ 812.451573][ C1] kthread+0x4b5/0x4f0 [ 812.455629][ C1] ? process_one_work+0x1f40/0x1f40 [ 812.460814][ C1] ? kthread_blkcg+0xf0/0xf0 [ 812.465387][ C1] ret_from_fork+0x35/0x40 [ 812.469797][ C1] Uninit was stored to memory at: [ 812.474804][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 812.480612][ C1] __msan_chain_origin+0x50/0x90 [ 812.485530][ C1] tcp_conn_request+0x1781/0x4d10 [ 812.490533][ C1] tcp_v4_conn_request+0x19b/0x240 [ 812.495625][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 812.500629][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 812.505996][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 812.510593][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 812.515091][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 812.520526][ C1] ip_local_deliver+0x62a/0x7c0 [ 812.525364][ C1] ip_rcv+0x6cf/0x750 [ 812.529344][ C1] process_backlog+0xf0b/0x1410 [ 812.534184][ C1] net_rx_action+0x786/0x1aa0 [ 812.538861][ C1] __do_softirq+0x311/0x83d [ 812.543350][ C1] [ 812.545668][ C1] Uninit was stored to memory at: [ 812.551035][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 812.556757][ C1] __msan_chain_origin+0x50/0x90 [ 812.561686][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 812.566966][ C1] tcp_conn_request+0x33d7/0x4d10 [ 812.571996][ C1] tcp_v4_conn_request+0x19b/0x240 [ 812.577101][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 812.582116][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 812.587488][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 812.592056][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 812.596540][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 812.601980][ C1] ip_local_deliver+0x62a/0x7c0 [ 812.606813][ C1] ip_rcv+0x6cf/0x750 [ 812.610777][ C1] process_backlog+0xf0b/0x1410 [ 812.615609][ C1] net_rx_action+0x786/0x1aa0 [ 812.620266][ C1] __do_softirq+0x311/0x83d [ 812.624748][ C1] [ 812.627082][ C1] Uninit was stored to memory at: [ 812.632102][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 812.637816][ C1] __msan_chain_origin+0x50/0x90 [ 812.642844][ C1] tcp_conn_request+0x1781/0x4d10 [ 812.647862][ C1] tcp_v4_conn_request+0x19b/0x240 [ 812.652982][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 812.657986][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 812.663354][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 812.667945][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 812.672444][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 812.677986][ C1] ip_local_deliver+0x62a/0x7c0 [ 812.682829][ C1] ip_rcv+0x6cf/0x750 [ 812.686826][ C1] process_backlog+0xf0b/0x1410 [ 812.691669][ C1] net_rx_action+0x786/0x1aa0 [ 812.696344][ C1] __do_softirq+0x311/0x83d [ 812.700820][ C1] [ 812.703133][ C1] Uninit was stored to memory at: [ 812.708152][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 812.713856][ C1] __msan_chain_origin+0x50/0x90 [ 812.718774][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 812.724049][ C1] tcp_conn_request+0x33d7/0x4d10 [ 812.729063][ C1] tcp_v4_conn_request+0x19b/0x240 [ 812.734170][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 812.739184][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 812.744544][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 812.749137][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 812.753619][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 812.759068][ C1] ip_local_deliver+0x62a/0x7c0 [ 812.763904][ C1] ip_rcv+0x6cf/0x750 [ 812.767877][ C1] process_backlog+0xf0b/0x1410 [ 812.772722][ C1] net_rx_action+0x786/0x1aa0 [ 812.777499][ C1] __do_softirq+0x311/0x83d [ 812.781975][ C1] [ 812.784292][ C1] Uninit was stored to memory at: [ 812.789417][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 812.795119][ C1] __msan_chain_origin+0x50/0x90 [ 812.800076][ C1] tcp_conn_request+0x1781/0x4d10 [ 812.805102][ C1] tcp_v4_conn_request+0x19b/0x240 [ 812.810206][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 812.815213][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 812.820565][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 812.825150][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 812.829648][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 812.835766][ C1] ip_local_deliver+0x62a/0x7c0 [ 812.840614][ C1] ip_rcv+0x6cf/0x750 [ 812.844590][ C1] process_backlog+0xf0b/0x1410 [ 812.849451][ C1] net_rx_action+0x786/0x1aa0 [ 812.854165][ C1] __do_softirq+0x311/0x83d [ 812.858653][ C1] [ 812.860962][ C1] Uninit was stored to memory at: [ 812.865997][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 812.871746][ C1] __msan_chain_origin+0x50/0x90 [ 812.876712][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 812.881980][ C1] tcp_conn_request+0x33d7/0x4d10 [ 812.886992][ C1] tcp_v4_conn_request+0x19b/0x240 [ 812.892376][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 812.897462][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 812.902831][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 812.907417][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 812.911900][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 812.917339][ C1] ip_local_deliver+0x62a/0x7c0 [ 812.922172][ C1] ip_rcv+0x6cf/0x750 [ 812.926138][ C1] process_backlog+0xf0b/0x1410 [ 812.931013][ C1] net_rx_action+0x786/0x1aa0 [ 812.935705][ C1] __do_softirq+0x311/0x83d [ 812.940192][ C1] [ 812.942510][ C1] Uninit was stored to memory at: [ 812.947529][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 812.953865][ C1] __msan_chain_origin+0x50/0x90 [ 812.958794][ C1] tcp_conn_request+0x1781/0x4d10 [ 812.963835][ C1] tcp_v4_conn_request+0x19b/0x240 [ 812.968939][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 812.973954][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 812.979315][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 812.983910][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 812.988418][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 812.994030][ C1] ip_local_deliver+0x62a/0x7c0 [ 812.999566][ C1] ip_rcv+0x6cf/0x750 [ 813.003535][ C1] process_backlog+0xf0b/0x1410 [ 813.008375][ C1] net_rx_action+0x786/0x1aa0 [ 813.013030][ C1] __do_softirq+0x311/0x83d [ 813.018201][ C1] [ 813.020505][ C1] Uninit was created at: [ 813.028027][ C1] kmsan_save_stack_with_flags+0x3c/0x90 [ 813.033638][ C1] kmsan_alloc_page+0x12a/0x310 [ 813.038925][ C1] __alloc_pages_nodemask+0x5712/0x5e80 [ 813.044465][ C1] alloc_pages_current+0x67d/0x990 [ 813.049629][ C1] alloc_slab_page+0x111/0x12f0 [ 813.054532][ C1] new_slab+0x2bc/0x1130 [ 813.058757][ C1] ___slab_alloc+0x1533/0x1f30 [ 813.063518][ C1] kmem_cache_alloc+0xb23/0xd70 [ 813.068379][ C1] inet_reqsk_alloc+0xac/0x830 [ 813.073130][ C1] tcp_conn_request+0x753/0x4d10 [ 813.078044][ C1] tcp_v4_conn_request+0x19b/0x240 [ 813.083142][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 813.088564][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 813.093256][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 813.097757][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 813.103217][ C1] ip_local_deliver+0x62a/0x7c0 [ 813.108062][ C1] ip_sublist_rcv+0x11fa/0x13c0 [ 813.112911][ C1] ip_list_rcv+0x8eb/0x950 [ 813.117330][ C1] __netif_receive_skb_list_core+0x1311/0x1380 [ 813.123473][ C1] netif_receive_skb_list_internal+0xf62/0x1620 [ 813.130668][ C1] napi_complete_done+0x2ef/0xb60 [ 813.135675][ C1] virtqueue_napi_complete+0xb9/0x1f0 [ 813.141029][ C1] virtnet_poll+0x1468/0x19f0 [ 813.145685][ C1] net_rx_action+0x786/0x1aa0 [ 813.150337][ C1] __do_softirq+0x311/0x83d [ 815.136619][ T0] NOHZ: local_softirq_pending 08 [ 815.141796][ T0] NOHZ: local_softirq_pending 08 09:45:50 executing program 1: syz_emit_ethernet(0x9a, &(0x7f00000001c0)={@broadcast, @random="3af0a570f5df", @void, {@x25={0x805, {0x0, 0x3, 0xff, "2e134d80473698072606bbca29f7dc6a6a5115c1d40d79e09e5f44a2444e502a56db054b995f02189598115e6851d199f72267e6f9193256a310fd5e080d349dd6e013c3cd6d77be98b7df3b545af487070e39c6a8c2750330b553eaea1839fcb38ceba170e3614d4508264f9cc05418e78eadeee6c3294d1e7531a9f4c0dbf9dcbc5d61c9bb7d6635"}}}}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket(0xa, 0x2, 0x0) r5 = open(&(0x7f0000b91ff9)='./file0\x00', 0x68042, 0x0) setsockopt$inet_int(r4, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r5, 0x0, 0xffff, 0x9) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) sendfile(r4, r5, 0x0, 0x10001) ioctl$VIDIOC_SUBDEV_S_FMT(r5, 0xc0585605, &(0x7f00000000c0)={0x1, 0x0, {0x401, 0x1ff, 0x2025, 0x5, 0x3, 0x4, 0x0, 0x4}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 09:45:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x38, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r1}]}}}]}, 0x38}}, 0x0) 09:45:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@remote, @in6=@remote}, {}, {0x0, 0x0, 0x0, 0x2}}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) 09:45:50 executing program 0: getpid() syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x2, 0x4}, 0x4) sched_setscheduler(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:45:50 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:45:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 816.469973][T22407] (unnamed net_device) (uninitialized): HSR: Slave2 device not specified 09:45:50 executing program 3: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x7fffffff, 0x0, [{}, {}, {}, {}, {}, {0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x5f}, {}, {0x0, 0xff}]}}) [ 816.609008][T22414] (unnamed net_device) (uninitialized): HSR: Slave2 device not specified 09:45:50 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000100)={0x0, 0x0, 0x7, 0xb}) [ 816.660487][T22406] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 09:45:50 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:45:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="8800000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000600012800b000100697036746e6c000050000280060011004e240000060011004e2100000500090000000000060012004e230000080014000004000005000900040000000800080036000000140003000000000000000000000000000000000108000a00", @ANYRES32, @ANYBLOB="3ff8f53624a6ac3ef9144e9b36bd5fe6c8c6ec7f5da45e68516f6df42993bed5f907896e98e5dc9edc009763a369db58aea7a41d90551f8384420b6af3d141451237765836c90629cdcab244c380146ffce07eb7f1fe790c32d1018f6a1babb31af25c7848b647aa65bc225e020b5cb445"], 0x88}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 09:45:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@remote, @in6=@remote}, {}, {0x0, 0x0, 0x0, 0x2}}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) 09:45:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@remote, @in6=@remote}, {}, {0x0, 0x0, 0x0, 0x2}}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) [ 817.823365][T22440] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 817.831129][T22447] BFS-fs: bfs_fill_super(): loop0 is unclean, continuing [ 821.736701][ C0] not chained 130000 origins [ 821.741309][ C0] CPU: 0 PID: 11836 Comm: kworker/u4:0 Not tainted 5.6.0-rc2-syzkaller #0 [ 821.749783][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.759828][ C0] Workqueue: krdsd rds_connect_worker [ 821.765329][ C0] Call Trace: [ 821.768595][ C0] [ 821.771443][ C0] dump_stack+0x1c9/0x220 [ 821.775885][ C0] kmsan_internal_chain_origin+0x6f/0x130 [ 821.781597][ C0] ? should_fail+0x72/0x9e0 [ 821.786085][ C0] ? ret_from_fork+0x35/0x40 [ 821.790719][ C0] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 821.796776][ C0] ? arch_stack_walk+0x34c/0x3e0 [ 821.801711][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 821.806925][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 821.812110][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 821.817984][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 821.823082][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 821.829141][ C0] ? __msan_metadata_ptr_for_store_2+0x13/0x20 [ 821.835415][ C0] ? tcp_parse_options+0x1ada/0x1b90 [ 821.840731][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 821.845947][ C0] __msan_chain_origin+0x50/0x90 [ 821.850899][ C0] tcp_conn_request+0x1781/0x4d10 [ 821.855948][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 821.861139][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 821.866380][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 821.872176][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 821.877410][ C0] tcp_v4_conn_request+0x19b/0x240 [ 821.882516][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 821.887528][ C0] ? inet6_sk_rx_dst_set+0x3d0/0x3d0 [ 821.892797][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 821.898242][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 821.903464][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 821.909283][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 821.915348][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 821.920570][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 821.925342][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 821.929855][ C0] ? tcp_filter+0xf0/0xf0 [ 821.934164][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 821.939676][ C0] ip_local_deliver+0x62a/0x7c0 [ 821.944529][ C0] ? ip_local_deliver+0x7c0/0x7c0 [ 821.950319][ C0] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 821.955950][ C0] ip_rcv+0x6cf/0x750 [ 821.959939][ C0] ? ip_rcv_core+0x1270/0x1270 [ 821.964715][ C0] ? ip_local_deliver_finish+0x350/0x350 [ 821.974023][ C0] process_backlog+0xf0b/0x1410 [ 821.978889][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 821.984244][ C0] ? ip_local_deliver_finish+0x350/0x350 [ 821.990823][ C0] ? rps_trigger_softirq+0x2e0/0x2e0 [ 821.996103][ C0] net_rx_action+0x786/0x1aa0 [ 822.000776][ C0] ? net_tx_action+0xc30/0xc30 [ 822.005532][ C0] __do_softirq+0x311/0x83d [ 822.010037][ C0] do_softirq_own_stack+0x49/0x80 [ 822.015054][ C0] [ 822.018002][ C0] __local_bh_enable_ip+0x184/0x1d0 [ 822.023200][ C0] local_bh_enable+0x36/0x40 [ 822.027800][ C0] ip_finish_output2+0x2115/0x2610 [ 822.032894][ C0] ? ctnetlink_net_exit_batch+0x180/0x180 [ 822.038606][ C0] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 822.044633][ C0] __ip_finish_output+0xaa7/0xd80 [ 822.049656][ C0] ip_finish_output+0x166/0x410 [ 822.054517][ C0] ip_output+0x593/0x680 [ 822.058754][ C0] ? ip_mc_finish_output+0x6c0/0x6c0 [ 822.064025][ C0] ? ip_finish_output+0x410/0x410 [ 822.069065][ C0] __ip_queue_xmit+0x1b5c/0x21a0 [ 822.074030][ C0] ? kmsan_set_origin_checked+0x95/0xf0 [ 822.079575][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 822.084789][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 822.090082][ C0] ip_queue_xmit+0xcc/0xf0 [ 822.094505][ C0] ? tcp_v4_fill_cb+0x580/0x580 [ 822.099430][ C0] __tcp_transmit_skb+0x439c/0x6090 [ 822.104638][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 822.110500][ C0] tcp_connect+0x4337/0x6920 [ 822.115106][ C0] ? __msan_poison_alloca+0xf0/0x120 [ 822.120393][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 822.126125][ C0] tcp_v4_connect+0x21fd/0x2370 [ 822.131001][ C0] ? tcp_twsk_unique+0xba0/0xba0 [ 822.135930][ C0] __inet_stream_connect+0x2fb/0x1340 [ 822.141311][ C0] ? __local_bh_enable_ip+0x97/0x1d0 [ 822.146593][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 822.151798][ C0] inet_stream_connect+0x101/0x180 [ 822.156913][ C0] ? __inet_stream_connect+0x1340/0x1340 [ 822.162557][ C0] rds_tcp_conn_path_connect+0x8a7/0xb80 [ 822.168200][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 822.173406][ C0] ? rds_tcp_state_change+0x390/0x390 [ 822.178765][ C0] rds_connect_worker+0x2a6/0x470 [ 822.183783][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 822.190792][ C0] ? rds_addr_cmp+0x200/0x200 [ 822.196253][ C0] process_one_work+0x1555/0x1f40 [ 822.201303][ C0] worker_thread+0xef6/0x2450 [ 822.206030][ C0] kthread+0x4b5/0x4f0 [ 822.210104][ C0] ? process_one_work+0x1f40/0x1f40 [ 822.215301][ C0] ? kthread_blkcg+0xf0/0xf0 [ 822.219897][ C0] ret_from_fork+0x35/0x40 [ 822.224424][ C0] Uninit was stored to memory at: [ 822.229453][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 822.235252][ C0] __msan_chain_origin+0x50/0x90 [ 822.240179][ C0] tcp_conn_request+0x1781/0x4d10 [ 822.245205][ C0] tcp_v4_conn_request+0x19b/0x240 [ 822.250326][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 822.259140][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 822.264501][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 822.269308][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 822.273797][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 822.279247][ C0] ip_local_deliver+0x62a/0x7c0 [ 822.284081][ C0] ip_rcv+0x6cf/0x750 [ 822.288052][ C0] process_backlog+0xf0b/0x1410 [ 822.292894][ C0] net_rx_action+0x786/0x1aa0 [ 822.297555][ C0] __do_softirq+0x311/0x83d [ 822.302033][ C0] [ 822.304358][ C0] Uninit was stored to memory at: [ 822.309370][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 822.315074][ C0] __msan_chain_origin+0x50/0x90 [ 822.320012][ C0] tcp_openreq_init_rwin+0xc22/0xc80 [ 822.325293][ C0] tcp_conn_request+0x33d7/0x4d10 [ 822.330316][ C0] tcp_v4_conn_request+0x19b/0x240 [ 822.335432][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 822.340441][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 822.345805][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 822.350386][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 822.354873][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 822.360318][ C0] ip_local_deliver+0x62a/0x7c0 [ 822.365158][ C0] ip_rcv+0x6cf/0x750 [ 822.369483][ C0] process_backlog+0xf0b/0x1410 [ 822.374370][ C0] net_rx_action+0x786/0x1aa0 [ 822.379266][ C0] __do_softirq+0x311/0x83d [ 822.383780][ C0] [ 822.386090][ C0] Uninit was stored to memory at: [ 822.391115][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 822.396836][ C0] __msan_chain_origin+0x50/0x90 [ 822.401786][ C0] tcp_conn_request+0x1781/0x4d10 [ 822.406809][ C0] tcp_v4_conn_request+0x19b/0x240 [ 822.411926][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 822.416935][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 822.422295][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 822.426882][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 822.431370][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 822.436828][ C0] ip_local_deliver+0x62a/0x7c0 [ 822.441663][ C0] ip_rcv+0x6cf/0x750 [ 822.445630][ C0] process_backlog+0xf0b/0x1410 [ 822.450471][ C0] net_rx_action+0x786/0x1aa0 [ 822.455144][ C0] __do_softirq+0x311/0x83d [ 822.459629][ C0] [ 822.461942][ C0] Uninit was stored to memory at: [ 822.466983][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 822.472714][ C0] __msan_chain_origin+0x50/0x90 [ 822.477652][ C0] tcp_openreq_init_rwin+0xc22/0xc80 [ 822.482930][ C0] tcp_conn_request+0x33d7/0x4d10 [ 822.487948][ C0] tcp_v4_conn_request+0x19b/0x240 [ 822.493062][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 822.498083][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 822.503441][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 822.508014][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 822.512498][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 822.517937][ C0] ip_local_deliver+0x62a/0x7c0 [ 822.522777][ C0] ip_rcv+0x6cf/0x750 [ 822.528972][ C0] process_backlog+0xf0b/0x1410 [ 822.533817][ C0] net_rx_action+0x786/0x1aa0 [ 822.538497][ C0] __do_softirq+0x311/0x83d [ 822.543093][ C0] [ 822.545423][ C0] Uninit was stored to memory at: [ 822.550448][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 822.556168][ C0] __msan_chain_origin+0x50/0x90 [ 822.561107][ C0] tcp_conn_request+0x1781/0x4d10 [ 822.566120][ C0] tcp_v4_conn_request+0x19b/0x240 [ 822.571218][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 822.576231][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 822.581588][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 822.586288][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 822.590781][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 822.596511][ C0] ip_local_deliver+0x62a/0x7c0 [ 822.601371][ C0] ip_rcv+0x6cf/0x750 [ 822.605348][ C0] process_backlog+0xf0b/0x1410 [ 822.610186][ C0] net_rx_action+0x786/0x1aa0 [ 822.614906][ C0] __do_softirq+0x311/0x83d [ 822.619395][ C0] [ 822.621748][ C0] Uninit was stored to memory at: [ 822.626759][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 822.632461][ C0] __msan_chain_origin+0x50/0x90 [ 822.637383][ C0] tcp_openreq_init_rwin+0xc22/0xc80 [ 822.642662][ C0] tcp_conn_request+0x33d7/0x4d10 [ 822.647689][ C0] tcp_v4_conn_request+0x19b/0x240 [ 822.652789][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 822.657808][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 822.663158][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 822.667729][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 822.672218][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 822.677687][ C0] ip_local_deliver+0x62a/0x7c0 [ 822.682549][ C0] ip_rcv+0x6cf/0x750 [ 822.686527][ C0] process_backlog+0xf0b/0x1410 [ 822.691364][ C0] net_rx_action+0x786/0x1aa0 [ 822.696102][ C0] __do_softirq+0x311/0x83d [ 822.700656][ C0] [ 822.703014][ C0] Uninit was stored to memory at: [ 822.708037][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 822.713740][ C0] __msan_chain_origin+0x50/0x90 [ 822.718766][ C0] tcp_conn_request+0x1781/0x4d10 [ 822.723785][ C0] tcp_v4_conn_request+0x19b/0x240 [ 822.729011][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 822.734024][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 822.740656][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 822.745252][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 822.749760][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 822.755326][ C0] ip_local_deliver+0x62a/0x7c0 [ 822.760162][ C0] ip_rcv+0x6cf/0x750 [ 822.764167][ C0] process_backlog+0xf0b/0x1410 [ 822.769021][ C0] net_rx_action+0x786/0x1aa0 [ 822.773684][ C0] __do_softirq+0x311/0x83d [ 822.778164][ C0] [ 822.780484][ C0] Uninit was created at: [ 822.784716][ C0] kmsan_save_stack_with_flags+0x3c/0x90 [ 822.790328][ C0] kmsan_alloc_page+0x12a/0x310 [ 822.795162][ C0] __alloc_pages_nodemask+0x5712/0x5e80 [ 822.800687][ C0] alloc_pages_current+0x67d/0x990 [ 822.805778][ C0] alloc_slab_page+0x111/0x12f0 [ 822.810621][ C0] new_slab+0x2bc/0x1130 [ 822.814848][ C0] ___slab_alloc+0x1533/0x1f30 [ 822.819591][ C0] kmem_cache_alloc+0xb23/0xd70 [ 822.824422][ C0] inet_reqsk_alloc+0xac/0x830 [ 822.829182][ C0] tcp_conn_request+0x753/0x4d10 [ 822.834105][ C0] tcp_v4_conn_request+0x19b/0x240 [ 822.839205][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 822.844558][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 822.849187][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 822.853688][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 822.859179][ C0] ip_local_deliver+0x62a/0x7c0 [ 822.864037][ C0] ip_sublist_rcv+0x11fa/0x13c0 [ 822.868870][ C0] ip_list_rcv+0x8eb/0x950 [ 822.873283][ C0] __netif_receive_skb_list_core+0x1311/0x1380 [ 822.879435][ C0] netif_receive_skb_list_internal+0xf62/0x1620 [ 822.885658][ C0] napi_complete_done+0x2ef/0xb60 [ 822.890675][ C0] virtqueue_napi_complete+0xb9/0x1f0 [ 822.896041][ C0] virtnet_poll+0x1468/0x19f0 [ 822.900719][ C0] net_rx_action+0x786/0x1aa0 [ 822.905395][ C0] __do_softirq+0x311/0x83d 09:45:58 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000100)) 09:45:58 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:45:58 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) creat(0x0, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCGETLINKNAME(0xffffffffffffffff, 0x89e0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r1 = socket(0xa, 0x2, 0x0) r2 = open(&(0x7f0000b91ff9)='./file0\x00', 0x68042, 0x0) setsockopt$inet_int(r1, 0x0, 0x0, 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000640)='/dev/vcs\x00', 0x9, 0x2) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) sendfile(r1, r2, 0x0, 0x10001) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(0xffffffffffffffff, 0xc2604110, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:45:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup3(r0, r1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4138ae84, &(0x7f0000000000)) dup2(r3, r2) 09:45:58 executing program 2: tkill(0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400180, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xc0c}, 0x190}, 0x0, 0xffffffffffffffff, r0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r1 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2271, &(0x7f0000000780)) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) socket$inet6(0xa, 0x0, 0x0) 09:45:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@remote, @in6=@remote}, {}, {0x0, 0x0, 0x0, 0x2}}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) [ 824.437041][T22468] BFS-fs: bfs_fill_super(): loop0 is unclean, continuing 09:45:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@remote, @in6=@remote}, {}, {0x0, 0x0, 0x0, 0x2}}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) 09:45:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@remote, @in6=@remote}, {}, {0x0, 0x0, 0x0, 0x2}}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x42, 0x0) 09:45:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@remote, @in6=@remote}, {}, {0x0, 0x0, 0x0, 0x2}}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) [ 825.156522][T22486] BFS-fs: bfs_fill_super(): loop0 is unclean, continuing 09:45:59 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 825.353422][T22491] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 09:45:59 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000940)=ANY=[@ANYBLOB="640000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="f70600150000000008000a002e0000003c0012000c00010069703667726500002c00020014000600c4e6f0e1be118746bbbf83fb842f55121400070032c6e6b6cb33caba54dd554cc970cf730a75781fdb135d9f9385bd37ee646637d4f64f6e66ea89abe812d529b170410ca772d437de51ce9dad791f61d2aae16ede787945826df07d5276163cf848046f49c06685a41efea01341bd4991c28170c7f069542387e187de1ffa59c5e2a8198d54377891ca0574a709a770236ae11b9a9e133edf74181788389091e966f5d6355fb44c696a8841b17c68f42ee559b8a567000800"/243], 0x64}}, 0x0) r0 = socket(0x10, 0x800000000080002, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x900, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x92492492492483d, 0x0) [ 825.561131][T22501] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 09:45:59 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x32, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000020000006a0a00fe00010000850000000a000000b70000000000000095000000000000009cc6b3fcd62c7d1c6238975d43a4505f80fc889f3c530cf08e467b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa3b1d4e984c46ea7e2a447a36f5662403e1b2be4cc7c2683908a0d411a9872971c7c56f0979bd10b97163c1d6d0ef02f46c7953ab1ab018d07fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b100000000000000f0ff89e399f6609876b5887437a172fbc02a740675298b79dc194e533583412dff048fc21f28bdd3e26a5ab2728a0481e9f0da43bb6cfb851ce5a9ff19ffcafe3e64be033c9d2f972cc93c1c13caec04a347c24a9fb6ae991ddb737d527d6acb15426415b6e8b14f822e86067a5e991c3bd14984dfa2c6e94bd0339454c13a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 09:46:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = open(&(0x7f0000b91ff9)='./file0\x00', 0x68042, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000000c0)={r3, &(0x7f00000001c0), &(0x7f00000003c0)=""/213}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:46:02 executing program 3: r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000200810a1f0000021410080008001e0012000000140000001a00ffffba16a0aa1c09000000000000", 0x38}], 0x1}, 0x0) 09:46:02 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x6) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000001740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=ANY=[@ANYBLOB="1000004003000000000000007a050000"], 0x10}}], 0x1, 0x0) 09:46:02 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) 09:46:02 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:46:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x32, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 09:46:02 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xedc0) creat(0x0, 0x0) pipe(&(0x7f0000000100)) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000003c0)={0xffffffffffffff83}, 0x7) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) r0 = getpid() r1 = open(&(0x7f0000000040)='./bus\x00', 0x14917e, 0xc) write$P9_RREMOVE(r1, &(0x7f00000003c0)={0xffffffffffffff83}, 0x7) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x49f) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x6b, 0xff, 0x3f, 0x7f, 0x0, 0x6, 0x2408, 0xd, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xf9, 0x8}, 0xf010, 0x101, 0x0, 0x7, 0x0, 0x20, 0x7ff}, r0, 0x0, r1, 0x8) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000b40)={[0x0, 0x800, 0xfffffff8, 0x20, 0x5, 0x8, 0x7, 0x3f, 0x7, 0x1, 0x1f, 0x2, 0x8, 0x8, 0xfffffff8, 0x10001, 0x9, 0x0, 0xfff, 0x3ff, 0xffffffff, 0x10000, 0x9, 0x5, 0x1, 0x7d3c, 0x80000001, 0x3, 0xd2, 0x7f, 0xe85b, 0x0, 0xa10, 0x5, 0x2d52, 0x0, 0x8, 0x10000, 0x2c, 0x6, 0x9, 0xfffffff8, 0xb5ec, 0x3, 0x0, 0x1207, 0xffffffff, 0x0, 0x5, 0x80000001, 0x3200000, 0x0, 0x5, 0x0, 0x9, 0x4d, 0x1, 0x7ff, 0xaf2, 0xff, 0x2f5, 0x4, 0x5, 0xffff, 0x3, 0xce, 0x819a, 0x2, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x81, 0x0, 0x1, 0x10001, 0x1, 0x0, 0x7, 0x3, 0x7, 0x1, 0x1000, 0x0, 0x1, 0x9, 0x0, 0x5, 0x8001, 0x7f0b, 0x4, 0x10000, 0xd9b, 0x800, 0x13, 0x8, 0x800, 0x0, 0x7, 0x0, 0x9, 0x7, 0x3, 0x7ff, 0x0, 0x100, 0x20, 0x8, 0x1, 0xded, 0xda, 0xfffffffb, 0xddaf, 0xcf50, 0x4, 0x4, 0xff, 0xffc00, 0x80, 0x7ff, 0x0, 0x0, 0x6, 0x800, 0x101, 0x6, 0x7fffffff, 0x9, 0x0, 0x9, 0x8, 0x7, 0x5, 0x5cd, 0x0, 0x6, 0x4, 0xd996, 0x1, 0x0, 0x80000001, 0x1, 0x3, 0x400, 0x7fc000, 0x1, 0x1ff, 0x4, 0x6, 0x0, 0x0, 0x7, 0x0, 0x400, 0xb2e, 0xc6ab, 0x9, 0x8, 0x401, 0x0, 0x0, 0x9, 0x9, 0x4, 0x800, 0x5, 0x1000, 0x81, 0x48, 0x1, 0x7fffffff, 0x4, 0x4, 0x4, 0x0, 0x7, 0x200, 0x4fa, 0x5997, 0x8001, 0xcf, 0x2, 0x6, 0xfffffffa, 0x7, 0x4, 0x5, 0x0, 0x1ff, 0x8001, 0x1f, 0x1000, 0x1, 0xc0000000, 0x80000000, 0x0, 0x5a7, 0x80000000, 0xff, 0x9, 0x5, 0xfffffff7, 0xffffffff, 0x0, 0x4, 0x20, 0x80, 0x0, 0x8, 0x2, 0x1, 0x4, 0x3, 0x0, 0x0, 0x3ff, 0x1, 0x8b, 0x1, 0xffff, 0x2, 0x0, 0x72c, 0x8, 0xfffffbff, 0x401, 0x3ff, 0x7, 0x2859f2a8, 0xf2, 0x3, 0x80, 0x4, 0x3, 0x2, 0x7, 0x7fffffff, 0x0, 0x100, 0x1f, 0xffff, 0x8000, 0x748e, 0x9, 0x0, 0x8, 0x0, 0xadd, 0x8, 0xded, 0x0, 0x7fff, 0x20, 0xfffffff7, 0x0, 0xfffffffb, 0x7, 0xbb00, 0x70, 0x200, 0x2, 0x4, 0x0, 0x0, 0xc1c00000, 0x0, 0xffffffff, 0x2c, 0xff, 0x9, 0x3, 0x2, 0x0, 0x0, 0xc7c, 0xffff, 0x3ff, 0x0, 0x0, 0x0, 0x6f, 0xffff, 0xa27, 0x3, 0x9, 0x314, 0x7, 0x8, 0x1f, 0x7, 0x6, 0x3, 0x1, 0x80, 0x25e2421f, 0x7, 0x0, 0x9f01, 0x12, 0x4, 0x9, 0x5, 0x2, 0x6, 0x0, 0x0, 0x0, 0x800, 0x7ff, 0x9, 0xfffffffb, 0x0, 0xfffffffa, 0x2, 0x8, 0x4, 0x5191, 0x10001, 0x727, 0x1, 0x6, 0x2, 0x9, 0x3f, 0x47, 0x800, 0x20, 0x7, 0x101, 0xdfc, 0x4, 0x1, 0xffff, 0x0, 0x6, 0xffff0001, 0x9, 0x3, 0x200, 0x7ff, 0x6, 0x0, 0x1, 0x2, 0x200, 0xffffff30, 0x7, 0x3, 0x1, 0x4, 0x7ff, 0x4, 0xffff, 0x19dc, 0x8001, 0x4, 0x0, 0x2, 0x6, 0x8, 0x5, 0x324940f0, 0xffffffff, 0x5, 0x9, 0x1000, 0x0, 0x9, 0x401, 0x0, 0x0, 0x3, 0x6, 0x8, 0x1, 0x8, 0x10000, 0x0, 0x0, 0x0, 0x9, 0xac88, 0x80000001, 0xfff, 0x0, 0x668ae5ea, 0x0, 0x0, 0x5, 0x7, 0x0, 0x2, 0x8, 0x0, 0x1, 0x4, 0xfffffff8, 0x9, 0x3, 0x9, 0x29b, 0x8, 0x0, 0x2, 0x8, 0xcef, 0x3, 0x8, 0x7, 0xffffffc0, 0x9, 0xad, 0x2, 0x0, 0x4, 0x10001, 0x8001, 0x0, 0x60000000, 0xffffffff, 0x1ff, 0x0, 0x8, 0x1000, 0x8, 0x7b26, 0x10000000, 0x0, 0x9, 0x1, 0x7f3, 0x9, 0x4, 0xfff, 0x4, 0x2, 0x3, 0x0, 0xff, 0x2, 0x8, 0xb38, 0x7, 0x5f, 0x80, 0x8, 0x200, 0x4, 0x0, 0x9, 0x1, 0x1000, 0x5402, 0x4, 0x1f, 0x9, 0x4, 0xffffffff, 0x0, 0x1ff, 0x4, 0x6, 0x5, 0x0, 0x7, 0x3, 0x5c6, 0xa06, 0x6, 0xfdd, 0x8, 0x8001, 0x80000000, 0xfffffffc, 0x3, 0xfffffff8, 0x0, 0x0, 0x40, 0x5, 0x6, 0x1ff, 0x4, 0x0, 0x7, 0x0, 0x2, 0x8, 0xffff, 0xe68, 0x44, 0x8000, 0x8, 0x7fffffff, 0x2, 0x5, 0x6, 0xe7c, 0x7fffffff, 0xb1, 0x20, 0xffffffff, 0x8000, 0x0, 0x8000, 0x0, 0x0, 0x4465, 0x9b0, 0x9, 0x0, 0xfffffffd, 0x0, 0x142, 0x2, 0x6, 0x7, 0x2, 0xc6, 0x0, 0x7fff, 0x10000, 0xffffffff, 0x4, 0x1, 0x21b, 0x2, 0x0, 0x1000, 0x401, 0x7fffffff, 0x4, 0x0, 0x0, 0x97a1, 0x1000, 0x79f9, 0x8001, 0x4, 0x9, 0x30d1d84c, 0x2, 0x7000, 0xffff, 0x4, 0x5, 0x100, 0x0, 0x6, 0xffffffff, 0x3f, 0x8, 0x0, 0x6, 0x94, 0x0, 0xec5, 0x17a, 0x400000, 0x0, 0x5, 0x5c0, 0x6, 0x8, 0x4, 0x0, 0x0, 0x0, 0x61b, 0x1ff, 0x6, 0x10000, 0x400, 0x6, 0x7f, 0x0, 0x8000, 0x0, 0x1, 0x400, 0x8, 0x6, 0x9, 0x400, 0x7, 0xe61e, 0x7f, 0xffff, 0x3, 0x3, 0x7, 0x1, 0x4, 0x6, 0x0, 0x1ff, 0x46, 0xffff, 0x4, 0x0, 0xb2, 0x59, 0x304, 0x4, 0x1, 0x7fffffff, 0xf720, 0xff, 0x0, 0x3b64, 0x4, 0x3, 0x5, 0x673ec8a4, 0xd8e, 0x3, 0x0, 0x1, 0x1e, 0x0, 0x1ff, 0x1, 0x7ff, 0x6, 0x1, 0x1ff, 0x7, 0x0, 0xfff, 0x5, 0x4, 0x400, 0x200, 0x2c2ce4b8, 0xdf, 0x5, 0x6, 0x3ff, 0xc00, 0xbb000000, 0xdcbb, 0x0, 0x4, 0x72de, 0xde9b, 0x0, 0xfc000000, 0x8, 0x5, 0x7fffffff, 0x401, 0x4, 0x0, 0xa6, 0x0, 0x0, 0x0, 0x6, 0x1000, 0x0, 0x3, 0x9, 0x1ff, 0x1, 0x1, 0x80, 0x1000, 0x101, 0xce68, 0x0, 0x4, 0x8000, 0x5, 0x9, 0x80000001, 0xfffffffd, 0xc20a58f, 0x5, 0x37, 0x101, 0x0, 0xc719, 0xff, 0x7, 0x0, 0x2, 0x1f, 0x1, 0x3, 0x276, 0x9, 0x1, 0x800, 0x20, 0x0, 0x5, 0x4000000, 0x9ed, 0x2a8, 0x8, 0x200, 0xb907, 0x100, 0x0, 0x1f, 0x5, 0x1, 0x3, 0xff, 0x0, 0x146, 0x7, 0x81, 0x0, 0x1, 0x0, 0x6, 0x80000000, 0xe2, 0xe81, 0x101, 0xaf, 0x21cb2cbb, 0x48f3, 0x4000, 0x80000001, 0x7, 0x3ff, 0x0, 0xffff, 0x9, 0x2, 0x5aaa, 0x3, 0x8, 0x985, 0x4, 0x5, 0xffffffc1, 0x3dc, 0x6, 0x6, 0x40, 0x2, 0x4, 0x7, 0x9, 0x5, 0xe51, 0xf89, 0x400, 0x3, 0x0, 0x200, 0x4, 0x401, 0x3, 0xca, 0xfffe00, 0x8, 0x0, 0x4, 0x7, 0x2a8, 0x8, 0x0, 0x8, 0x6, 0x0, 0x5, 0x0, 0x359e, 0x200, 0x1, 0x1fdf, 0x0, 0x5, 0xd193, 0x80000000, 0x2, 0x1, 0x8001, 0x741, 0x100, 0x0, 0x2, 0x6, 0x1200000, 0x5, 0x7, 0x400, 0x1f, 0x7, 0x0, 0x5, 0x1, 0x0, 0x429, 0x3cd, 0x0, 0x100, 0x0, 0x4, 0xffffffff, 0x3ff, 0x1, 0x6, 0x7, 0x9, 0x1, 0x200, 0x0, 0x80000001, 0x6, 0x6, 0x5, 0x0, 0x2, 0x401, 0xfffffffb, 0x8, 0x7, 0x0, 0x3f, 0x73, 0x7fff, 0x9, 0x1, 0x830, 0x9, 0x4, 0x6, 0x3, 0x55, 0xffffffff, 0x1, 0x4, 0x5, 0xffffffc1, 0x0, 0x1, 0x0, 0x0, 0xffffffff, 0x2, 0x7fffffff, 0x0, 0x9, 0x3, 0x7, 0x1, 0x8, 0x3ed3, 0x7fffffff, 0x0, 0x5, 0xffff, 0x0, 0x4, 0x2, 0x290, 0x1637dbe6, 0xffffffff, 0xffffffff, 0x7841, 0x2, 0x3ff, 0x5, 0x0, 0xfffffffc, 0x2, 0x2, 0x1, 0xffffffff, 0x401, 0x0, 0x5, 0x0, 0x3, 0x4000800, 0x2, 0x80000001, 0x400, 0x0, 0x3, 0x8, 0x6, 0x9, 0xf3, 0xfffffffa, 0x7ff, 0x4, 0x7, 0x1, 0x8, 0x0, 0xfffffff7, 0x4, 0x99d9, 0x0, 0x0, 0x20, 0x7, 0x0, 0x8, 0x0, 0x3ff, 0x1, 0x7, 0x6, 0x5, 0x25, 0x3, 0x80000000, 0x0, 0x1, 0x0, 0x1, 0x800, 0x9, 0x8, 0xfffffe00, 0x5, 0x5, 0xfc34, 0x0, 0x3f, 0xc74, 0x200, 0x3, 0x9, 0x8, 0x7, 0x8000, 0x8000, 0x2, 0x5, 0x7f, 0x0, 0x401, 0x0, 0xffffff01, 0x6, 0x5, 0x6, 0x5, 0x7, 0xac, 0x81, 0x3156ce04, 0x80000000, 0x7, 0xffff, 0x9, 0x29e9, 0x7f, 0x8, 0x9, 0x0, 0x800, 0x43, 0x401, 0x200, 0x8, 0x2ed1, 0x0, 0x80000000, 0x7, 0xff, 0x7fff, 0x0, 0x0, 0x101, 0x216, 0x0, 0x3, 0xffffffff, 0x800, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x6, 0x7, 0x0, 0x40, 0x4, 0x9, 0x3f, 0x4, 0x0, 0x5, 0x9, 0x0, 0x0, 0x1, 0x200, 0xf800, 0x5, 0x7f, 0x7, 0x5, 0x40, 0x6, 0x401, 0x37d, 0x10001, 0x7fff, 0x0, 0x80, 0xfff, 0x1f, 0x80000001, 0xffffff6e, 0x5, 0xff, 0x80000001, 0x0, 0x80000000]}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x6b, 0xff, 0x3f, 0x7f, 0x0, 0x6, 0x2408, 0xd, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xf9, 0x8}, 0xf010, 0x101, 0x3, 0x7, 0x0, 0x20, 0x7ff}, 0x0, 0xe, 0xffffffffffffffff, 0x8) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000800)=ANY=[@ANYBLOB="3b01e88ce0eb1e4e31989f90be18d0b338c787fa095c46601c3053ff9ad2061edf3b2219c6329cfa80e86716b3dc811740ff4b0e8a6da4128d578b97c61c3ed9cadfa759f85b963d2aa0604df810f5bff6a2a027bd35fa85988ac794ab315d083e4dfce45308c06840d9107fad02103b719ec31ed7b9e4baaeff29e88a8ee2a9438322317f77fd644903e6799f4af74bdcfc53cb37e5fc69443deacdec863a5b410c27023ca41c63b6a38b41d74ece43cdf327e92a8f948ff71128a430600c92a372a578413e2ede3db3f3e7b1bf60569a349d8d8abf8bd93900b5fdbea7aa2d5ab37c30e17f6d149c25c205e5bbfaa0b526cff69b38", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x20000881}, 0x4000000) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x9, 0x1}]}}, &(0x7f0000000280)=""/222, 0x26, 0xde, 0x8}, 0x20) 09:46:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x32, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 09:46:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000001980)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a5c268", 0xde8, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, [{0x5, 0x19, "e5fb000005005357cd99e33bca98e246dc9027eb3334ea443e7fdc4049b892d54090878bee496aa11e07fb0f1db1a0ebe2f95347b0317613063381165c01f08fea1048ea59a6f2273e02707fdd7defc02bde3192360593169594710bddd04aead6c89c877796bfed44d23236534ba1a799a63eb453203aa703b249e4628e4706bccc7a264ee85014d99a7fd4565d3c416c835a741eb4e97140e834013724d23450072f0087ac65295ca0d7c601c30de0161560e2d20c5b1052e9b208e25470e9fa884ecd2082ec38b3cb19c083"}, {0x0, 0x1a, "14a142ef59c04e8e7b4db5309006bd98ec79847a52ed68124e8a24d3079fc53b81c039a7d59f992dcb481043f510a0ce1ebb98c07a624ff8c8cc0b4fd3b8e700196d1f5696e184393de669ffaebfbd494a9d6a5fedac0738ffc3dcb3c1b96e48fd063786ae5701f6aa5022621e665607848e20f162630df96d0a773993e97ae6b847e51883d73d66bb30b4375229cfd0c9c41f511bfbf2bca94caa7ce76be257173a4eae2b484117ac32acf6ea1a32def26c919c93055c2f9a640b2d847d527357902538828abd66b3d1a9b8503406"}, {0x0, 0x1f, "8cf0833ae2772f05d302c778833be4f2b9c43c83284b82e71ca1ee382af46513079a2f52da08c93afdfe1a18e4b677b307a1c7df90787cbd143b129bc8dbc39104eb21674d26fd4ced8626df256869e168d42f4d160ad1442cae2bd8fda0fc44a08759d245bfe8eba42ec7967c1e953256a057369159333bca73b498a882fb5e840d429804169a6446c1d1b013144ae0ee276a463ef69ea4c4636751083041811c9b549256c6a3a71e451f8fd4de25629b3de61cba78315412fa14e350bb03feaf63909bd7320561df80bc77f36d4561a5efcc324450355ed398d9e46e798e23e2a4a2c787728b9c549a1894c53dcdfe834c7785fb3c4331"}, {0x0, 0x2, "6598975984c98199c07565e33783bc4723"}, {0x0, 0x165, "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"}]}}}}}, 0xe1a) 09:46:03 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000080)=0xf88e) r1 = open(&(0x7f0000000040)='./bus\x00', 0x14917e, 0xc) write$P9_RREMOVE(r1, &(0x7f00000003c0)={0xffffffffffffff83}, 0x7) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x49f) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x6b, 0xff, 0x3f, 0x7f, 0x0, 0x6, 0x2408, 0xd, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xf9, 0x8}, 0xf010, 0x101, 0x3, 0x7, 0x0, 0x20, 0x7ff}, r0, 0xe, r1, 0x8) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff730000abaaaaaaaabb86dd6000028000083a04e514d8000000480000ff02000000000000000000000000000180009078000000000003d255120000256f8b4fc937edfa62c61a89605fe56f1a7568ae97da12ffaf0e5ddaf0edfd45b1bc64e7097fac0daa09cb4cb42034c0c61566132b8da4655263ef3ba5dea8770a7220f46c049c37701f6cc8ca15338f76101ab59e09a435ba1472d54b0000000010000000cf000000000000"], 0x0) r2 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x105082) write(r2, &(0x7f0000000000), 0x52698b21) 09:46:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x74}}, 0x0) 09:46:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x32, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 833.229231][ C0] not chained 140000 origins [ 833.234096][ C0] CPU: 0 PID: 11940 Comm: kworker/u4:2 Not tainted 5.6.0-rc2-syzkaller #0 [ 833.242581][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.252634][ C0] Workqueue: krdsd rds_tcp_accept_worker [ 833.258248][ C0] Call Trace: [ 833.261523][ C0] [ 833.265173][ C0] dump_stack+0x1c9/0x220 [ 833.269494][ C0] ? tcp_v4_do_rcv+0xb0f/0xd70 [ 833.274246][ C0] kmsan_internal_chain_origin+0x6f/0x130 [ 833.279958][ C0] ? ip_finish_output2+0x2115/0x2610 [ 833.285246][ C0] ? __ip_finish_output+0xaa7/0xd80 [ 833.290460][ C0] ? ip_finish_output+0x166/0x410 [ 833.295470][ C0] ? ip_output+0x593/0x680 [ 833.299873][ C0] ? __ip_queue_xmit+0x1b5c/0x21a0 [ 833.304976][ C0] ? ip_queue_xmit+0xcc/0xf0 [ 833.309551][ C0] ? __tcp_transmit_skb+0x439c/0x6090 [ 833.314917][ C0] ? tcp_write_xmit+0x30e1/0xb470 [ 833.320160][ C0] ? __tcp_push_pending_frames+0x124/0x4e0 [ 833.325960][ C0] ? tcp_send_fin+0x131e/0x1570 [ 833.330835][ C0] ? tcp_shutdown+0x188/0x200 [ 833.335503][ C0] ? inet_shutdown+0x342/0x5e0 [ 833.340365][ C0] ? kernel_sock_shutdown+0x9d/0xc0 [ 833.345549][ C0] ? rds_tcp_accept_one+0xe17/0x1060 [ 833.350821][ C0] ? rds_tcp_accept_worker+0x61/0x160 [ 833.356195][ C0] ? process_one_work+0x1555/0x1f40 [ 833.361377][ C0] ? worker_thread+0xef6/0x2450 [ 833.366225][ C0] ? kthread+0x4b5/0x4f0 [ 833.370469][ C0] ? ret_from_fork+0x35/0x40 [ 833.375046][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 833.380241][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 833.386059][ C0] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 833.392120][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 833.397301][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 833.403108][ C0] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 833.409258][ C0] ? __msan_get_context_state+0x9/0x20 [ 833.414700][ C0] ? __module_get+0x19/0x230 [ 833.419276][ C0] ? inet_twsk_alloc+0x7bb/0xba0 [ 833.424202][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 833.429395][ C0] __msan_chain_origin+0x50/0x90 [ 833.434360][ C0] tcp_time_wait+0xb7e/0x10b0 [ 833.439045][ C0] tcp_fin+0x1f9/0x890 [ 833.443104][ C0] tcp_data_queue+0x24ce/0x9c40 [ 833.447982][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 833.453791][ C0] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 833.459867][ C0] tcp_rcv_state_process+0x67db/0x7140 [ 833.465334][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 833.470537][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 833.475758][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 833.480352][ C0] tcp_v4_rcv+0x4398/0x4d00 [ 833.484903][ C0] ? tcp_filter+0xf0/0xf0 [ 833.489216][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 833.494699][ C0] ip_local_deliver+0x62a/0x7c0 [ 833.499559][ C0] ? ip_local_deliver+0x7c0/0x7c0 [ 833.504584][ C0] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 833.510215][ C0] ip_rcv+0x6cf/0x750 [ 833.514204][ C0] ? ip_rcv_core+0x1270/0x1270 [ 833.518953][ C0] ? ip_local_deliver_finish+0x350/0x350 [ 833.524581][ C0] process_backlog+0xf0b/0x1410 [ 833.529429][ C0] ? ip_local_deliver_finish+0x350/0x350 [ 833.535078][ C0] ? rps_trigger_softirq+0x2e0/0x2e0 [ 833.540357][ C0] net_rx_action+0x786/0x1aa0 [ 833.545044][ C0] ? net_tx_action+0xc30/0xc30 [ 833.549810][ C0] __do_softirq+0x311/0x83d [ 833.554316][ C0] do_softirq_own_stack+0x49/0x80 [ 833.559318][ C0] [ 833.562264][ C0] __local_bh_enable_ip+0x184/0x1d0 [ 833.567455][ C0] local_bh_enable+0x36/0x40 [ 833.572035][ C0] ip_finish_output2+0x2115/0x2610 [ 833.577148][ C0] ? ctnetlink_net_exit_batch+0x180/0x180 [ 833.582935][ C0] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 833.588960][ C0] __ip_finish_output+0xaa7/0xd80 [ 833.593990][ C0] ip_finish_output+0x166/0x410 [ 833.598833][ C0] ip_output+0x593/0x680 [ 833.603090][ C0] ? ip_mc_finish_output+0x6c0/0x6c0 [ 833.608373][ C0] ? ip_finish_output+0x410/0x410 [ 833.613396][ C0] __ip_queue_xmit+0x1b5c/0x21a0 [ 833.618341][ C0] ? kmsan_set_origin_checked+0x95/0xf0 [ 833.623929][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 833.629140][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 833.634333][ C0] ip_queue_xmit+0xcc/0xf0 [ 833.638743][ C0] ? tcp_v6_send_response+0x2920/0x2920 [ 833.644292][ C0] __tcp_transmit_skb+0x439c/0x6090 [ 833.649510][ C0] tcp_write_xmit+0x30e1/0xb470 [ 833.654421][ C0] __tcp_push_pending_frames+0x124/0x4e0 [ 833.660049][ C0] tcp_send_fin+0x131e/0x1570 [ 833.664723][ C0] tcp_shutdown+0x188/0x200 [ 833.669214][ C0] ? tcp_set_state+0x9d0/0x9d0 [ 833.674011][ C0] inet_shutdown+0x342/0x5e0 [ 833.678590][ C0] ? inet_recvmsg+0x7d0/0x7d0 [ 833.683250][ C0] kernel_sock_shutdown+0x9d/0xc0 [ 833.688280][ C0] rds_tcp_accept_one+0xe17/0x1060 [ 833.693404][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 833.698627][ C0] rds_tcp_accept_worker+0x61/0x160 [ 833.703838][ C0] ? rds_tcp_exit_net+0xcb0/0xcb0 [ 833.708861][ C0] process_one_work+0x1555/0x1f40 [ 833.713939][ C0] worker_thread+0xef6/0x2450 [ 833.718633][ C0] kthread+0x4b5/0x4f0 [ 833.722703][ C0] ? process_one_work+0x1f40/0x1f40 [ 833.727911][ C0] ? kthread_blkcg+0xf0/0xf0 [ 833.732491][ C0] ret_from_fork+0x35/0x40 [ 833.736914][ C0] Uninit was stored to memory at: [ 833.741950][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 833.747667][ C0] __msan_chain_origin+0x50/0x90 [ 833.752590][ C0] __inet_twsk_schedule+0x24e/0x2c0 [ 833.757785][ C0] tcp_time_wait+0xaca/0x10b0 [ 833.762448][ C0] tcp_fin+0x1f9/0x890 [ 833.766500][ C0] tcp_data_queue+0x24ce/0x9c40 [ 833.771333][ C0] tcp_rcv_state_process+0x67db/0x7140 [ 833.776803][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 833.781384][ C0] tcp_v4_rcv+0x4398/0x4d00 [ 833.785891][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 833.791354][ C0] ip_local_deliver+0x62a/0x7c0 [ 833.796190][ C0] ip_rcv+0x6cf/0x750 [ 833.800155][ C0] process_backlog+0xf0b/0x1410 [ 833.805005][ C0] net_rx_action+0x786/0x1aa0 [ 833.809687][ C0] __do_softirq+0x311/0x83d [ 833.814175][ C0] [ 833.816481][ C0] Uninit was stored to memory at: [ 833.821492][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 833.827202][ C0] __msan_chain_origin+0x50/0x90 [ 833.832151][ C0] tcp_time_wait+0xb7e/0x10b0 [ 833.836826][ C0] tcp_fin+0x1f9/0x890 [ 833.840877][ C0] tcp_data_queue+0x24ce/0x9c40 [ 833.845734][ C0] tcp_rcv_state_process+0x67db/0x7140 [ 833.851180][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 833.855765][ C0] tcp_v4_rcv+0x4398/0x4d00 [ 833.860270][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 833.865773][ C0] ip_local_deliver+0x62a/0x7c0 [ 833.870631][ C0] ip_rcv+0x6cf/0x750 [ 833.874620][ C0] process_backlog+0xf0b/0x1410 [ 833.880068][ C0] net_rx_action+0x786/0x1aa0 [ 833.884727][ C0] __do_softirq+0x311/0x83d [ 833.889208][ C0] [ 833.891517][ C0] Uninit was stored to memory at: [ 833.896527][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 833.902233][ C0] __msan_chain_origin+0x50/0x90 [ 833.907288][ C0] inet_twsk_alloc+0xab6/0xba0 [ 833.912042][ C0] tcp_time_wait+0xcd/0x10b0 [ 833.916663][ C0] tcp_fin+0x1f9/0x890 [ 833.920731][ C0] tcp_data_queue+0x24ce/0x9c40 [ 833.925607][ C0] tcp_rcv_state_process+0x67db/0x7140 [ 833.931141][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 833.935721][ C0] tcp_v4_rcv+0x4398/0x4d00 [ 833.940221][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 833.945658][ C0] ip_local_deliver+0x62a/0x7c0 [ 833.950495][ C0] ip_rcv+0x6cf/0x750 [ 833.954475][ C0] process_backlog+0xf0b/0x1410 [ 833.959309][ C0] net_rx_action+0x786/0x1aa0 [ 833.963970][ C0] __do_softirq+0x311/0x83d [ 833.968464][ C0] [ 833.970776][ C0] Uninit was stored to memory at: [ 833.975801][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 833.981510][ C0] __msan_chain_origin+0x50/0x90 [ 833.986442][ C0] __inet_twsk_schedule+0x24e/0x2c0 [ 833.991654][ C0] tcp_timewait_state_process+0x1628/0x1900 [ 833.997528][ C0] tcp_v4_rcv+0x1bea/0x4d00 [ 834.002015][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 834.007457][ C0] ip_local_deliver+0x62a/0x7c0 [ 834.012302][ C0] ip_rcv+0x6cf/0x750 [ 834.016316][ C0] process_backlog+0xf0b/0x1410 [ 834.021256][ C0] net_rx_action+0x786/0x1aa0 [ 834.025937][ C0] __do_softirq+0x311/0x83d [ 834.030415][ C0] [ 834.032725][ C0] Uninit was stored to memory at: [ 834.037735][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 834.043525][ C0] __msan_chain_origin+0x50/0x90 [ 834.048452][ C0] __inet_twsk_schedule+0x24e/0x2c0 [ 834.053709][ C0] tcp_time_wait+0xaca/0x10b0 [ 834.058392][ C0] tcp_rcv_state_process+0x1f4b/0x7140 [ 834.063849][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 834.068492][ C0] tcp_v4_rcv+0x4398/0x4d00 [ 834.073091][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 834.078757][ C0] ip_local_deliver+0x62a/0x7c0 [ 834.083592][ C0] ip_rcv+0x6cf/0x750 [ 834.087558][ C0] process_backlog+0xf0b/0x1410 [ 834.092409][ C0] net_rx_action+0x786/0x1aa0 [ 834.097071][ C0] __do_softirq+0x311/0x83d [ 834.101547][ C0] [ 834.103870][ C0] Uninit was stored to memory at: [ 834.108900][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 834.114637][ C0] __msan_chain_origin+0x50/0x90 [ 834.119590][ C0] tcp_time_wait+0xb7e/0x10b0 [ 834.124263][ C0] tcp_rcv_state_process+0x1f4b/0x7140 [ 834.129707][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 834.134381][ C0] tcp_v4_rcv+0x4398/0x4d00 [ 834.139027][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 834.144481][ C0] ip_local_deliver+0x62a/0x7c0 [ 834.149346][ C0] ip_rcv+0x6cf/0x750 [ 834.153313][ C0] process_backlog+0xf0b/0x1410 [ 834.158144][ C0] net_rx_action+0x786/0x1aa0 [ 834.162800][ C0] __do_softirq+0x311/0x83d [ 834.167279][ C0] [ 834.169585][ C0] Uninit was stored to memory at: [ 834.174592][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 834.180294][ C0] __msan_chain_origin+0x50/0x90 [ 834.185218][ C0] inet_twsk_alloc+0xab6/0xba0 [ 834.189969][ C0] tcp_time_wait+0xcd/0x10b0 [ 834.194540][ C0] tcp_rcv_state_process+0x1f4b/0x7140 [ 834.201725][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 834.206323][ C0] tcp_v4_rcv+0x4398/0x4d00 [ 834.210807][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 834.216263][ C0] ip_local_deliver+0x62a/0x7c0 [ 834.221097][ C0] ip_rcv+0x6cf/0x750 [ 834.225072][ C0] process_backlog+0xf0b/0x1410 [ 834.229927][ C0] net_rx_action+0x786/0x1aa0 [ 834.234608][ C0] __do_softirq+0x311/0x83d [ 834.239315][ C0] [ 834.241627][ C0] Uninit was created at: [ 834.245957][ C0] kmsan_save_stack_with_flags+0x3c/0x90 [ 834.251584][ C0] kmsan_alloc_page+0x12a/0x310 [ 834.256419][ C0] __alloc_pages_nodemask+0x5712/0x5e80 [ 834.262051][ C0] alloc_pages_current+0x67d/0x990 [ 834.267149][ C0] alloc_slab_page+0x111/0x12f0 [ 834.271984][ C0] new_slab+0x2bc/0x1130 [ 834.276208][ C0] ___slab_alloc+0x1533/0x1f30 [ 834.280949][ C0] kmem_cache_alloc+0xb23/0xd70 [ 834.285779][ C0] inet_twsk_alloc+0x135/0xba0 [ 834.290523][ C0] tcp_time_wait+0xcd/0x10b0 [ 834.295092][ C0] tcp_fin+0x1f9/0x890 [ 834.299143][ C0] tcp_data_queue+0x24ce/0x9c40 [ 834.304086][ C0] tcp_rcv_state_process+0x67db/0x7140 [ 834.309537][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 834.314105][ C0] tcp_v4_rcv+0x4398/0x4d00 [ 834.318675][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 834.324137][ C0] ip_local_deliver+0x62a/0x7c0 [ 834.329503][ C0] ip_rcv+0x6cf/0x750 [ 834.333481][ C0] process_backlog+0xf0b/0x1410 [ 834.338319][ C0] net_rx_action+0x786/0x1aa0 [ 834.342994][ C0] __do_softirq+0x311/0x83d 09:46:09 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="030000000000800000006061ae6e00603a0000000000000000000000000000000000ff0200000000000000000000000000010005000000000000c910ff0100001100000000000000000000010015b3439aedc1cb5a7f27c4de2d0e0c6b1b4e1fc8ae1c00"/118, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="8000000000"], 0x92) 09:46:09 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:46:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x32, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000020000006a0a00fe00010000850000000a000000b70000000000000095000000000000009cc6b3fcd62c7d1c6238975d43a4505f80fc889f3c530cf08e467b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa3b1d4e984c46ea7e2a447a36f5662403e1b2be4cc7c2683908a0d411a9872971c7c56f0979bd10b97163c1d6d0ef02f46c7953ab1ab018d07fa22f0610a70f2bdf4000000000000b0c2940dd8e263f63223b7b80197aa743f7555193161f45346b100000000000000f0ff89e399f6609876b5887437a172fbc02a740675298b79dc194e533583412dff048fc21f28bdd3e26a5ab2728a0481e9f0da43bb6cfb851ce5a9ff19ffcafe3e64be033c9d2f972cc93c1c13caec04a347c24a9fb6ae991ddb737d527d6acb15426415b6e8b14f822e86067a5e991c3bd14984dfa2c6e94bd0339454c13a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 09:46:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x74}}, 0x0) 09:46:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x12, 0xa, 0x1405}], {0x14, 0x11, 0x2}}, 0x3c}}, 0x0) 09:46:09 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f00000006c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000500)=""/135, 0x87}], 0x5}}], 0x1, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket(0x29, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec16, 0xff03) 09:46:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x74}}, 0x0) 09:46:09 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xaf93010e, &(0x7f0000000200)={&(0x7f0000000d80)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26cd03ccb7e638a66c866a951362d3fa985503f8f45bfb4e9240b985dda11bde27881f17233d3ad01f2177b1a53e51397d581d1549a05c1955f5d2a27a54f154dfab0a4d6a66872083c18972c13e068508685eb082db85be8bcf0074dd91f31c0bc042060d00"/148, @ANYRES32, @ANYBLOB="534fce983e5c2d7673b4958005e750e907d4fdc7bf13d088ad203bd736a956945b0f66f933a317bf2406fae4ddbe02d390fffad64b012deb1db92f020709e51b3e84a45b53c64c5aa753b3531c693655564c9a8ddb7d983a19eb11b0803dced96346ee580ea4a890f90a69b44067df0949c216f3b291122bcd89a0777619426cacf7375a"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) socket(0x26, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x10000) 09:46:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x32, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 09:46:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) [ 836.137662][ T32] audit: type=1400 audit(1583919970.199:132): avc: denied { cpu } for pid=22605 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 836.189164][T22606] device vxlan0 entered promiscuous mode 09:46:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x74}}, 0x0) 09:46:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 836.948039][T22607] device vxlan0 entered promiscuous mode 09:46:16 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r6, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x50, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x4}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x20, 0x2, [@TCA_CGROUP_ACT={0x1c, 0x1, [@m_pedit={0xfffffffffffffe46, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x50}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=@newtfilter={0x44, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0xe6c}, {0x4}, {0x0, 0xfff3}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x14, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}]}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0xe6c}, {0x4}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x4}}]}, 0x34}}, 0x0) 09:46:16 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000080)=0xf88e) r1 = open(&(0x7f0000000040)='./bus\x00', 0x14917e, 0xc) write$P9_RREMOVE(r1, &(0x7f00000003c0)={0xffffffffffffff83}, 0x7) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x49f) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x6b, 0xff, 0x3f, 0x7f, 0x0, 0x6, 0x2408, 0xd, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xf9, 0x8}, 0xf010, 0x101, 0x3, 0x7, 0x0, 0x20, 0x7ff}, r0, 0xe, r1, 0x8) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x105082) write(r2, &(0x7f0000000000), 0x52698b21) 09:46:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x74}}, 0x0) 09:46:16 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:46:16 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 09:46:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:46:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x74}}, 0x0) 09:46:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:46:16 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 09:46:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:46:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x74}}, 0x0) 09:46:17 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 843.798046][ C0] not chained 150000 origins [ 843.802690][ C0] CPU: 0 PID: 21 Comm: kworker/u4:1 Not tainted 5.6.0-rc2-syzkaller #0 [ 843.810934][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.821006][ C0] Workqueue: krdsd rds_connect_worker [ 843.826402][ C0] Call Trace: [ 843.829688][ C0] [ 843.832662][ C0] dump_stack+0x1c9/0x220 [ 843.836997][ C0] kmsan_internal_chain_origin+0x6f/0x130 [ 843.842707][ C0] ? should_fail+0x72/0x9e0 [ 843.847203][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 843.853017][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 843.859078][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 843.864283][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 843.869494][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 843.875299][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 843.880406][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 843.886213][ C0] ? __msan_metadata_ptr_for_store_2+0x13/0x20 [ 843.892369][ C0] ? tcp_parse_options+0x1ada/0x1b90 [ 843.897685][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 843.902898][ C0] __msan_chain_origin+0x50/0x90 [ 843.907845][ C0] tcp_conn_request+0x13ce/0x4d10 [ 843.912873][ C0] ? lapic_next_event+0x6e/0xa0 [ 843.917731][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 843.923046][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 843.928246][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 843.934063][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 843.939267][ C0] tcp_v4_conn_request+0x19b/0x240 [ 843.944384][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 843.949406][ C0] ? inet6_sk_rx_dst_set+0x3d0/0x3d0 [ 843.955125][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 843.960507][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 843.965701][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 843.971502][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 843.977594][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 843.982820][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 843.987446][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 843.992099][ C0] ? tcp_filter+0xf0/0xf0 [ 843.996463][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 844.001955][ C0] ip_local_deliver+0x62a/0x7c0 [ 844.006909][ C0] ? ip_local_deliver+0x7c0/0x7c0 [ 844.011929][ C0] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 844.017652][ C0] ip_rcv+0x6cf/0x750 [ 844.021653][ C0] ? ip_rcv_core+0x1270/0x1270 [ 844.026415][ C0] ? ip_local_deliver_finish+0x350/0x350 [ 844.032045][ C0] process_backlog+0xf0b/0x1410 [ 844.036918][ C0] ? ip_local_deliver_finish+0x350/0x350 [ 844.042571][ C0] ? rps_trigger_softirq+0x2e0/0x2e0 [ 844.047854][ C0] net_rx_action+0x786/0x1aa0 [ 844.052561][ C0] ? net_tx_action+0xc30/0xc30 [ 844.057331][ C0] __do_softirq+0x311/0x83d [ 844.061867][ C0] do_softirq_own_stack+0x49/0x80 [ 844.066904][ C0] [ 844.069847][ C0] __local_bh_enable_ip+0x184/0x1d0 [ 844.075182][ C0] local_bh_enable+0x36/0x40 [ 844.079769][ C0] ip_finish_output2+0x2115/0x2610 [ 844.084879][ C0] ? ctnetlink_net_exit_batch+0x180/0x180 [ 844.090624][ C0] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 844.097062][ C0] __ip_finish_output+0xaa7/0xd80 [ 844.102097][ C0] ip_finish_output+0x166/0x410 [ 844.106960][ C0] ip_output+0x593/0x680 [ 844.111208][ C0] ? ip_mc_finish_output+0x6c0/0x6c0 [ 844.116483][ C0] ? ip_finish_output+0x410/0x410 [ 844.121496][ C0] __ip_queue_xmit+0x1b5c/0x21a0 [ 844.126428][ C0] ? kmsan_set_origin_checked+0x95/0xf0 [ 844.131972][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 844.137175][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 844.142371][ C0] ip_queue_xmit+0xcc/0xf0 [ 844.146785][ C0] ? tcp_v4_fill_cb+0x580/0x580 [ 844.151714][ C0] __tcp_transmit_skb+0x439c/0x6090 [ 844.156923][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 844.162752][ C0] tcp_connect+0x4337/0x6920 [ 844.167339][ C0] ? __msan_poison_alloca+0xf0/0x120 [ 844.172617][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 844.177862][ C0] tcp_v4_connect+0x21fd/0x2370 [ 844.182758][ C0] ? tcp_twsk_unique+0xba0/0xba0 [ 844.187709][ C0] __inet_stream_connect+0x2fb/0x1340 [ 844.193100][ C0] ? __local_bh_enable_ip+0x97/0x1d0 [ 844.198398][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 844.203609][ C0] inet_stream_connect+0x101/0x180 [ 844.208724][ C0] ? __inet_stream_connect+0x1340/0x1340 [ 844.214350][ C0] rds_tcp_conn_path_connect+0x8a7/0xb80 [ 844.219989][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 844.225184][ C0] ? rds_tcp_state_change+0x390/0x390 [ 844.230558][ C0] rds_connect_worker+0x2a6/0x470 [ 844.235574][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 844.241637][ C0] ? rds_addr_cmp+0x200/0x200 [ 844.246304][ C0] process_one_work+0x1555/0x1f40 [ 844.251429][ C0] worker_thread+0xef6/0x2450 [ 844.256121][ C0] kthread+0x4b5/0x4f0 [ 844.260180][ C0] ? process_one_work+0x1f40/0x1f40 [ 844.265393][ C0] ? kthread_blkcg+0xf0/0xf0 [ 844.269972][ C0] ret_from_fork+0x35/0x40 [ 844.274392][ C0] Uninit was stored to memory at: [ 844.279421][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 844.285301][ C0] __msan_chain_origin+0x50/0x90 [ 844.290224][ C0] tcp_conn_request+0x1781/0x4d10 [ 844.295247][ C0] tcp_v4_conn_request+0x19b/0x240 [ 844.300349][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 844.305366][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 844.310723][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 844.315300][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 844.319790][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 844.325250][ C0] ip_local_deliver+0x62a/0x7c0 [ 844.330088][ C0] ip_rcv+0x6cf/0x750 [ 844.334060][ C0] process_backlog+0xf0b/0x1410 [ 844.338901][ C0] net_rx_action+0x786/0x1aa0 [ 844.343566][ C0] __do_softirq+0x311/0x83d [ 844.348050][ C0] [ 844.350368][ C0] Uninit was stored to memory at: [ 844.355385][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 844.361091][ C0] __msan_chain_origin+0x50/0x90 [ 844.366027][ C0] tcp_openreq_init_rwin+0xc22/0xc80 [ 844.371303][ C0] tcp_conn_request+0x33d7/0x4d10 [ 844.376316][ C0] tcp_v4_conn_request+0x19b/0x240 [ 844.381415][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 844.386430][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 844.391796][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 844.396379][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 844.400872][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 844.406318][ C0] ip_local_deliver+0x62a/0x7c0 [ 844.411153][ C0] ip_rcv+0x6cf/0x750 [ 844.416429][ C0] process_backlog+0xf0b/0x1410 [ 844.421268][ C0] net_rx_action+0x786/0x1aa0 [ 844.425931][ C0] __do_softirq+0x311/0x83d [ 844.430412][ C0] [ 844.432731][ C0] Uninit was stored to memory at: [ 844.437795][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 844.443521][ C0] __msan_chain_origin+0x50/0x90 [ 844.448465][ C0] tcp_conn_request+0x1781/0x4d10 [ 844.453498][ C0] tcp_v4_conn_request+0x19b/0x240 [ 844.458625][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 844.463649][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 844.469009][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 844.473589][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 844.478080][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 844.483539][ C0] ip_local_deliver+0x62a/0x7c0 [ 844.488375][ C0] ip_rcv+0x6cf/0x750 [ 844.492351][ C0] process_backlog+0xf0b/0x1410 [ 844.497203][ C0] net_rx_action+0x786/0x1aa0 [ 844.501870][ C0] __do_softirq+0x311/0x83d [ 844.506354][ C0] [ 844.508665][ C0] Uninit was stored to memory at: [ 844.513678][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 844.519398][ C0] __msan_chain_origin+0x50/0x90 [ 844.524324][ C0] tcp_openreq_init_rwin+0xc22/0xc80 [ 844.529597][ C0] tcp_conn_request+0x33d7/0x4d10 [ 844.534609][ C0] tcp_v4_conn_request+0x19b/0x240 [ 844.539708][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 844.544732][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 844.550095][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 844.554673][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 844.559163][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 844.564608][ C0] ip_local_deliver+0x62a/0x7c0 [ 844.569444][ C0] ip_rcv+0x6cf/0x750 [ 844.573418][ C0] process_backlog+0xf0b/0x1410 [ 844.578257][ C0] net_rx_action+0x786/0x1aa0 [ 844.583098][ C0] __do_softirq+0x311/0x83d [ 844.587598][ C0] [ 844.589911][ C0] Uninit was stored to memory at: [ 844.594930][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 844.600657][ C0] __msan_chain_origin+0x50/0x90 [ 844.605581][ C0] tcp_conn_request+0x1781/0x4d10 [ 844.610596][ C0] tcp_v4_conn_request+0x19b/0x240 [ 844.615704][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 844.620716][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 844.626088][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 844.630681][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 844.635195][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 844.640664][ C0] ip_local_deliver+0x62a/0x7c0 [ 844.645506][ C0] ip_rcv+0x6cf/0x750 [ 844.649500][ C0] process_backlog+0xf0b/0x1410 [ 844.654348][ C0] net_rx_action+0x786/0x1aa0 [ 844.659022][ C0] __do_softirq+0x311/0x83d [ 844.663509][ C0] [ 844.665830][ C0] Uninit was stored to memory at: [ 844.670847][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 844.676563][ C0] __msan_chain_origin+0x50/0x90 [ 844.681579][ C0] tcp_openreq_init_rwin+0xc22/0xc80 [ 844.686952][ C0] tcp_conn_request+0x33d7/0x4d10 [ 844.691965][ C0] tcp_v4_conn_request+0x19b/0x240 [ 844.697077][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 844.702093][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 844.707453][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 844.712045][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 844.716539][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 844.722153][ C0] ip_local_deliver+0x62a/0x7c0 [ 844.727000][ C0] ip_rcv+0x6cf/0x750 [ 844.730995][ C0] process_backlog+0xf0b/0x1410 [ 844.735842][ C0] net_rx_action+0x786/0x1aa0 [ 844.740518][ C0] __do_softirq+0x311/0x83d [ 844.745004][ C0] [ 844.747321][ C0] Uninit was stored to memory at: [ 844.752345][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 844.758072][ C0] __msan_chain_origin+0x50/0x90 [ 844.763005][ C0] tcp_conn_request+0x1781/0x4d10 [ 844.768017][ C0] tcp_v4_conn_request+0x19b/0x240 [ 844.773116][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 844.778140][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 844.783499][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 844.788091][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 844.792581][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 844.798634][ C0] ip_local_deliver+0x62a/0x7c0 [ 844.803470][ C0] ip_rcv+0x6cf/0x750 [ 844.807451][ C0] process_backlog+0xf0b/0x1410 [ 844.812317][ C0] net_rx_action+0x786/0x1aa0 [ 844.816988][ C0] __do_softirq+0x311/0x83d [ 844.821471][ C0] [ 844.823783][ C0] Uninit was created at: [ 844.828724][ C0] kmsan_save_stack_with_flags+0x3c/0x90 [ 844.834521][ C0] kmsan_alloc_page+0x12a/0x310 [ 844.839360][ C0] __alloc_pages_nodemask+0x5712/0x5e80 [ 844.844896][ C0] alloc_pages_current+0x67d/0x990 [ 844.850006][ C0] alloc_slab_page+0x111/0x12f0 [ 844.854842][ C0] new_slab+0x2bc/0x1130 [ 844.859080][ C0] ___slab_alloc+0x1533/0x1f30 [ 844.863831][ C0] kmem_cache_alloc+0xb23/0xd70 [ 844.868667][ C0] inet_reqsk_alloc+0xac/0x830 [ 844.873441][ C0] tcp_conn_request+0x753/0x4d10 [ 844.878375][ C0] tcp_v4_conn_request+0x19b/0x240 [ 844.883482][ C0] tcp_rcv_state_process+0x26b/0x7140 [ 844.888856][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 844.893436][ C0] tcp_v4_rcv+0x3f39/0x4d00 [ 844.897929][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 844.903388][ C0] ip_local_deliver+0x62a/0x7c0 [ 844.908229][ C0] ip_sublist_rcv+0x11fa/0x13c0 [ 844.913078][ C0] ip_list_rcv+0x8eb/0x950 [ 844.917485][ C0] __netif_receive_skb_list_core+0x1311/0x1380 [ 844.923639][ C0] netif_receive_skb_list_internal+0xf62/0x1620 [ 844.929879][ C0] napi_complete_done+0x2ef/0xb60 [ 844.934995][ C0] virtqueue_napi_complete+0xb9/0x1f0 [ 844.940356][ C0] virtnet_poll+0x1468/0x19f0 [ 844.945025][ C0] net_rx_action+0x786/0x1aa0 [ 844.949689][ C0] __do_softirq+0x311/0x83d 09:46:23 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28081) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0, 0x0) 09:46:23 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:46:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:46:23 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0xa0000419) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r1, 0x0, 0x200800000000002) 09:46:23 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x74}}, 0x0) 09:46:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 849.660809][ T32] audit: type=1400 audit(1583919983.719:133): avc: denied { watch watch_reads } for pid=22679 comm="syz-executor.0" path="/root/syzkaller-testdir608453661/syzkaller.gcI2aI/452/file0" dev="sda1" ino=17147 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 09:46:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 849.807891][ T32] audit: type=1800 audit(1583919983.759:134): pid=22683 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17147 res=0 [ 849.834377][ T32] audit: type=1800 audit(1583919983.819:135): pid=22683 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17147 res=0 09:46:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x74}}, 0x0) 09:46:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:46:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, 0xffffffffffffffff) socket(0x11, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000033c0)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{0x0}], 0x1, 0x0, 0x0, 0x2000}}], 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154, 0x3}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) 09:46:24 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x74}}, 0x0) 09:46:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 853.031518][ C1] not chained 160000 origins [ 853.036311][ C1] CPU: 1 PID: 11940 Comm: kworker/u4:2 Not tainted 5.6.0-rc2-syzkaller #0 [ 853.044792][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.054838][ C1] Workqueue: krdsd rds_connect_worker [ 853.060193][ C1] Call Trace: [ 853.063474][ C1] [ 853.066314][ C1] dump_stack+0x1c9/0x220 [ 853.070635][ C1] kmsan_internal_chain_origin+0x6f/0x130 [ 853.076348][ C1] ? xfrm_lookup_route+0x2c1/0x370 [ 853.081451][ C1] ? ip_route_output_flow+0x35a/0x3d0 [ 853.086803][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 853.091997][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 853.097193][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 853.103008][ C1] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 853.109151][ C1] ? tcp_select_initial_window+0x60d/0x6c0 [ 853.114954][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 853.120156][ C1] __msan_chain_origin+0x50/0x90 [ 853.125091][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 853.130400][ C1] tcp_conn_request+0x33d7/0x4d10 [ 853.135440][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 853.140648][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 853.145845][ C1] tcp_v4_conn_request+0x19b/0x240 [ 853.150942][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 853.155950][ C1] ? inet6_sk_rx_dst_set+0x3d0/0x3d0 [ 853.161215][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 853.166579][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 853.171776][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 853.177621][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 853.183728][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 853.188929][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 853.193509][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 853.198021][ C1] ? tcp_filter+0xf0/0xf0 [ 853.202344][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 853.207814][ C1] ip_local_deliver+0x62a/0x7c0 [ 853.212825][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 853.217875][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 853.223495][ C1] ip_rcv+0x6cf/0x750 [ 853.227485][ C1] ? ip_rcv_core+0x1270/0x1270 [ 853.232678][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 853.238313][ C1] process_backlog+0xf0b/0x1410 [ 853.243158][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 853.248784][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 853.254070][ C1] net_rx_action+0x786/0x1aa0 [ 853.258747][ C1] ? net_tx_action+0xc30/0xc30 [ 853.263510][ C1] __do_softirq+0x311/0x83d [ 853.268006][ C1] do_softirq_own_stack+0x49/0x80 [ 853.273011][ C1] [ 853.275954][ C1] __local_bh_enable_ip+0x184/0x1d0 [ 853.281140][ C1] local_bh_enable+0x36/0x40 [ 853.285714][ C1] ip_finish_output2+0x2115/0x2610 [ 853.290822][ C1] ? ctnetlink_net_exit_batch+0x180/0x180 [ 853.296548][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 853.302533][ C1] __ip_finish_output+0xaa7/0xd80 [ 853.307565][ C1] ip_finish_output+0x166/0x410 [ 853.312513][ C1] ip_output+0x593/0x680 [ 853.316774][ C1] ? ip_mc_finish_output+0x6c0/0x6c0 [ 853.322085][ C1] ? ip_finish_output+0x410/0x410 [ 853.327109][ C1] __ip_queue_xmit+0x1b5c/0x21a0 [ 853.332039][ C1] ? kmsan_set_origin_checked+0x95/0xf0 [ 853.337570][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 853.342763][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 853.347948][ C1] ip_queue_xmit+0xcc/0xf0 [ 853.352502][ C1] ? tcp_v4_fill_cb+0x580/0x580 [ 853.357412][ C1] __tcp_transmit_skb+0x439c/0x6090 [ 853.362602][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 853.368588][ C1] tcp_connect+0x4337/0x6920 [ 853.373205][ C1] ? __msan_poison_alloca+0xf0/0x120 [ 853.378498][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 853.383717][ C1] tcp_v4_connect+0x21fd/0x2370 [ 853.388570][ C1] ? tcp_twsk_unique+0xba0/0xba0 [ 853.393505][ C1] __inet_stream_connect+0x2fb/0x1340 [ 853.398862][ C1] ? __local_bh_enable_ip+0x97/0x1d0 [ 853.404135][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 853.409319][ C1] inet_stream_connect+0x101/0x180 [ 853.414439][ C1] ? __inet_stream_connect+0x1340/0x1340 [ 853.420060][ C1] rds_tcp_conn_path_connect+0x8a7/0xb80 [ 853.425770][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 853.430950][ C1] ? rds_tcp_state_change+0x390/0x390 [ 853.436304][ C1] rds_connect_worker+0x2a6/0x470 [ 853.441329][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 853.447398][ C1] ? rds_addr_cmp+0x200/0x200 [ 853.452082][ C1] process_one_work+0x1555/0x1f40 [ 853.457116][ C1] worker_thread+0xef6/0x2450 [ 853.461804][ C1] kthread+0x4b5/0x4f0 [ 853.465856][ C1] ? process_one_work+0x1f40/0x1f40 [ 853.471058][ C1] ? kthread_blkcg+0xf0/0xf0 [ 853.475743][ C1] ret_from_fork+0x35/0x40 [ 853.480193][ C1] Uninit was stored to memory at: [ 853.485215][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 853.490930][ C1] __msan_chain_origin+0x50/0x90 [ 853.495851][ C1] tcp_conn_request+0x1781/0x4d10 [ 853.500854][ C1] tcp_v4_conn_request+0x19b/0x240 [ 853.505954][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 853.510970][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 853.516322][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 853.520891][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 853.525385][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 853.530824][ C1] ip_local_deliver+0x62a/0x7c0 [ 853.535667][ C1] ip_rcv+0x6cf/0x750 [ 853.539641][ C1] process_backlog+0xf0b/0x1410 [ 853.544491][ C1] net_rx_action+0x786/0x1aa0 [ 853.549161][ C1] __do_softirq+0x311/0x83d [ 853.553634][ C1] [ 853.555939][ C1] Uninit was stored to memory at: [ 853.560955][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 853.566727][ C1] __msan_chain_origin+0x50/0x90 [ 853.571662][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 853.576949][ C1] tcp_conn_request+0x33d7/0x4d10 [ 853.581965][ C1] tcp_v4_conn_request+0x19b/0x240 [ 853.587123][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 853.592140][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 853.597512][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 853.602131][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 853.606616][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 853.612080][ C1] ip_local_deliver+0x62a/0x7c0 [ 853.616927][ C1] ip_rcv+0x6cf/0x750 [ 853.620904][ C1] process_backlog+0xf0b/0x1410 [ 853.625747][ C1] net_rx_action+0x786/0x1aa0 [ 853.630490][ C1] __do_softirq+0x311/0x83d [ 853.634971][ C1] [ 853.637460][ C1] Uninit was stored to memory at: [ 853.642494][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 853.648209][ C1] __msan_chain_origin+0x50/0x90 [ 853.653149][ C1] tcp_conn_request+0x1781/0x4d10 [ 853.658155][ C1] tcp_v4_conn_request+0x19b/0x240 [ 853.663247][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 853.668250][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 853.673600][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 853.678182][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 853.682665][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 853.688101][ C1] ip_local_deliver+0x62a/0x7c0 [ 853.692932][ C1] ip_rcv+0x6cf/0x750 [ 853.696894][ C1] process_backlog+0xf0b/0x1410 [ 853.701725][ C1] net_rx_action+0x786/0x1aa0 [ 853.706383][ C1] __do_softirq+0x311/0x83d [ 853.710858][ C1] [ 853.713162][ C1] Uninit was stored to memory at: [ 853.718179][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 853.723887][ C1] __msan_chain_origin+0x50/0x90 [ 853.728837][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 853.734117][ C1] tcp_conn_request+0x33d7/0x4d10 [ 853.739122][ C1] tcp_v4_conn_request+0x19b/0x240 [ 853.744222][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 853.749227][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 853.754591][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 853.759161][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 853.763646][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 853.769086][ C1] ip_local_deliver+0x62a/0x7c0 [ 853.773922][ C1] ip_rcv+0x6cf/0x750 [ 853.777907][ C1] process_backlog+0xf0b/0x1410 [ 853.782736][ C1] net_rx_action+0x786/0x1aa0 [ 853.787393][ C1] __do_softirq+0x311/0x83d [ 853.791878][ C1] [ 853.794189][ C1] Uninit was stored to memory at: [ 853.799193][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 853.804889][ C1] __msan_chain_origin+0x50/0x90 [ 853.809826][ C1] tcp_conn_request+0x1781/0x4d10 [ 853.814831][ C1] tcp_v4_conn_request+0x19b/0x240 [ 853.819925][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 853.824927][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 853.830289][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 853.834921][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 853.839412][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 853.844885][ C1] ip_local_deliver+0x62a/0x7c0 [ 853.849725][ C1] ip_rcv+0x6cf/0x750 [ 853.853694][ C1] process_backlog+0xf0b/0x1410 [ 853.858525][ C1] net_rx_action+0x786/0x1aa0 [ 853.863182][ C1] __do_softirq+0x311/0x83d [ 853.867658][ C1] [ 853.869984][ C1] Uninit was stored to memory at: [ 853.875001][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 853.880702][ C1] __msan_chain_origin+0x50/0x90 [ 853.885620][ C1] tcp_openreq_init_rwin+0xc22/0xc80 [ 853.890886][ C1] tcp_conn_request+0x33d7/0x4d10 [ 853.895888][ C1] tcp_v4_conn_request+0x19b/0x240 [ 853.900973][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 853.905978][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 853.911326][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 853.915892][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 853.920385][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 853.925859][ C1] ip_local_deliver+0x62a/0x7c0 [ 853.930709][ C1] ip_rcv+0x6cf/0x750 [ 853.934676][ C1] process_backlog+0xf0b/0x1410 [ 853.939522][ C1] net_rx_action+0x786/0x1aa0 [ 853.944182][ C1] __do_softirq+0x311/0x83d [ 853.948670][ C1] [ 853.950991][ C1] Uninit was stored to memory at: [ 853.956012][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 853.961727][ C1] __msan_chain_origin+0x50/0x90 [ 853.966649][ C1] tcp_conn_request+0x1781/0x4d10 [ 853.971921][ C1] tcp_v4_conn_request+0x19b/0x240 [ 853.977030][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 853.982040][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 853.987390][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 853.991970][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 853.996454][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 854.001907][ C1] ip_local_deliver+0x62a/0x7c0 [ 854.006748][ C1] ip_rcv+0x6cf/0x750 [ 854.011158][ C1] process_backlog+0xf0b/0x1410 [ 854.016001][ C1] net_rx_action+0x786/0x1aa0 [ 854.020668][ C1] __do_softirq+0x311/0x83d [ 854.025144][ C1] [ 854.027454][ C1] Uninit was created at: [ 854.031766][ C1] kmsan_save_stack_with_flags+0x3c/0x90 [ 854.037385][ C1] kmsan_alloc_page+0x12a/0x310 [ 854.042218][ C1] __alloc_pages_nodemask+0x5712/0x5e80 [ 854.047748][ C1] alloc_pages_current+0x67d/0x990 [ 854.052841][ C1] alloc_slab_page+0x111/0x12f0 [ 854.057683][ C1] new_slab+0x2bc/0x1130 [ 854.061914][ C1] ___slab_alloc+0x1533/0x1f30 [ 854.066672][ C1] kmem_cache_alloc+0xb23/0xd70 [ 854.071515][ C1] inet_reqsk_alloc+0xac/0x830 [ 854.076257][ C1] tcp_conn_request+0x753/0x4d10 [ 854.081170][ C1] tcp_v4_conn_request+0x19b/0x240 [ 854.086260][ C1] tcp_rcv_state_process+0x26b/0x7140 [ 854.091622][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 854.096204][ C1] tcp_v4_rcv+0x3f39/0x4d00 [ 854.100694][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 854.106136][ C1] ip_local_deliver+0x62a/0x7c0 [ 854.110975][ C1] ip_sublist_rcv+0x11fa/0x13c0 [ 854.115808][ C1] ip_list_rcv+0x8eb/0x950 [ 854.120211][ C1] __netif_receive_skb_list_core+0x1311/0x1380 [ 854.126346][ C1] netif_receive_skb_list_internal+0xf62/0x1620 [ 854.132580][ C1] napi_complete_done+0x2ef/0xb60 [ 854.137599][ C1] virtqueue_napi_complete+0xb9/0x1f0 [ 854.142964][ C1] virtnet_poll+0x1468/0x19f0 [ 854.147798][ C1] net_rx_action+0x786/0x1aa0 [ 854.152457][ C1] __do_softirq+0x311/0x83d [ 856.094673][ T0] NOHZ: local_softirq_pending 08 09:46:30 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 09:46:30 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:46:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:46:30 executing program 0: setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000033c0)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{0x0}], 0x1, 0x0, 0x0, 0x2000}}], 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) 09:46:30 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x74}}, 0x0) 09:46:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 09:46:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:46:30 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x74}}, 0x0) 09:46:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 09:46:30 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x282, 0x0) r1 = socket(0x11, 0x800000003, 0x81) bind(r1, &(0x7f00000000c0)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c954"}, 0x80) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="260000001000050d00ff00"/20, @ANYRES32, @ANYBLOB="000000000000000014001280190001007663616e0000000004000280"], 0x34}}, 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000540)="fc0000001a000700ab092500090007000aab0700a90100001d60369321000100fe24ffff000000000000000000037515fa2c1ec28656aaa79bb94b44fe000000bc00030005000000140000270400117c22ebc20521400000d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd2000175e63fb8d38a8700"/252, 0xfc) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40000, 0x0) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x2) r7 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r7, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$TUNSETLINK(r8, 0x400454cd, 0x230) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=@ipv6_delrule={0x24, 0x21, 0x889966e8e85f8887, 0x0, 0x0, {0x2, 0x0, 0x0, 0x3}, [@FIB_RULE_POLICY=@FRA_PROTOCOL={0x5}]}, 0x24}}, 0x0) r10 = socket(0x100000000011, 0x2, 0x0) bind(r10, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmmsg$sock(r10, &(0x7f0000001400)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0xfffffeff}}], 0x18}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r12 = socket$inet_udp(0x2, 0x2, 0x0) close(r12) splice(r11, 0x0, r12, 0x0, 0x4ffe0, 0x0) r13 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r13, 0x29, 0x2d, &(0x7f00000004c0)={0xff, {{0xa, 0x4e20, 0x469, @mcast1, 0xfffffea6}}}, 0x88) setsockopt$inet6_int(r13, 0x29, 0x8, &(0x7f00000000c0)=0xfffffffffffffffc, 0x4) getsockopt$inet6_buf(r13, 0x29, 0x6, 0x0, &(0x7f0000000000)) r14 = accept4(r13, &(0x7f0000000140)=@caif=@util, &(0x7f0000000000)=0x80, 0x40800) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r15, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r15, 0x8923, &(0x7f00000009c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r16 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r15, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="1af5eff25331f2c060d7f77959a2f8d4cb0baf48ba8a8d24a25bf5f947d295fb747f57b749cf9c62d9a5ff3ada239f3b62d2e25f348b729db5ccf8a8c771329c6867a9e6d3616c829a9eb1c09f0794b0d3760f6b", @ANYRES16=r16, @ANYBLOB="02002bbd7000ffdbdf250200000c080002"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r14, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000440)={&(0x7f0000000200)={0x14, r16, 0x100, 0x70bd28, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40040}, 0x2004c010) sendmsg$NLBL_CIPSOV4_C_ADD(r11, &(0x7f0000007bc0)={&(0x7f00000079c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB="44010000", @ANYRES16=r16, @ANYBLOB="300328bd7000fcdbdf250100000030010c8024000b8008000900ef30823908000a000e940000080009000300000008000a00373f00003c000b503a000a00801f000008000a009807000008000a00d2bb000008000a00ce7f000008000900d5202f0e0800090082f56675080009007d43802c34000b8008000a0070f50000080009006393b44c08000a00a0d2000008000a007706000008000a00fcc5000008000900fce57d432c000a00d391000008000a00dcc500003808000a00528200004c000b8008000a004d2c00000800090017db623c08000900ea984050080009002065273208000900645b0a3c08000a00da36000008000a007dde0000080009009b94c77308000900f9db1e4514000b8008000a00329a000008000a00ad3200000c000b8008000900dc22b96400"/318], 0x144}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_LISTALL(r10, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="90010000", @ANYRES16=r16, @ANYBLOB="04002dbd7000fedbdf250400000018000c8014000b8008000a00857c00000800090059c42c4108000100000000000c0004800500030002000000080001000300000048010c804c000b8008000a00a693000008000a002be7000008000900ded1d23c0800090058173e3908000a00a6f0000008000a0029dc000008004600ca1c535b080009332b9738bb30eb5700eb613b1708000a00055f000024000b8008000900bc975a79080009006b40bf1208000a0050f4000008000a006fdd00001c000b8008000a0029c4000008000a003743000008000a007d7600000c000b80080009009943d55924000b8008000a0067ef000008000a00bd4b000008000a00c72d000008000a00605c000024000b8008000a004e4b000008000a00c481000008000a006a7100000800090022e8ce723c000b8008000a00fd6100000800090055f8dc240800090026bb123b08000a0036af000008000900192a803e08000900bd983d1a08000900e4d7203f14000b8008000a007e0a000008000a0072f5000014000ba10d830b8008000a000ec30000"], 0x190}, 0x1, 0x0, 0x0, 0x80}, 0xc000800) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000001300)={0x248, r16, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x124, 0xc, 0x0, 0x1, [{0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcd0f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x103ce7ac}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5467c18f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa97c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa99}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x33de}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4b68cb10}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x254281dd}]}, {0x4}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x45bf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4777d6dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2edd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x57a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x584f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3698e5ec}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x42656264}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x23ff75aa}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9425}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1c081130}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x368f6254}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xab39}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x166d5b9e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4f1e68}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x31fc}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7545b911}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x19ed42f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x663fd1f1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4d786ea0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd088}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x46f8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5ea}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x21f11213}]}, {0x4}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5}, {0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xa8, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x34aa5808}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x36}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x610b54d9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x80}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7fd29eaa}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2b7d3db7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xff}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5834e2af}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2b0705d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x97}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7ba3cf63}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xda}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x248}, 0x1, 0x0, 0x0, 0x20004800}, 0x4000) sendmsg$NLBL_CIPSOV4_C_ADD(r9, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r16, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4000080) sendmsg$NLBL_CIPSOV4_C_LIST(r8, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f0000001580)=ANY=[@ANYBLOB="ac000000", @ANYRES16=r16, @ANYBLOB="000228bd7000fddbdf2503000000740008801400078008000500e24b8526080005003e9c810614000780080006000a00000008000500ced2f25a340007800800060056000000080005007801006c080005002b161375080005007e10aa5b08000500afad937908000500040000001400078008000500550cba0e08000500cb49c1071c00048005000300000000000500030000000000050003000000000008000100ffffffff"], 0xac}, 0x1, 0x0, 0x0, 0x10}, 0xc000) sendmsg$NLBL_CIPSOV4_C_ADD(r7, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xa8, r16, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x8c, 0xc, 0x0, 0x1, [{0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe243}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1b7a203c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2f0a02dc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x227dcf98}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xad6e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x564d3f5f}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x28dc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6e1b0eaf}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8aa7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3f02c19}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x222b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6956939f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x18e4e34a}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x622a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6455cfb5}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20000000}, 0x40840) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0xb0, r16, 0x8, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x4c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x1}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x8008000}, 0x4040) sendmsg$NLBL_CIPSOV4_C_LISTALL(r6, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000800)={&(0x7f0000000080)={0x14, r16, 0x10, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4008860}, 0x80) sendmsg$NLBL_CIPSOV4_C_ADD(r5, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="28010000", @ANYRES16=r16, @ANYBLOB="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"/290], 0x128}, 0x1, 0x0, 0x0, 0x8080}, 0x24002000) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, r16, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x18, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x34}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5f}]}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x890}, 0x40) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x3c, r16, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4001}, 0x20) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000001280)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001240)={&(0x7f0000001640)=ANY=[@ANYBLOB="9f00001e48e6e6ac08321d7500", @ANYRES16=r16, @ANYBLOB="200025bd7000ffdbdf2503000000140004800500030000000000050003000700000014000480050003000500000005000300020000000800010003000000"], 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000014) sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000280)={0x100, r16, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x4c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MLSLVLLST={0x8c, 0x8, 0x0, 0x1, [{0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1149caae}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xab}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2fcf3a38}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3dff326c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x23eafc82}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x64}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x429edbad}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x10e33ab8}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4940d3f8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1ad7d5c2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x172965c8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x58}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x321d802b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6bdb15ce}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3b}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}]}, 0x100}, 0x1, 0x0, 0x0, 0x200000c0}, 0x44000) sendmsg$NLBL_CIPSOV4_C_REMOVE(r1, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x1c, r16, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4011}, 0x4080) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x188, r16, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x16c, 0xc, 0x0, 0x1, [{0x4}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57781c51}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x388a634e}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x67fa289d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x10d6}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x791fc82d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2321f90f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6002}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xeb4d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7f753de7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1ecaecb2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5fe4b18}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf264}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5652d0e0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5ba0}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7f5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xd047c01}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x78ca}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa444}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3f3e06bf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x141582a4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x419c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x665c8d9f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x65ad46d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x23df}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x12dd7fff}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf57f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xba2b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x537a5ce6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1d6d5281}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9587}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5ed2c33f}]}, {0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe3c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaf78}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x70057acf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x12deccc1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x595904e3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2791344c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4586}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fdc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2a312e99}]}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x4000}, 0x1) r17 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) preadv(r17, &(0x7f00000003c0)=[{&(0x7f0000000600)=""/4093, 0xffd}], 0x1, 0x4f) 09:46:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 09:46:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) [ 857.270899][T22743] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.0'. [ 857.351013][T22743] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 857.592605][T22743] device lo entered promiscuous mode [ 857.677020][T22750] Y­4`Ò˜: renamed from lo [ 857.689601][T22753] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22753 comm=syz-executor.0 [ 857.713699][T22743] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22743 comm=syz-executor.0 [ 857.760048][T22750] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22750 comm=syz-executor.0 [ 857.777203][T22743] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22743 comm=syz-executor.0 [ 857.936750][T22754] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22754 comm=syz-executor.0 [ 857.953673][T22754] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22754 comm=syz-executor.0 [ 857.967182][T22743] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22743 comm=syz-executor.0 [ 857.967500][T22753] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22753 comm=syz-executor.0 09:46:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback=0x7f00000b}, {0x2, 0x0, @remote}, 0x27, 0x0, 0xd2}) 09:46:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 09:46:37 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:46:37 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:46:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 09:46:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000033c0)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{0x0}], 0x1, 0x0, 0x0, 0x2000}}], 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) preadv(r1, &(0x7f00000009c0)=[{0x0}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f00000005c0)=""/214, 0xd6}, {&(0x7f00000006c0)=""/194, 0xc2}, {&(0x7f00000007c0)=""/146, 0x92}, {&(0x7f0000000880)=""/144, 0x90}, {&(0x7f0000000480)=""/13, 0xd}, {&(0x7f0000000940)=""/71, 0x47}], 0x8, 0x0) 09:46:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 09:46:37 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:46:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 09:46:37 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb010018000000000000003b0000003b00000006000000100000000000000801000000100000000100000f03000000050000000000000002000000effd33000000000100"], 0x0, 0x45}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:46:37 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb010018000000000000003b0000003b00000006000000100000000000000801000000100000000100000f03000000050000000000000002000000effd33000000000100000d00000000000000000000000000000004000000014e8131ba9263e1b020520eb7b11476bb8a7baec74daf739c36ed2c39b21a2944956c4e39d22016eeb12b4bad7e317ef3422db9f971f24b5f6699fe92a3c93bb0e1ffc094c37cd00fbd20a201bd1bafeddc33aeb20771394a7491ec117db4c9fe02a231b9991b17c5bdeda5f8dbbbd366a26e7b3f1a19d3a940d41eb418dcf29b27c4c1fcebc9d8a8218f12b6c0c4f63b4b155c65f2"], 0x0, 0xf0, 0x0, 0x1}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 863.740277][T22788] ptrace attach of "/root/syz-executor.0"[22787] was attempted by "/root/syz-executor.0"[22788] 09:46:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 863.993542][T22795] ptrace attach of "/root/syz-executor.0"[22794] was attempted by "/root/syz-executor.0"[22795] 09:46:43 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb010018000000000000003b0000003b00000006000000100000000000000801000000100000000100000f03000000050000000000000002000000effd33000000000100000d00000000000000000000000000000004000000014e8131ba9263e1b020520eb7b11476bb8a7baec74daf739c36ed"], 0x0, 0x75}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:46:43 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:46:43 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 09:46:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback=0x7f00000b}, {0x2, 0x0, @remote}, 0x27}) 09:46:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 09:46:43 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:46:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 09:46:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 09:46:44 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:46:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) shutdown(r0, 0x0) 09:46:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 09:46:44 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:46:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000033c0)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{0x0}], 0x1, 0x0, 0x0, 0x2000}}], 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f00000006c0)=""/194, 0xc2}, {&(0x7f00000007c0)=""/146, 0x92}, {&(0x7f0000000880)=""/144, 0x90}, {&(0x7f0000000480)=""/13, 0xd}, {&(0x7f0000000940)=""/71, 0x47}], 0x7, 0x0) 09:46:50 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:46:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={0x0}}, 0x0) 09:46:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 09:46:50 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:46:50 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:46:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={0x0}}, 0x0) 09:46:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 09:46:50 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28081) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 09:46:50 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:46:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={0x0}}, 0x0) 09:46:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 09:46:50 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb010018000000000000003b0000003b00000006000000100000000000000801000000100000000100000f03000000050000000000000002000000effd33000000000100000d00000000000000000000000000000004000000014e8131ba9263e1b020520eb7b11476bb8a7baec74daf739c36ed2c39b21a2944956c4e39d22016eeb12b4bad7e317ef3422db9f971f24b5f6699fe92a3c93bb0e1ffc094c37cd00fbd20a201bd1bafeddc33aeb20771394a7491ec117db4c9fe02a231b9991b17c5bdeda5f8dbbbd366a26e7b3f1a19d3a940d41eb418dcf29b27c4c1fcebc9d8a8218f12b6c0c4f63b4b155c"], 0x0, 0xee}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 877.133534][T22882] ptrace attach of "/root/syz-executor.0"[22881] was attempted by "/root/syz-executor.0"[22882] [ 882.577342][ T32] audit: type=1800 audit(1583920016.639:136): pid=22887 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16915 res=0 [ 882.601369][ T32] audit: type=1804 audit(1583920016.649:137): pid=22887 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/465/file0" dev="sda1" ino=16915 res=1 09:46:56 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:46:56 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:46:56 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 09:46:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000200)={0x8, 0x0, 0x0, 0xcca, 0x0, "0000c800ab0000df2efdffd7001c00"}) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f00000000c0)={0xfff}) 09:46:56 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:46:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x48}}, 0x0) 09:46:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:46:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x48}}, 0x0) 09:46:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 09:46:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @dev}, 0x26}) 09:46:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:46:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x48}}, 0x0) [ 887.216585][ T32] audit: type=1800 audit(1583920021.279:138): pid=22930 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16817 res=0 [ 887.240452][ T32] audit: type=1804 audit(1583920021.289:139): pid=22930 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/466/file0" dev="sda1" ino=16817 res=1 09:47:03 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:47:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f00000000c0)={0x1, 0x2, 0x1000, 0x3, &(0x7f0000000000)="c188b5", 0x98, 0x0, &(0x7f00000001c0)="8d647776ab0aa5d2cbc616615cc79ff027618849fa254238b5e14f112c47d910e7343263d57ba2cc6278753c1b6d2924e6755b2f1fe6455fa0a464e421646dbb461c20ea1eee2d64e4f7b513ad7d93561815b65e2ee671a6f2f893ce6540bffc860ae6e937d397a1fef6d9c83ba185da5567edcaf33ddcf5b0edb91a824b92393cf8db30e3af7992fb227359df4d620f7b6361a9f93b0dcd"}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @loopback=0x7f00000b}, {0x2, 0x2, @dev={0xac, 0x14, 0x14, 0x13}}, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f0000000180)) 09:47:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 09:47:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:47:03 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:47:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x74}}, 0x0) 09:47:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 09:47:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:47:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x74}}, 0x0) 09:47:03 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x23) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) creat(&(0x7f0000000040)='./file0\x00', 0x0) 09:47:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 09:47:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) [ 893.775345][ T32] audit: type=1800 audit(1583920027.839:140): pid=22979 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16526 res=0 [ 893.807883][ T32] audit: type=1804 audit(1583920027.869:141): pid=22979 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/467/file0" dev="sda1" ino=16526 res=1 09:47:08 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:47:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:47:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) 09:47:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x74}}, 0x0) 09:47:08 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:47:08 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000500)=[{{&(0x7f00000000c0)=@sco={0x1f, @fixed}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 09:47:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) 09:47:08 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:47:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}]}], {0x14, 0x11, 0x2}}, 0x68}}, 0x0) 09:47:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:47:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) 09:47:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:47:08 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 900.495069][ T32] audit: type=1800 audit(1583920034.559:142): pid=23022 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16801 res=0 [ 900.518992][ T32] audit: type=1804 audit(1583920034.559:143): pid=23022 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/468/file0" dev="sda1" ino=16801 res=1 09:47:15 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r4 = dup2(r3, r3) write$FUSE_IOCTL(r4, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) 09:47:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}]}], {0x14, 0x11, 0x2}}, 0x68}}, 0x0) 09:47:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74) 09:47:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x200800000000001) 09:47:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:47:15 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:47:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, 0x0, 0x0) 09:47:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74) 09:47:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}]}], {0x14, 0x11, 0x2}}, 0x68}}, 0x0) 09:47:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)={0x0, 0x3, [@multicast, @random="f8c15071cb16", @dev]}) 09:47:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, 0x0, 0x0) 09:47:16 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 908.656540][ T32] audit: type=1800 audit(1583920042.719:144): pid=23063 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16865 res=0 [ 908.680394][ T32] audit: type=1804 audit(1583920042.719:145): pid=23063 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/469/file0" dev="sda1" ino=16865 res=1 09:47:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x68}}, 0x0) 09:47:22 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r4 = dup2(r3, r3) write$FUSE_IOCTL(r4, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) 09:47:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74) 09:47:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, 0x0, 0x0) 09:47:22 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000077000)=""/133, 0x2800) 09:47:22 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 909.124019][T23074] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 09:47:23 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:47:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x68}}, 0x0) 09:47:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x0, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:47:23 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb010018000000000000003b0000003b00000006000000100000000000000801000000100000000100000f03000000050000000000000002000000effd33000000000100000d00000000000000000000000000000004000000014e8131ba9263e1b020520eb7b11476bb8a7baec74daf739c36ed2c39b21a2944956c4e39d22016eeb12b4bad7e317ef3422db9f971f24b5f6699fe92a3c93bb0e1ffc094c37cd00fbd20a201bd1bafeddc33aeb20771394a7491ec117db4c9fe02a231b9991b17c5bdeda5f8dbbbd366a26e7b3f1a19d3a940d41eb418dcf29b27c4c1fcebc9d8a8218f12b6c0c4"], 0x0, 0xe9}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:47:23 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000740)={0x20, 0x2, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_HELP_NAME={0xa, 0x6, 'H.245\x00'}]}, 0x20}}, 0x0) 09:47:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x0, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:47:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback=0x7f00000b}, {0x2, 0x0, @remote}, 0x27}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000180)) [ 909.808024][T23098] ptrace attach of "/root/syz-executor.5"[23100] was attempted by "/root/syz-executor.5"[23098] [ 915.455414][ T32] audit: type=1800 audit(1583920049.519:146): pid=23116 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16945 res=0 [ 915.479192][ T32] audit: type=1804 audit(1583920049.519:147): pid=23116 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/470/file0" dev="sda1" ino=16945 res=1 09:47:29 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r4 = dup2(r3, r3) write$FUSE_IOCTL(r4, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) 09:47:29 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:47:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x68}}, 0x0) 09:47:29 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00', 0x0, 0x4}, {@local}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) 09:47:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x0, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:47:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_int(r2, 0x0, 0x13, &(0x7f0000000000)=0xffff0000, 0x4) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) io_submit(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) open(0x0, 0x0, 0x0) 09:47:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:47:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x54}}, 0x0) [ 915.883238][T23127] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 915.892767][T23127] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 1, start aa1414ac) [ 915.903014][T23127] FAT-fs (loop0): Filesystem has been set read-only 09:47:30 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:47:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, 0xffffffffffffffff) socket(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x2, 0x0, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x2}, 0x40) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40) dup2(r1, 0xffffffffffffffff) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) preadv(r3, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/214, 0xd6}, {&(0x7f00000006c0)=""/194, 0xc2}, {&(0x7f00000007c0)=""/146, 0x92}, {&(0x7f0000000880)=""/144, 0x90}, {0x0}, {&(0x7f0000000940)=""/71, 0x47}], 0x7, 0x0) 09:47:30 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x208200}]) 09:47:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x54}}, 0x0) [ 920.018254][ T32] audit: type=1800 audit(1583920054.079:148): pid=23164 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16849 res=0 [ 920.042201][ T32] audit: type=1804 audit(1583920054.089:149): pid=23164 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/471/file0" dev="sda1" ino=16849 res=1 09:47:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x54}}, 0x0) 09:47:36 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:47:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:47:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=""/7, 0x7) 09:47:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f00000000c0)={0x9}) 09:47:36 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400), 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:47:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f00000000c0)) 09:47:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x74}}, 0x0) 09:47:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:47:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @loopback=0x7f000002}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000180)) 09:47:37 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400), 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:47:37 executing program 5: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 09:47:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) [ 928.735596][ T32] audit: type=1800 audit(1583920062.799:150): pid=23215 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16533 res=0 [ 928.759199][ T32] audit: type=1804 audit(1583920062.799:151): pid=23215 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/472/file0" dev="sda1" ino=16533 res=1 09:47:43 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:47:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f00000000c0)={0xfff}) 09:47:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x74}}, 0x0) 09:47:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:47:43 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400), 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:47:43 executing program 5: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 09:47:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x74}}, 0x0) 09:47:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x40) 09:47:43 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:47:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1}, 0x40) 09:47:43 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:47:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x1405}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x68}}, 0x0) [ 935.456964][ T32] audit: type=1800 audit(1583920069.519:152): pid=23257 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16833 res=0 [ 935.481144][ T32] audit: type=1804 audit(1583920069.519:153): pid=23257 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/473/file0" dev="sda1" ino=16833 res=1 09:47:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1}, 0x40) 09:47:50 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:47:50 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:47:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x1405}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x68}}, 0x0) 09:47:50 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:47:50 executing program 5: bpf$MAP_CREATE(0x3100000000000000, &(0x7f0000000140)={0xa, 0x1, 0x7ffe, 0x81, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100]}, 0x40) r0 = socket(0x10, 0x803, 0x0) write(r0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r3, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x3, 0x0, 0xffffffff}, &(0x7f00000001c0)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)=0x8}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x4}, 0x10, r4}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r2, 0x10, &(0x7f0000000380)={&(0x7f00000002c0)=""/185, 0xb9, r4}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 09:47:50 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:47:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x1405}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x2}}, 0x68}}, 0x0) 09:47:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x1a, 0x4, 0x0, 0x1}, 0x40) 09:47:51 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:47:51 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:47:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000180)) 09:47:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) [ 943.135260][ T32] audit: type=1800 audit(1583920077.199:154): pid=23302 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16849 res=0 [ 943.158975][ T32] audit: type=1804 audit(1583920077.199:155): pid=23302 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/474/file0" dev="sda1" ino=16849 res=1 09:47:57 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb010018000000000000003b0000003b00000006000000100000000000000801000000100000000100000f03000000050000000000000002000000effd3300000000"], 0x0, 0x43, 0x0, 0x1}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:47:57 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:47:57 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:47:57 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(0x0, 0x0, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() 09:47:57 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, 0x0, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:47:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback=0x7f00000b}, {0x2, 0x0, @remote}, 0x27, 0x0, 0xd2}) [ 943.528738][T23311] ptrace attach of "/root/syz-executor.3"[23309] was attempted by "/root/syz-executor.3"[23311] 09:47:57 executing program 3: r0 = socket(0x10, 0x803, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x200800000000001) 09:47:57 executing program 5: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020105000000012e0200ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 09:47:57 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:47:58 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, 0x0, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:47:58 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb010018000000000000003b0000003b00000006000000100000000000000801000000100000000100000f03000000050000000000000002000000effd33000000000100000d00000000000000000000000000000004000000014e8131ba9263e1b020520eb7b11476bb8a7baec74daf739c36ed2c39b21a2944956c4e39d22016eeb12b4bad7e317ef3422db9f971f24b5f6699fe92a3c93bb0e1ffc094c37cd00fbd20a201bd1bafeddc33aeb20771394a7491ec117db4c9fe02a231b9991b17c5bdeda5f8dbbbd366a26e7b3f1a19d3a940d41eb418dcf29b27c4c1fcebc9d8a8218f12b6"], 0x0, 0xe7}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 944.264699][T23328] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 944.270227][T23328] loop5: partition table partially beyond EOD, truncated [ 944.278124][T23328] loop5: p1 start 142849 is beyond EOD, truncated [ 944.285478][T23328] loop5: p2 size 1073741824 extends beyond EOD, truncated 09:47:58 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:47:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f", 0x7c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 944.413541][T23328] loop5: p3 size 2 extends beyond EOD, truncated [ 944.436787][T23338] ptrace attach of "/root/syz-executor.3"[23337] was attempted by "/root/syz-executor.3"[23338] [ 944.496303][T23328] loop5: p4 size 32768 extends beyond EOD, truncated [ 944.573204][T23328] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 944.623174][T23328] loop5: p6 size 32768 extends beyond EOD, truncated [ 944.705577][T23349] ptrace attach of "/root/syz-executor.3"[23348] was attempted by "/root/syz-executor.3"[23349] [ 950.097551][ T32] audit: type=1800 audit(1583920084.159:156): pid=23365 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16833 res=0 [ 950.121394][ T32] audit: type=1804 audit(1583920084.159:157): pid=23365 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/475/file0" dev="sda1" ino=16833 res=1 09:48:04 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:48:04 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:04 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) syz_open_procfs(0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x3) creat(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000000280)=""/67) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@newlink={0x48, 0x10, 0x705, 0xfffffffe, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VTI_REMOTE={0x8, 0x5, @loopback=0x7f000005}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xfffffffa}]]}}}, @IFLA_MASTER={0x8}]}, 0x48}}, 0x0) 09:48:04 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:04 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, 0x0, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:48:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x0, @loopback}, {0x8, 0x0, @loopback=0x7f00000b}, {0x2, 0x0, @remote}, 0x27, 0x0, 0xd2}) 09:48:04 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:04 executing program 5: readv(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x38}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10444, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$search(0xa, r0, &(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x5, 0x8000, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xa], 0x0, 0xffffffffffffffff, 0x600}, 0x3c) socket$can_raw(0x1d, 0x3, 0x1) socket$packet(0x11, 0x2, 0x300) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000340)={r4, 0x16}, &(0x7f00000007c0)={'enc=', 'raw', ' hash=', {'cmac-aes-neon\x00'}}, &(0x7f0000000740)="c471c4abf2f31d4062ef19429d6378f86286ac6ad75a", 0x0) keyctl$search(0xa, r3, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x2}, r4) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000000800)="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", 0x200) socketpair$unix(0x1, 0x5, 0x0, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000200)={0x18, 0x0, 0x0, {0x7}}, 0x18) sendfile(r2, r5, 0x0, 0x10000) [ 950.940670][ T32] audit: type=1800 audit(1583920084.999:158): pid=23385 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16689 res=0 [ 950.964660][ T32] audit: type=1804 audit(1583920084.999:159): pid=23385 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir149392003/syzkaller.nFLbew/513/file0" dev="sda1" ino=16689 res=1 09:48:05 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:05 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:48:05 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) [ 951.794662][ T32] audit: type=1804 audit(1583920085.859:160): pid=23397 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir149392003/syzkaller.nFLbew/513/file0" dev="sda1" ino=16689 res=1 09:48:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000140)='./bus\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) [ 953.468472][ T32] audit: type=1800 audit(1583920087.529:161): pid=23380 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16801 res=0 09:48:11 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:48:11 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:48:11 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:11 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffff50ffaaaaaaaaaabb86dd60000380000a3a00e514d84000000500fc00000000480000ff0200000000000000000000000000018000907800000000"], 0x0) 09:48:11 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) 09:48:12 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) 09:48:12 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:12 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:48:12 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:12 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:48:12 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) [ 964.174458][ T32] audit: type=1800 audit(1583920098.239:162): pid=23451 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16560 res=0 [ 964.198383][ T32] audit: type=1804 audit(1583920098.239:163): pid=23451 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/477/file0" dev="sda1" ino=16560 res=1 09:48:18 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) dup2(r4, r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:48:18 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x182) sendfile(r0, r0, 0x0, 0x24000000) 09:48:18 executing program 3: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) pipe(&(0x7f0000000100)) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x20000003}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfffffffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x9c}}, 0x0) 09:48:18 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:48:18 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 09:48:19 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f00000004c0)=']selfeth1\x0f\x9e^\x00', 0x0) pwritev(r1, &(0x7f0000001400)=[{&(0x7f00000002c0)='\'', 0x1}], 0x1, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) 09:48:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) preadv(r3, &(0x7f00000055c0)=[{&(0x7f0000003500)=""/4096, 0x1000}, {&(0x7f00000045c0)=""/4096, 0x1000}], 0x2, 0x0) write$FUSE_DIRENT(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="580000000000000002000000000000000700000000100000000000000000000006000000273a656d307b0000000038f825382d3800ddf4f109dbf6ee5382000000000000000000000a000001000000002f6465762f637573650000000000"], 0x58) 09:48:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) [ 965.217749][T23481] CUSE: DEVNAME unspecified [ 965.273026][T23483] CUSE: DEVNAME unspecified 09:48:19 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:19 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) [ 970.975630][ T32] audit: type=1800 audit(1583920105.039:164): pid=23504 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16566 res=0 [ 970.999372][ T32] audit: type=1804 audit(1583920105.049:165): pid=23504 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/478/file0" dev="sda1" ino=16566 res=1 09:48:25 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) dup2(r4, r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:48:25 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:48:25 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:25 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) 09:48:25 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:48:25 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:25 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) 09:48:25 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:25 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) 09:48:25 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) write(r1, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) 09:48:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) [ 977.624370][ T32] audit: type=1800 audit(1583920111.689:166): pid=23542 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16598 res=0 [ 977.648088][ T32] audit: type=1804 audit(1583920111.689:167): pid=23542 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/479/file0" dev="sda1" ino=16598 res=1 09:48:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f00000004c0)=']selfeth1\x0f\x9e^\x00', 0x0) pwritev(r1, &(0x7f0000001400)=[{&(0x7f00000002c0)='\'', 0x1}], 0x1, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) write$FUSE_LK(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x8, {{0x190, 0x6}}}, 0x28) 09:48:31 executing program 0: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(0xffffffffffffffff, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:31 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) dup2(r4, r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:48:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 09:48:31 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) 09:48:32 executing program 0: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(0xffffffffffffffff, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:32 executing program 5: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) listen(0xffffffffffffffff, 0x0) r1 = dup(r0) write$P9_RMKDIR(r1, 0x0, 0x477707816cf80699) 09:48:32 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSID(r0, 0x5429, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x10, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x0, 0x0) 09:48:32 executing program 0: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(0xffffffffffffffff, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:32 executing program 0: r0 = socket(0x0, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 09:48:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:48:32 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) [ 984.256366][ T32] audit: type=1800 audit(1583920118.319:168): pid=23593 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16626 res=0 [ 984.280246][ T32] audit: type=1804 audit(1583920118.319:169): pid=23593 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/480/file0" dev="sda1" ino=16626 res=1 09:48:38 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r4, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:48:38 executing program 0: r0 = socket(0x0, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 09:48:38 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$ptys(0xc, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:48:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:48:38 executing program 2: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(0xffffffffffffffff, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:38 executing program 2: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(0xffffffffffffffff, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:38 executing program 0: r0 = socket(0x0, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 09:48:39 executing program 2: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(0xffffffffffffffff, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:39 executing program 0: r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:39 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 990.896170][ T32] audit: type=1800 audit(1583920124.959:170): pid=23643 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16656 res=0 [ 990.920276][ T32] audit: type=1804 audit(1583920124.959:171): pid=23643 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/481/file0" dev="sda1" ino=16656 res=1 09:48:45 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r4, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:48:45 executing program 2: r0 = socket(0x0, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:48:45 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 09:48:45 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 09:48:45 executing program 0: r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:48:45 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 09:48:45 executing program 2: r0 = socket(0x0, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:45 executing program 0: r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 09:48:45 executing program 2: r0 = socket(0x0, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) [ 997.536094][ T32] audit: type=1800 audit(1583920131.599:172): pid=23698 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16676 res=0 [ 997.560110][ T32] audit: type=1804 audit(1583920131.599:173): pid=23698 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/482/file0" dev="sda1" ino=16676 res=1 09:48:51 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r4, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:48:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:48:51 executing program 0: r0 = socket(0x40000000002, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 09:48:51 executing program 2: r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:51 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r2 = msgget$private(0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x0, 0x0) 09:48:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 09:48:52 executing program 2: r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:52 executing program 0: r0 = socket(0x40000000002, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 09:48:52 executing program 2: r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:52 executing program 0: r0 = socket(0x40000000002, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) [ 1002.176790][ T32] audit: type=1800 audit(1583920136.239:174): pid=23756 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16692 res=0 [ 1004.268990][ T32] audit: type=1804 audit(1583920138.329:175): pid=23756 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/483/file0" dev="sda1" ino=16692 res=1 09:48:58 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_IOCTL(r4, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:48:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 09:48:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:48:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000380)=""/157, 0x9d}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x1014a, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000001480)=[{&(0x7f00000000c0)=""/155, 0x9b}], 0x1) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet6_tcp(0x1c, 0x1, 0x0) listen(r6, 0x0) accept4$inet6(r6, 0x0, 0x0, 0x0) shutdown(r5, 0x0) shutdown(r2, 0x0) 09:48:58 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:58 executing program 2: r0 = socket(0x40000000002, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 09:48:58 executing program 2: r0 = socket(0x40000000002, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 09:48:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/204, 0xcc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e00695) shutdown(r1, 0x0) r3 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r3, 0x0) accept4$inet(r3, 0x0, 0x0, 0x0) shutdown(r2, 0x0) 09:48:59 executing program 2: r0 = socket(0x40000000002, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:48:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 1010.895378][ T32] audit: type=1800 audit(1583920144.959:176): pid=23812 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16579 res=0 09:49:05 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_IOCTL(r4, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:49:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:49:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/204, 0xcc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e00695) shutdown(r1, 0x0) r3 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r3, 0x0) accept4$inet(r3, 0x0, 0x0, 0x0) shutdown(r2, 0x0) 09:49:05 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 09:49:05 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x10}]}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 09:49:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x10}]}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 09:49:05 executing program 5: pipe(&(0x7f00005dcff8)) pipe(&(0x7f00005dcff8)) r0 = socket(0x1, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f00005dcff8)) pipe(&(0x7f00005dcff8)) pipe(&(0x7f00005dcff8)) pipe(&(0x7f00005dcff8)) r1 = socket(0x1, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) socket$inet(0x2, 0x2, 0x0) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = socket(0x1, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) select(0x7e764d91726b6591, &(0x7f00000004c0)={0xdeafbead}, 0x0, 0x0, 0x0) 09:49:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x10}]}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 09:49:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) r1 = dup2(r0, r0) write$P9_RLERRORu(r1, 0x0, 0x0) 09:49:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1015.375087][ T32] audit: type=1800 audit(1583920149.439:177): pid=23857 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16534 res=0 09:49:11 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_IOCTL(r4, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:49:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:49:11 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) shmget(0x0, 0x4000, 0x1, &(0x7f0000ffa000/0x4000)=nil) 09:49:11 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:11 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 09:49:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 09:49:11 executing program 5: 09:49:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 09:49:12 executing program 5: 09:49:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 09:49:12 executing program 5: [ 1024.016630][ T32] audit: type=1800 audit(1583920158.079:178): pid=23895 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16716 res=0 09:49:18 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r4 = dup2(r3, r3) write$FUSE_IOCTL(r4, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffa7) 09:49:18 executing program 5: 09:49:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 09:49:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:49:18 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:18 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000380)=""/157, 0x9d}, {0x0}, {0x0}, {0x0}], 0x4) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x1014a, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000001480)=[{&(0x7f00000000c0)=""/155, 0x9b}], 0x1) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet6_tcp(0x1c, 0x1, 0x0) listen(r6, 0x0) accept4$inet6(r6, 0x0, 0x0, 0x0) shutdown(r5, 0x0) shutdown(r2, 0x0) 09:49:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000340)=""/180, 0xb4}, {0x0}, {0x0}], 0x3}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x2769, 0x0, 0x0, 0x800e00506) shutdown(r1, 0x0) r3 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r3, 0x0) accept4$inet(r3, 0x0, 0x0, 0x0) shutdown(r2, 0x0) 09:49:18 executing program 4: 09:49:18 executing program 4: 09:49:19 executing program 4: 09:49:19 executing program 5: [ 1028.496204][ T32] audit: type=1800 audit(1583920162.559:179): pid=23937 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16736 res=0 09:49:25 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:25 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r4 = dup2(r3, r3) write$FUSE_IOCTL(r4, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffa7) 09:49:25 executing program 4: 09:49:25 executing program 5: 09:49:25 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:49:25 executing program 4: 09:49:25 executing program 5: 09:49:26 executing program 5: 09:49:26 executing program 4: 09:49:26 executing program 5: 09:49:26 executing program 4: 09:49:26 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) [ 1038.014826][ T32] audit: type=1800 audit(1583920172.079:180): pid=23972 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16748 res=0 09:49:32 executing program 4: 09:49:32 executing program 5: 09:49:32 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r4 = dup2(r3, r3) write$FUSE_IOCTL(r4, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffa7) 09:49:32 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:49:32 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:32 executing program 4: 09:49:32 executing program 5: 09:49:32 executing program 4: 09:49:32 executing program 5: 09:49:32 executing program 4: 09:49:32 executing program 5: 09:49:33 executing program 4: [ 1044.736014][ T32] audit: type=1800 audit(1583920178.799:181): pid=24005 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16759 res=0 09:49:39 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r4 = dup2(r3, r3) write$FUSE_IOCTL(r4, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) sendfile(r0, r2, 0x0, 0x7fffffa7) 09:49:39 executing program 5: 09:49:39 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:39 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:39 executing program 4: 09:49:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:49:40 executing program 4: 09:49:40 executing program 5: 09:49:40 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:40 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:40 executing program 4: 09:49:40 executing program 5: [ 1052.175823][ T32] audit: type=1800 audit(1583920186.239:182): pid=24038 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16593 res=0 [ 1052.202620][ T32] audit: type=1804 audit(1583920186.239:183): pid=24038 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/490/file0" dev="sda1" ino=16593 res=1 [ 1052.230647][ T32] audit: type=1804 audit(1583920186.239:184): pid=24038 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/490/file0" dev="sda1" ino=16593 res=1 09:49:47 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r4 = dup2(r3, r3) write$FUSE_IOCTL(r4, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) sendfile(r0, r2, 0x0, 0x7fffffa7) 09:49:47 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:47 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:47 executing program 4: 09:49:47 executing program 5: 09:49:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:49:47 executing program 5: 09:49:47 executing program 4: 09:49:47 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:47 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:47 executing program 5: 09:49:47 executing program 4: [ 1059.776280][ T32] audit: type=1800 audit(1583920193.839:185): pid=24071 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16777 res=0 [ 1059.800622][ T32] audit: type=1804 audit(1583920193.849:186): pid=24071 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/491/file0" dev="sda1" ino=16777 res=1 [ 1059.830154][ T32] audit: type=1804 audit(1583920193.849:187): pid=24071 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/491/file0" dev="sda1" ino=16777 res=1 09:49:54 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r4 = dup2(r3, r3) write$FUSE_IOCTL(r4, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) sendfile(r0, r2, 0x0, 0x7fffffa7) 09:49:54 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:54 executing program 5: 09:49:54 executing program 4: 09:49:54 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:49:54 executing program 4: 09:49:54 executing program 5: 09:49:54 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:54 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:49:54 executing program 5: 09:49:54 executing program 4: [ 1066.419970][ T32] audit: type=1800 audit(1583920200.479:188): pid=24104 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16781 res=0 [ 1066.443760][ T32] audit: type=1804 audit(1583920200.489:189): pid=24104 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/492/file0" dev="sda1" ino=16781 res=1 [ 1066.472663][ T32] audit: type=1804 audit(1583920200.489:190): pid=24104 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/492/file0" dev="sda1" ino=16781 res=1 09:50:00 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:00 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:50:00 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:00 executing program 5: 09:50:00 executing program 4: 09:50:00 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:50:01 executing program 4: 09:50:01 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:01 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:01 executing program 5: 09:50:01 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:01 executing program 5: 09:50:01 executing program 4: [ 1073.057993][ T32] audit: type=1800 audit(1583920207.119:191): pid=24140 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16785 res=0 [ 1073.081795][ T32] audit: type=1804 audit(1583920207.119:192): pid=24140 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/493/file0" dev="sda1" ino=16785 res=1 09:50:07 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:50:07 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:50:07 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:07 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080), 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:07 executing program 5: 09:50:07 executing program 4: 09:50:07 executing program 5: 09:50:07 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080), 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:07 executing program 4: 09:50:07 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080), 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:07 executing program 5: 09:50:07 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080), 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:08 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) [ 1079.775664][ T32] audit: type=1800 audit(1583920213.839:193): pid=24177 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16579 res=0 [ 1079.799703][ T32] audit: type=1804 audit(1583920213.839:194): pid=24177 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/494/file0" dev="sda1" ino=16579 res=1 09:50:14 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:50:14 executing program 4: 09:50:14 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080), 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:14 executing program 5: 09:50:14 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080), 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:14 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:50:14 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:50:14 executing program 5: 09:50:14 executing program 4: 09:50:14 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:14 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:14 executing program 4: [ 1084.426800][ T32] audit: type=1800 audit(1583920218.489:195): pid=24212 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16797 res=0 [ 1084.450637][ T32] audit: type=1804 audit(1583920218.489:196): pid=24212 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/495/file0" dev="sda1" ino=16797 res=1 09:50:20 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r4 = dup2(r3, r3) write$FUSE_IOCTL(r4, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) sendfile(r0, r2, 0x0, 0x7fffffa7) 09:50:20 executing program 5: 09:50:20 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:50:20 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:20 executing program 4: 09:50:20 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:20 executing program 5: 09:50:20 executing program 4: 09:50:21 executing program 5: 09:50:21 executing program 4: 09:50:21 executing program 5: 09:50:21 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) [ 1093.616846][ T32] audit: type=1800 audit(1583920227.679:197): pid=24244 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16806 res=0 [ 1093.642090][ T32] audit: type=1804 audit(1583920227.679:198): pid=24244 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/496/file0" dev="sda1" ino=16806 res=1 [ 1093.670132][ T32] audit: type=1804 audit(1583920227.689:199): pid=24244 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/496/file0" dev="sda1" ino=16806 res=1 09:50:27 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r4 = dup2(r3, r3) write$FUSE_IOCTL(r4, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) sendfile(r0, r2, 0x0, 0x7fffffa7) 09:50:27 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:27 executing program 4: 09:50:27 executing program 5: 09:50:27 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:27 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:50:28 executing program 5: 09:50:28 executing program 4: 09:50:28 executing program 5: 09:50:28 executing program 4: 09:50:28 executing program 5: 09:50:28 executing program 4: [ 1100.334709][ T32] audit: type=1800 audit(1583920234.399:200): pid=24273 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16673 res=0 [ 1100.358709][ T32] audit: type=1804 audit(1583920234.399:201): pid=24273 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/497/file0" dev="sda1" ino=16673 res=1 [ 1100.386724][ T32] audit: type=1804 audit(1583920234.399:202): pid=24273 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/497/file0" dev="sda1" ino=16673 res=1 09:50:34 executing program 4: 09:50:34 executing program 5: 09:50:34 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r4 = dup2(r3, r3) write$FUSE_IOCTL(r4, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) sendfile(r0, r2, 0x0, 0x7fffffa7) 09:50:34 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:34 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:34 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:50:34 executing program 5: 09:50:34 executing program 4: 09:50:35 executing program 5: 09:50:35 executing program 4: 09:50:35 executing program 4: 09:50:35 executing program 5: 09:50:35 executing program 4: 09:50:35 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) [ 1106.976981][ T32] audit: type=1800 audit(1583920241.039:203): pid=24309 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16811 res=0 [ 1107.084963][ T32] audit: type=1804 audit(1583920241.069:204): pid=24309 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/498/file0" dev="sda1" ino=16811 res=1 [ 1107.112909][ T32] audit: type=1804 audit(1583920241.069:205): pid=24309 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/498/file0" dev="sda1" ino=16811 res=1 09:50:41 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r4 = dup2(r3, r3) write$FUSE_IOCTL(r4, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x7fffffa7) 09:50:41 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:41 executing program 5: 09:50:41 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:41 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:50:41 executing program 4: 09:50:41 executing program 4: 09:50:41 executing program 5: 09:50:41 executing program 5: 09:50:41 executing program 4: 09:50:41 executing program 4: 09:50:42 executing program 5: 09:50:48 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r4 = dup2(r3, r3) write$FUSE_IOCTL(r4, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x7fffffa7) 09:50:48 executing program 4: 09:50:48 executing program 5: 09:50:48 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:48 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:48 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:50:48 executing program 5: 09:50:49 executing program 4: 09:50:49 executing program 5: 09:50:49 executing program 4: 09:50:49 executing program 4: 09:50:49 executing program 5: 09:50:55 executing program 5: 09:50:55 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r4 = dup2(r3, r3) write$FUSE_IOCTL(r4, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r5, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x7fffffa7) 09:50:55 executing program 4: 09:50:55 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:55 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:55 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:50:55 executing program 4: 09:50:55 executing program 5: 09:50:55 executing program 5: 09:50:55 executing program 4: 09:50:55 executing program 5: 09:50:56 executing program 4: 09:50:56 executing program 5: 09:50:59 executing program 1: r0 = open(0x0, 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:50:59 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:59 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:50:59 executing program 4: 09:50:59 executing program 5: 09:50:59 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:51:00 executing program 5: 09:51:00 executing program 4: 09:51:00 executing program 5: 09:51:00 executing program 4: 09:51:00 executing program 5: 09:51:00 executing program 4: 09:51:06 executing program 1: r0 = open(0x0, 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:51:06 executing program 5: 09:51:06 executing program 4: 09:51:06 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(0xffffffffffffffff, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:51:06 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(0xffffffffffffffff, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:51:06 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:51:06 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(0xffffffffffffffff, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:51:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) 09:51:06 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(0xffffffffffffffff, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:51:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:51:07 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(0xffffffffffffffff, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:51:07 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(0xffffffffffffffff, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, 0x0) 09:51:13 executing program 5: 09:51:13 executing program 4: 09:51:13 executing program 1: r0 = open(0x0, 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:51:13 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, 0x0, 0x0, 0x122, 0x0) 09:51:13 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, 0x0, 0x0, 0x122, 0x0) 09:51:13 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:51:13 executing program 4: 09:51:13 executing program 5: 09:51:13 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, 0x0, 0x0, 0x122, 0x0) 09:51:13 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, 0x0, 0x0, 0x122, 0x0) 09:51:13 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) creat(0x0, 0x0) uname(0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x43, 0x8001, 0x8, 0x0, 0x0, 0x1, 0x804, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x100, 0xfffffffc, 0x7, 0x100000001, 0xfffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x53b66ffad80b99, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(0x0, 0xe3) io_submit(0x0, 0x1, &(0x7f0000000500)=[0x0]) connect(0xffffffffffffffff, &(0x7f0000000340)=@ethernet={0x0, @local}, 0x80) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f00000000c0), 0x4) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f00000005c0)=""/129, 0x81}], 0x1, 0x400000000000) sendto$inet(0xffffffffffffffff, &(0x7f00000003c0)="cc0e88f8a2451785ade5e024855024bc89679679415429e403189483767fdbb1be3fa42f018cbbb4c0ec95aa27588edfebd7aabfe0ea8a2ae0e8abc10d5e38a99036b5a6c3ca7cd70d33f4251203059ecb513e342fe90a0cb0fd3c915f49b98ddc77d736fccd504e43a46afc606f082197638539f499fd991fb2ff2432791f87bd847aa0ec40db55df037160630c42ef61fe517572089d4414e8240000000000000000", 0xa3, 0x2404c804, &(0x7f00000001c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2000, 0x0) 09:51:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:51:13 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, 0x0, 0x0, 0x122, 0x0) [ 1140.069696][T24503] bridge0: port 1(bridge_slave_0) entered disabled state [ 1140.188166][T22299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1140.197923][T22299] bridge0: port 1(bridge_slave_0) entered blocking state [ 1140.205264][T22299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1140.369241][T24503] bridge0: port 1(bridge_slave_0) entered disabled state 09:51:19 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:51:19 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, 0x0, 0x0, 0x122, 0x0) 09:51:19 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40), 0x0, 0x122, 0x0) 09:51:19 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf2, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x2000, 0x0) ftruncate(0xffffffffffffffff, 0x10004) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x8, 0x11, r1, 0x0) ftruncate(r1, 0x10004) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x10004) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000002c0)=@v1={0x0, @adiantum, 0x8, "7a566e4bd8fcf815"}) sendfile(r1, r1, 0x0, 0x18000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000000)) 09:51:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:51:19 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, 0x0, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) [ 1145.878535][T22299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1145.888743][T22299] bridge0: port 1(bridge_slave_0) entered blocking state [ 1145.896122][T22299] bridge0: port 1(bridge_slave_0) entered forwarding state 09:51:20 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, 0x0, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:51:20 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40), 0x0, 0x122, 0x0) [ 1145.918718][ T32] audit: type=1804 audit(1583920279.979:206): pid=24531 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir137566825/syzkaller.QJKr2N/590/bus" dev="sda1" ino=16769 res=1 [ 1146.010255][ T32] audit: type=1800 audit(1583920280.029:207): pid=24533 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16769 res=0 [ 1146.033864][ T32] audit: type=1800 audit(1583920280.029:208): pid=24531 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16769 res=0 09:51:20 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) fcntl$addseals(r0, 0x409, 0x8) 09:51:20 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40), 0x0, 0x122, 0x0) 09:51:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:51:20 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40), 0x0, 0x122, 0x0) [ 1146.754664][T24553] bridge0: port 1(bridge_slave_0) entered disabled state [ 1146.848681][T24557] bridge0: port 1(bridge_slave_0) entered blocking state [ 1146.856071][T24557] bridge0: port 1(bridge_slave_0) entered forwarding state 09:51:26 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:51:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:51:26 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, 0x0, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:51:26 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40), 0x0, 0x122, 0x0) 09:51:26 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40), 0x0, 0x122, 0x0) 09:51:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:51:26 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:51:26 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:51:26 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1152.805284][T24568] bridge0: port 1(bridge_slave_0) entered disabled state 09:51:26 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:51:27 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:51:27 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x24, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1153.407199][T24576] bridge0: port 1(bridge_slave_0) entered disabled state [ 1153.591524][T24580] bridge0: port 1(bridge_slave_0) entered blocking state [ 1153.598772][T24580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1153.612760][T24511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1153.622254][T24511] bridge0: port 1(bridge_slave_0) entered blocking state [ 1153.629638][T24511] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1153.758878][T24598] bridge0: port 1(bridge_slave_0) entered disabled state 09:51:32 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:51:32 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 09:51:32 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x26, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:51:33 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:51:33 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:51:33 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1159.022122][T24605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1159.032869][T24605] bridge0: port 1(bridge_slave_0) entered blocking state [ 1159.040122][T24605] bridge0: port 1(bridge_slave_0) entered forwarding state 09:51:33 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9d7}], 0x1, 0x0) r1 = getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() syz_genetlink_get_family_id$smc(0x0) tkill(r4, 0x15) ptrace(0x10, r1) ptrace$cont(0x4204, r1, 0x2, 0x20007ff6) [ 1159.192126][T24621] bridge0: port 1(bridge_slave_0) entered disabled state 09:51:33 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1159.418044][T24625] bridge0: port 1(bridge_slave_0) entered blocking state [ 1159.425466][T24625] bridge0: port 1(bridge_slave_0) entered forwarding state 09:51:33 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1159.567063][T24616] bridge0: port 1(bridge_slave_0) entered disabled state 09:51:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() futimesat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)={{0x0, 0x2710}, {0x77359400}}) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x40) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000200)={0x55, 0xbc, 0x7, {0xd946}, {0x1859, 0x16ac}, @const={0x7, {0x40, 0x80, 0x7, 0x1}}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@flushpolicy={0x10, 0x1d, 0x409}, 0x10}}, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@flushpolicy={0x10, 0x1d, 0x409}, 0x10}}, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x2108040, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYRESOCT=r4, @ANYRES64=0x0], @ANYBLOB="2c726f6f746d7e64653d30303030303030302c757365725f69070018877f2165a074c692e9bd4959fbe6137d7414b6a0d471c8e0c8e8d7035f4f6ec94f1276cc82bb1820169de2ffbc803fb1962314d4e56ecd7af08cd0a5e23fd4ca39ecb3e8adabcc1d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c008437f8b478212abab4533c51c6599914fe"]) lseek(0xffffffffffffffff, 0x0, 0x0) pkey_alloc(0x0, 0x0) [ 1159.811744][T24635] bridge0: port 1(bridge_slave_0) entered disabled state 09:51:33 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) [ 1160.008307][T24636] bridge0: port 1(bridge_slave_0) entered blocking state [ 1160.015649][T24636] bridge0: port 1(bridge_slave_0) entered forwarding state 09:51:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) pipe(0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1160.216372][T24639] bridge0: port 1(bridge_slave_0) entered disabled state [ 1160.332013][T24640] bridge0: port 1(bridge_slave_0) entered blocking state [ 1160.339542][T24640] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1160.426735][T24635] bridge0: port 1(bridge_slave_0) entered disabled state [ 1160.528654][T24563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1160.538826][T24563] bridge0: port 1(bridge_slave_0) entered blocking state [ 1160.546157][T24563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1160.697797][T24651] bridge0: port 1(bridge_slave_0) entered disabled state 09:51:39 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x0, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:51:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:51:39 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:51:39 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 09:51:39 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:51:39 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(r1, 0xffffffffffffffff) 09:51:39 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') [ 1165.775738][T24668] bridge0: port 1(bridge_slave_0) entered disabled state [ 1166.006769][T12126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1166.018777][T12126] bridge0: port 1(bridge_slave_0) entered blocking state [ 1166.026135][T12126] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1166.037764][T12126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1166.048472][T12126] bridge0: port 1(bridge_slave_0) entered blocking state [ 1166.055759][T12126] bridge0: port 1(bridge_slave_0) entered forwarding state 09:51:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:51:40 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) [ 1166.544081][T24669] bridge0: port 1(bridge_slave_0) entered disabled state 09:51:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:51:40 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf64(r0, 0x0, 0x0) r1 = gettid() mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) 09:51:41 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') [ 1167.039126][T24689] bridge0: port 1(bridge_slave_0) entered disabled state [ 1167.190275][T24690] bridge0: port 1(bridge_slave_0) entered blocking state [ 1167.197654][T24690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1167.234023][T12126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1167.246153][T12126] bridge0: port 1(bridge_slave_0) entered blocking state [ 1167.253448][T12126] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1171.946779][ T32] audit: type=1800 audit(1583920306.009:209): pid=24720 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16862 res=0 [ 1171.970637][ T32] audit: type=1804 audit(1583920306.009:210): pid=24720 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/508/file0" dev="sda1" ino=16862 res=1 [ 1171.999041][ T32] audit: type=1804 audit(1583920306.009:211): pid=24720 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/508/file0" dev="sda1" ino=16862 res=1 09:51:48 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x0, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:51:48 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:51:48 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:51:48 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:51:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000003c0)='./file1\x00', 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x6}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) pipe(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, &(0x7f0000000300)) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r2, &(0x7f00000002c0)=[{&(0x7f0000000500)="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", 0x6c1}], 0x1) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000380)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:51:48 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') 09:51:48 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002d80)={@multicast2, @local}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) pipe(&(0x7f0000000200)) stat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000440)) stat(0x0, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000340)) setresgid(0x0, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000003c0)={{0xa, 0x0, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0xa, 0x4e22, 0x10001, @remote}, 0x9, [0x0, 0x6ba, 0x80]}, 0x5c) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000500)=ANY=[]) close(0xffffffffffffffff) [ 1174.691104][T24728] bridge0: port 1(bridge_slave_0) entered disabled state 09:51:49 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1175.190428][T24730] bridge0: port 1(bridge_slave_0) entered disabled state 09:51:49 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:51:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') recvmmsg(r0, &(0x7f0000007040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f000001d000)={0x14, r1, 0x709}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) connect$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) 09:51:49 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') [ 1175.441783][T24738] bridge0: port 1(bridge_slave_0) entered blocking state [ 1175.449181][T24738] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1175.463716][T24605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1175.475359][T24605] bridge0: port 1(bridge_slave_0) entered blocking state [ 1175.482736][T24605] bridge0: port 1(bridge_slave_0) entered forwarding state 09:51:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1175.839905][T24752] bridge0: port 1(bridge_slave_0) entered disabled state [ 1176.222931][T24767] bridge0: port 1(bridge_slave_0) entered disabled state [ 1176.476333][T24768] bridge0: port 1(bridge_slave_0) entered blocking state [ 1176.483725][T24768] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1176.499853][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1176.511579][T11741] bridge0: port 1(bridge_slave_0) entered blocking state [ 1176.518973][T11741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1180.817474][ T32] audit: type=1800 audit(1583920314.879:212): pid=24774 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16868 res=0 [ 1180.847370][ T32] audit: type=1804 audit(1583920314.909:213): pid=24774 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/509/file0" dev="sda1" ino=16868 res=1 [ 1180.875502][ T32] audit: type=1804 audit(1583920314.909:214): pid=24774 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/509/file0" dev="sda1" ino=16868 res=1 09:51:55 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x0, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:51:55 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:51:55 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:51:55 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') 09:51:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@flushpolicy={0x10, 0x1d, 0x409}, 0x10}}, 0x0) 09:51:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1181.353461][T24778] bridge0: port 1(bridge_slave_0) entered disabled state 09:51:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 09:51:55 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1181.904770][T24782] bridge0: port 1(bridge_slave_0) entered disabled state 09:51:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@flushpolicy={0x10, 0x1d, 0x409}, 0x10}}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) [ 1182.071731][T24792] bridge0: port 1(bridge_slave_0) entered blocking state [ 1182.079087][T24792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1182.099166][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1182.110923][ T17] bridge0: port 1(bridge_slave_0) entered blocking state 09:51:56 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') 09:51:56 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) [ 1182.118316][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state 09:51:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1182.383989][T24799] bridge0: port 1(bridge_slave_0) entered disabled state [ 1182.561111][T24800] bridge0: port 1(bridge_slave_0) entered blocking state [ 1182.568473][T24800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1183.101884][T24815] bridge0: port 1(bridge_slave_0) entered disabled state [ 1183.227025][T24506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1183.236862][T24506] bridge0: port 1(bridge_slave_0) entered blocking state [ 1183.244190][T24506] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1187.457485][ T32] audit: type=1800 audit(1583920321.519:215): pid=24821 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16875 res=0 [ 1187.481272][ T32] audit: type=1804 audit(1583920321.539:216): pid=24821 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/510/file0" dev="sda1" ino=16875 res=1 [ 1187.509458][ T32] audit: type=1804 audit(1583920321.539:217): pid=24821 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/510/file0" dev="sda1" ino=16875 res=1 09:52:01 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x0, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:52:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@flushpolicy={0x10, 0x1d, 0x409}, 0x10}}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 09:52:01 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = socket(0x11, 0x800000003, 0x0) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x17, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:01 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:52:01 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') 09:52:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000001c0)={@rand_addr="4a88439e92eee431aa7f52ec08b0cfee"}) sendmsg$inet(r0, &(0x7f0000000540)={&(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000400)=[@ip_retopts={{0x10}}, @ip_retopts={{0x18, 0x0, 0x7, {[@cipso={0x86, 0x6}]}}}], 0x28}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) [ 1188.036199][T24827] bridge0: port 1(bridge_slave_0) entered disabled state 09:52:02 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') [ 1188.431871][T24831] bridge0: port 1(bridge_slave_0) entered disabled state [ 1188.634921][T24840] bridge0: port 1(bridge_slave_0) entered blocking state [ 1188.642198][T24840] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1188.659197][T12126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1188.670894][T12126] bridge0: port 1(bridge_slave_0) entered blocking state 09:52:02 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) [ 1188.678212][T12126] bridge0: port 1(bridge_slave_0) entered forwarding state 09:52:02 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') 09:52:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = socket(0x11, 0x800000003, 0x0) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x17, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:02 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1189.411978][T24856] bridge0: port 1(bridge_slave_0) entered disabled state [ 1189.655876][T24857] bridge0: port 1(bridge_slave_0) entered disabled state [ 1189.825442][T24562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1189.837766][T24562] bridge0: port 1(bridge_slave_0) entered blocking state [ 1189.845221][T24562] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1189.856805][T24562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1189.866759][T24562] bridge0: port 1(bridge_slave_0) entered blocking state [ 1189.874140][T24562] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1194.105458][ T32] audit: type=1800 audit(1583920328.169:218): pid=24872 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16879 res=0 [ 1194.129342][ T32] audit: type=1804 audit(1583920328.169:219): pid=24872 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/511/file0" dev="sda1" ino=16879 res=1 [ 1194.157790][ T32] audit: type=1804 audit(1583920328.169:220): pid=24872 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/511/file0" dev="sda1" ino=16879 res=1 09:52:08 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x0, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:52:08 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') 09:52:08 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 09:52:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = socket(0x11, 0x800000003, 0x0) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x17, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:08 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:08 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:08 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') [ 1194.663985][T24880] bridge0: port 1(bridge_slave_0) entered disabled state 09:52:09 executing program 4: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') [ 1194.901818][T24885] EXT4-fs (sda1): re-mounted. Opts: max_dir_size_kb=0x0000000000000001, [ 1195.027021][T24896] EXT4-fs (sda1): re-mounted. Opts: max_dir_size_kb=0x0000000000000001, [ 1195.074061][T24882] bridge0: port 1(bridge_slave_0) entered disabled state 09:52:09 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:09 executing program 4: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') [ 1195.276979][T24888] bridge0: port 1(bridge_slave_0) entered blocking state [ 1195.284348][T24888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1195.303442][T24608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1195.315091][T24608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1195.322438][T24608] bridge0: port 1(bridge_slave_0) entered forwarding state 09:52:09 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf2, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000002c0)=@v1={0x0, @adiantum, 0x8, "7a566e4bd8fcf815"}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18000) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000000)) 09:52:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x17, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1195.643245][T24908] EXT4-fs (sda1): re-mounted. Opts: max_dir_size_kb=0x0000000000000001, [ 1195.990234][T24921] bridge0: port 1(bridge_slave_0) entered disabled state [ 1196.111954][T24927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1196.122170][T24927] bridge0: port 1(bridge_slave_0) entered blocking state [ 1196.129496][T24927] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1200.817319][ T32] audit: type=1800 audit(1583920334.879:221): pid=24929 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16881 res=0 [ 1200.841162][ T32] audit: type=1804 audit(1583920334.879:222): pid=24929 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/512/file0" dev="sda1" ino=16881 res=1 [ 1200.869372][ T32] audit: type=1804 audit(1583920334.879:223): pid=24929 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/512/file0" dev="sda1" ino=16881 res=1 09:52:15 executing program 4: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') 09:52:15 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x0, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:52:15 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:15 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x0, 0x40042) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) dup3(r0, r1, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x238000) socket$inet6_udp(0xa, 0x2, 0x0) 09:52:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x17, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:15 executing program 4: r0 = creat(0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') [ 1201.175968][T24937] EXT4-fs (sda1): re-mounted. Opts: max_dir_size_kb=0x0000000000000001, 09:52:15 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:15 executing program 4: r0 = creat(0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') 09:52:15 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf64(r0, 0x0, 0x0) r1 = gettid() mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x23) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 1201.568085][T24935] bridge0: port 1(bridge_slave_0) entered disabled state [ 1201.873175][T24960] EXT4-fs (sda1): re-mounted. Opts: max_dir_size_kb=0x0000000000000001, 09:52:16 executing program 4: r0 = creat(0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') 09:52:16 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:16 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') [ 1202.331410][T24941] bridge0: port 1(bridge_slave_0) entered disabled state [ 1202.599602][T24948] bridge0: port 1(bridge_slave_0) entered blocking state [ 1202.607061][T24948] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1202.631932][T24562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1202.644074][T24562] bridge0: port 1(bridge_slave_0) entered blocking state [ 1202.651388][T24562] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1207.698733][ T32] audit: type=1800 audit(1583920341.759:224): pid=24993 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16887 res=0 [ 1207.722605][ T32] audit: type=1804 audit(1583920341.759:225): pid=24993 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/513/file0" dev="sda1" ino=16887 res=1 [ 1207.751061][ T32] audit: type=1804 audit(1583920341.769:226): pid=24993 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/513/file0" dev="sda1" ino=16887 res=1 09:52:22 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:52:22 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') 09:52:22 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:22 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:22 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x17, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:22 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') gettid() mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 09:52:23 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') 09:52:23 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:23 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, 0x0, 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') [ 1209.366494][T24999] bridge0: port 1(bridge_slave_0) entered disabled state 09:52:23 executing program 2: mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:23 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, 0x0, 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') 09:52:24 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, 0x0, 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') [ 1209.947349][T25001] bridge0: port 1(bridge_slave_0) entered disabled state [ 1210.176698][T25010] bridge0: port 1(bridge_slave_0) entered blocking state [ 1210.184059][T25010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1210.205658][T24608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1210.217171][T24608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1210.224515][T24608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1215.457722][ T32] audit: type=1800 audit(1583920349.519:227): pid=25048 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16911 res=0 [ 1215.481850][ T32] audit: type=1804 audit(1583920349.519:228): pid=25048 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/514/file0" dev="sda1" ino=16911 res=1 09:52:29 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:52:29 executing program 2: mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:29 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @initdev, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000380)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x26, r2}) r3 = dup(r1) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/udplite6\x00') ioctl$SNDRV_TIMER_IOCTL_INFO(r4, 0x80e85411, &(0x7f0000000040)=""/180) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x208240, 0x0) 09:52:29 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') 09:52:29 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:30 executing program 2: mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) [ 1216.177752][T25059] bridge0: port 1(bridge_slave_0) entered disabled state [ 1216.323292][T24562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1216.334790][T24562] bridge0: port 1(bridge_slave_0) entered blocking state [ 1216.342020][T24562] bridge0: port 1(bridge_slave_0) entered forwarding state 09:52:30 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) r2 = dup(r1) read$FUSE(r2, &(0x7f0000003140), 0x5e3) ioctl$SIOCSIFHWADDR(r2, 0x8924, 0x0) socket$packet(0x11, 0x0, 0x300) 09:52:30 executing program 2: creat(0x0, 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:30 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = socket(0x11, 0x800000003, 0x0) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:30 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') [ 1217.216451][T25094] bridge0: port 1(bridge_slave_0) entered disabled state [ 1217.365059][T24608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1217.376433][T24608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1217.383759][T24608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1222.015814][ T32] audit: type=1800 audit(1583920356.079:229): pid=25105 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16534 res=0 [ 1222.039541][ T32] audit: type=1804 audit(1583920356.079:230): pid=25105 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/515/file0" dev="sda1" ino=16534 res=1 09:52:36 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:52:36 executing program 3: fremovexattr(0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'ip_vti0\x00', 0x201e}) dup2(r0, r1) 09:52:36 executing program 2: creat(0x0, 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:36 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:36 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = socket(0x11, 0x800000003, 0x0) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:36 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') 09:52:36 executing program 2: creat(0x0, 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) [ 1222.683488][T25110] bridge0: port 1(bridge_slave_0) entered disabled state 09:52:36 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) [ 1222.998763][T25119] bridge0: port 1(bridge_slave_0) entered blocking state [ 1223.006133][T25119] bridge0: port 1(bridge_slave_0) entered forwarding state 09:52:37 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind$packet(r5, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:37 executing program 5: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x17, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:37 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') 09:52:37 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = socket(0x11, 0x800000003, 0x0) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1223.692908][T25144] bridge0: port 1(bridge_slave_0) entered disabled state [ 1223.802107][T25147] bridge0: port 1(bridge_slave_0) entered blocking state [ 1223.809468][T25147] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1223.916741][T25150] bridge0: port 1(bridge_slave_0) entered disabled state [ 1223.970812][T25152] bridge0: port 1(bridge_slave_0) entered blocking state [ 1223.978185][T25152] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1224.089346][T25144] bridge0: port 1(bridge_slave_0) entered disabled state [ 1224.151906][T25156] bridge0: port 1(bridge_slave_0) entered blocking state [ 1224.159182][T25156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1226.496801][ T32] audit: type=1800 audit(1583920360.559:231): pid=25159 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16865 res=0 [ 1226.520595][ T32] audit: type=1804 audit(1583920360.559:232): pid=25159 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/516/file0" dev="sda1" ino=16865 res=1 09:52:42 executing program 5: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x17, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:42 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:42 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, 0x0, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:52:42 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') 09:52:42 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:42 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, 0x0) 09:52:43 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:43 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 09:52:43 executing program 5: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x17, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:43 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') [ 1229.246249][T25167] bridge0: port 1(bridge_slave_0) entered disabled state 09:52:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000002640)) ioprio_set$uid(0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") syz_genetlink_get_family_id$nl80211(0x0) pipe(&(0x7f0000000d00)={0xffffffffffffffff}) flock(r2, 0x6) getpeername$packet(r2, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=r4, @ANYBLOB="000000000000000008000400", @ANYRES32=0x0, @ANYBLOB="00041680"], 0x30}}, 0x0) r5 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x9811, r5, 0x8000000000000000) r6 = getpid() sched_setscheduler(r6, 0x5, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f00000024c0)={&(0x7f00000023c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000002480)={0x0}, 0x1, 0x0, 0x0, 0x20004080}, 0x20004001) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000001380)=""/4096) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x9811, r7, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0xfffffffffffffffd) ioctl$KVM_SET_LAPIC(r8, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) r9 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x9811, r9, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002380)={0x0, r9, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000}}, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r11, 0x800000c004500a, &(0x7f0000000240)) read$FUSE(r11, &(0x7f0000000380), 0x1000) [ 1229.540885][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1229.552248][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1229.559601][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state 09:52:43 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:43 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:43 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, 0x0) [ 1229.823525][T25207] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1229.869563][ T32] audit: type=1400 audit(1583920363.929:233): avc: denied { map } for pid=25202 comm="syz-executor.3" path="/dev/zero" dev="devtmpfs" ino=48 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file permissive=1 [ 1230.470085][T25221] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1233.377054][ T32] audit: type=1800 audit(1583920367.439:234): pid=25224 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16936 res=0 [ 1233.401205][ T32] audit: type=1804 audit(1583920367.439:235): pid=25224 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/517/file0" dev="sda1" ino=16936 res=1 09:52:47 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:47 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:47 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, 0x0, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:52:47 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:47 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, 0x0) 09:52:47 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) creat(0x0, 0x0) uname(&(0x7f00000004c0)=""/29) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x8, 0x0, 0x0, 0x1, 0x804, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x100, 0xfffffffc, 0x7, 0x0, 0xfffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x1, &(0x7f0000000500)=[0x0]) connect(0xffffffffffffffff, &(0x7f0000000340)=@ethernet={0x0, @local}, 0x80) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f00000000c0), 0x4) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f00000005c0)=""/129, 0x81}], 0x1, 0x400000000000) sendto$inet(0xffffffffffffffff, &(0x7f00000003c0)="cc0e88f8a2451785ade5e024855024bc89679679415429e403189483767fdbb1be3fa42f018cbbb4c0ec95aa27588edfebd7aabfe0ea8a2ae0e8abc10d5e38a99036b5a6c3ca7cd70d33f4251203059ecb513e342fe90a0cb0fd3c915f49b98ddc77d736fccd504e43a46afc606f082197638539f499fd991fb2ff2432791f87bd847aa0ec40db55df037160630c42ef61fe517572089d4414e8240000000000000000", 0xa3, 0x2404c804, &(0x7f00000001c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2000, 0x0) 09:52:47 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:47 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r0, 0x0) 09:52:48 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:48 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) creat(0x0, 0x0) uname(&(0x7f00000004c0)=""/29) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x8, 0x0, 0x0, 0x1, 0x804, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x100, 0xfffffffc, 0x7, 0x0, 0xfffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x1, &(0x7f0000000500)=[0x0]) connect(0xffffffffffffffff, &(0x7f0000000340)=@ethernet={0x0, @local}, 0x80) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f00000000c0), 0x4) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f00000005c0)=""/129, 0x81}], 0x1, 0x400000000000) sendto$inet(0xffffffffffffffff, &(0x7f00000003c0)="cc0e88f8a2451785ade5e024855024bc89679679415429e403189483767fdbb1be3fa42f018cbbb4c0ec95aa27588edfebd7aabfe0ea8a2ae0e8abc10d5e38a99036b5a6c3ca7cd70d33f4251203059ecb513e342fe90a0cb0fd3c915f49b98ddc77d736fccd504e43a46afc606f082197638539f499fd991fb2ff2432791f87bd847aa0ec40db55df037160630c42ef61fe517572089d4414e8240000000000000000", 0xa3, 0x2404c804, &(0x7f00000001c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2000, 0x0) [ 1234.161032][T25236] bridge0: port 1(bridge_slave_0) entered disabled state 09:52:48 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) [ 1234.430226][T24927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1234.442269][T24927] bridge0: port 1(bridge_slave_0) entered blocking state [ 1234.449808][T24927] bridge0: port 1(bridge_slave_0) entered forwarding state 09:52:48 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:48 executing program 4: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, &(0x7f0000000440)={[{@abort='abort'}]}) 09:52:48 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1235.043417][T25283] EXT4-fs error (device sda1): ext4_remount:5395: Abort forced by user [ 1235.051771][T25283] EXT4-fs (sda1): Remounting filesystem read-only [ 1235.121523][T25282] bridge0: port 1(bridge_slave_0) entered disabled state [ 1235.167122][T25288] EXT4-fs error (device sda1): ext4_remount:5395: Abort forced by user [ 1235.175782][T25288] EXT4-fs (sda1): Remounting filesystem read-only [ 1235.224590][T25286] bridge0: port 1(bridge_slave_0) entered blocking state [ 1235.231777][T25286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1240.026012][ T32] audit: type=1800 audit(1583920374.089:236): pid=25294 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16960 res=0 [ 1240.049797][ T32] audit: type=1804 audit(1583920374.089:237): pid=25294 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/518/file0" dev="sda1" ino=16960 res=1 09:52:54 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, 0x0, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:52:54 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:54 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) creat(0x0, 0x0) uname(&(0x7f00000004c0)=""/29) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x8, 0x0, 0x0, 0x1, 0x804, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x100, 0xfffffffc, 0x7, 0x0, 0xfffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x1, &(0x7f0000000500)=[0x0]) connect(0xffffffffffffffff, &(0x7f0000000340)=@ethernet={0x0, @local}, 0x80) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f00000000c0), 0x4) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f00000005c0)=""/129, 0x81}], 0x1, 0x400000000000) sendto$inet(0xffffffffffffffff, &(0x7f00000003c0)="cc0e88f8a2451785ade5e024855024bc89679679415429e403189483767fdbb1be3fa42f018cbbb4c0ec95aa27588edfebd7aabfe0ea8a2ae0e8abc10d5e38a99036b5a6c3ca7cd70d33f4251203059ecb513e342fe90a0cb0fd3c915f49b98ddc77d736fccd504e43a46afc606f082197638539f499fd991fb2ff2432791f87bd847aa0ec40db55df037160630c42ef61fe517572089d4414e8240000000000000000", 0xa3, 0x2404c804, &(0x7f00000001c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2000, 0x0) 09:52:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:54 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002d80)={@multicast2, @local}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) pipe(&(0x7f0000000200)) stat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000440)) stat(0x0, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000340)) setresgid(0x0, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000003c0)={{0xa, 0x0, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0xa, 0x4e22, 0x10001, @remote}, 0x9, [0x0, 0x6ba, 0x80]}, 0x5c) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00040000933d36e9a8f836f7306b1469871739bc460ca818329d8eb699aebdd49ff2b8eb1f0dff0b4672ae1092f870a92a6c6ce74a9f2953c1d250795d34f4ba660987eb3c797b1f84f2326866f30319d5c3b349000000000000", @ANYRESHEX, @ANYPTR64=&(0x7f00000001c0)=ANY=[], @ANYRESDEC=0x0, @ANYBLOB="2c0182", @ANYRESDEC=0x0, @ANYBLOB="2c007fd3d12bc3"]) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000500)=ANY=[]) close(0xffffffffffffffff) 09:52:54 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:54 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) creat(0x0, 0x0) uname(&(0x7f00000004c0)=""/29) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x8, 0x0, 0x0, 0x1, 0x804, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x100, 0xfffffffc, 0x7, 0x0, 0xfffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x1, &(0x7f0000000500)=[0x0]) connect(0xffffffffffffffff, &(0x7f0000000340)=@ethernet={0x0, @local}, 0x80) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f00000000c0), 0x4) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f00000005c0)=""/129, 0x81}], 0x1, 0x400000000000) sendto$inet(0xffffffffffffffff, &(0x7f00000003c0)="cc0e88f8a2451785ade5e024855024bc89679679415429e403189483767fdbb1be3fa42f018cbbb4c0ec95aa27588edfebd7aabfe0ea8a2ae0e8abc10d5e38a99036b5a6c3ca7cd70d33f4251203059ecb513e342fe90a0cb0fd3c915f49b98ddc77d736fccd504e43a46afc606f082197638539f499fd991fb2ff2432791f87bd847aa0ec40db55df037160630c42ef61fe517572089d4414e8240000000000000000", 0xa3, 0x2404c804, &(0x7f00000001c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2000, 0x0) 09:52:54 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:54 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@flushpolicy={0x10, 0x1d, 0x409}, 0x10}}, 0x0) 09:52:55 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) creat(0x0, 0x0) uname(&(0x7f00000004c0)=""/29) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x8, 0x0, 0x0, 0x1, 0x804, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x100, 0xfffffffc, 0x7, 0x0, 0xfffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x1, &(0x7f0000000500)=[0x0]) connect(0xffffffffffffffff, &(0x7f0000000340)=@ethernet={0x0, @local}, 0x80) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f00000000c0), 0x4) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f00000005c0)=""/129, 0x81}], 0x1, 0x400000000000) sendto$inet(0xffffffffffffffff, &(0x7f00000003c0)="cc0e88f8a2451785ade5e024855024bc89679679415429e403189483767fdbb1be3fa42f018cbbb4c0ec95aa27588edfebd7aabfe0ea8a2ae0e8abc10d5e38a99036b5a6c3ca7cd70d33f4251203059ecb513e342fe90a0cb0fd3c915f49b98ddc77d736fccd504e43a46afc606f082197638539f499fd991fb2ff2432791f87bd847aa0ec40db55df037160630c42ef61fe517572089d4414e8240000000000000000", 0xa3, 0x2404c804, &(0x7f00000001c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) [ 1244.658718][ T32] audit: type=1800 audit(1583920378.719:238): pid=25351 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16897 res=0 [ 1244.683340][ T32] audit: type=1804 audit(1583920378.729:239): pid=25351 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/519/file0" dev="sda1" ino=16897 res=1 09:52:58 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={0x0, 0x0, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:52:58 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:58 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x23) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) creat(&(0x7f0000000040)='./file0\x00', 0x0) 09:52:58 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:58 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) creat(0x0, 0x0) uname(&(0x7f00000004c0)=""/29) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x8, 0x0, 0x0, 0x1, 0x804, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x100, 0xfffffffc, 0x7, 0x0, 0xfffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x1, &(0x7f0000000500)=[0x0]) connect(0xffffffffffffffff, &(0x7f0000000340)=@ethernet={0x0, @local}, 0x80) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f00000000c0), 0x4) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f00000005c0)=""/129, 0x81}], 0x1, 0x400000000000) 09:52:59 executing program 0: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:52:59 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:59 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) creat(0x0, 0x0) uname(&(0x7f00000004c0)=""/29) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x8, 0x0, 0x0, 0x1, 0x804, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x100, 0xfffffffc, 0x7, 0x0, 0xfffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x1, &(0x7f0000000500)=[0x0]) connect(0xffffffffffffffff, &(0x7f0000000340)=@ethernet={0x0, @local}, 0x80) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f00000000c0), 0x4) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) 09:52:59 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:52:59 executing program 0: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1251.217698][ T32] audit: type=1800 audit(1583920385.279:240): pid=25413 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16967 res=0 [ 1251.241400][ T32] audit: type=1804 audit(1583920385.289:241): pid=25413 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/520/file0" dev="sda1" ino=16967 res=1 09:53:05 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) creat(0x0, 0x0) uname(&(0x7f00000004c0)=""/29) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x8, 0x0, 0x0, 0x1, 0x804, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x100, 0xfffffffc, 0x7, 0x0, 0xfffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x1, &(0x7f0000000500)=[0x0]) connect(0xffffffffffffffff, &(0x7f0000000340)=@ethernet={0x0, @local}, 0x80) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f00000000c0), 0x4) 09:53:05 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={0x0, 0x0, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:53:05 executing program 0: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:05 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:53:05 executing program 4: getpid() sched_setscheduler(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x7fffffff, 0x0, [{}, {}, {}, {}, {}, {0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xff}]}}) 09:53:05 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0xf, 0x11}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x10, 0x0}, 0x70) 09:53:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:05 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:53:06 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) creat(0x0, 0x0) uname(&(0x7f00000004c0)=""/29) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x8, 0x0, 0x0, 0x1, 0x804, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x100, 0xfffffffc, 0x7, 0x0, 0xfffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x1, &(0x7f0000000500)=[0x0]) connect(0xffffffffffffffff, &(0x7f0000000340)=@ethernet={0x0, @local}, 0x80) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) 09:53:06 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:53:06 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1252.452586][T25447] bridge0: port 1(bridge_slave_0) entered disabled state [ 1252.657635][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1252.668732][T11741] bridge0: port 1(bridge_slave_0) entered blocking state [ 1252.676102][T11741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1255.785885][ T32] audit: type=1800 audit(1583920389.849:242): pid=25477 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16977 res=0 [ 1257.858144][ T32] audit: type=1804 audit(1583920391.919:243): pid=25477 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/521/file0" dev="sda1" ino=16977 res=1 09:53:12 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={0x0, 0x0, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:53:12 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:53:12 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:12 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) creat(0x0, 0x0) uname(&(0x7f00000004c0)=""/29) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x8, 0x0, 0x0, 0x1, 0x804, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x100, 0xfffffffc, 0x7, 0x0, 0xfffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x1, &(0x7f0000000500)=[0x0]) connect(0xffffffffffffffff, &(0x7f0000000340)=@ethernet={0x0, @local}, 0x80) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) 09:53:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:53:12 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) creat(0x0, 0x0) uname(&(0x7f00000004c0)=""/29) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x8, 0x0, 0x0, 0x1, 0x804, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x100, 0xfffffffc, 0x7, 0x0, 0xfffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x1, &(0x7f0000000500)=[0x0]) connect(0xffffffffffffffff, &(0x7f0000000340)=@ethernet={0x0, @local}, 0x80) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x4000000000000001, 0x0) 09:53:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000080)={"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"}) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4138ae84, &(0x7f0000000000)) 09:53:12 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) [ 1258.491163][T25485] bridge0: port 1(bridge_slave_0) entered disabled state [ 1258.740435][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1258.750569][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1258.757972][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state 09:53:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1259.398604][T25529] bridge0: port 1(bridge_slave_0) entered disabled state [ 1259.451425][T25530] bridge0: port 1(bridge_slave_0) entered blocking state [ 1259.458948][T25530] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1262.495666][ T32] audit: type=1800 audit(1583920396.559:244): pid=25533 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16833 res=0 [ 1264.577039][ T32] audit: type=1804 audit(1583920398.639:245): pid=25533 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/522/file0" dev="sda1" ino=16833 res=1 09:53:19 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:53:19 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:53:19 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) creat(0x0, 0x0) uname(&(0x7f00000004c0)=""/29) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x8, 0x0, 0x0, 0x1, 0x804, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x100, 0xfffffffc, 0x7, 0x0, 0xfffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x1, &(0x7f0000000500)=[0x0]) connect(0xffffffffffffffff, &(0x7f0000000340)=@ethernet={0x0, @local}, 0x80) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:53:19 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x4) sendto$inet6(r0, &(0x7f0000000040)="4c00000012001f15b9409b849ac00a00a57840020000ffffff9e030038c88cc055c5ac27a6c5b068d0bf46d323456536005ad94a461cdbfee9bdb9b64a9b358451d1ec0cffc8792cd8000000", 0x4c, 0x0, 0x0, 0x0) 09:53:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x17, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:20 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:53:20 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) creat(0x0, 0x0) uname(&(0x7f00000004c0)=""/29) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x8, 0x0, 0x0, 0x1, 0x804, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x100, 0xfffffffc, 0x7, 0x0, 0xfffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x1, &(0x7f0000000500)=[0x0]) connect(0xffffffffffffffff, &(0x7f0000000340)=@ethernet={0x0, @local}, 0x80) 09:53:20 executing program 4: getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0x2400) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket(0x200000000000011, 0x3, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000034c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003580)=[{0x18, 0x0, 0x0, "a0"}, {0x10}, {0x10}], 0x38}}], 0x1, 0x0) getegid() [ 1266.125983][T25535] bridge0: port 1(bridge_slave_0) entered disabled state [ 1266.298608][T24927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1266.308768][T24927] bridge0: port 1(bridge_slave_0) entered blocking state [ 1266.316153][T24927] bridge0: port 1(bridge_slave_0) entered forwarding state 09:53:20 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:53:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x17, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1266.994675][T25578] bridge0: port 1(bridge_slave_0) entered disabled state [ 1267.184386][T25579] bridge0: port 1(bridge_slave_0) entered blocking state [ 1267.192700][T25579] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1271.934889][ T32] audit: type=1800 audit(1583920405.999:246): pid=25588 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16556 res=0 [ 1271.960129][ T32] audit: type=1804 audit(1583920405.999:247): pid=25588 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/523/file0" dev="sda1" ino=16556 res=1 09:53:26 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:53:26 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:53:26 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) creat(0x0, 0x0) uname(&(0x7f00000004c0)=""/29) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x8, 0x0, 0x0, 0x1, 0x804, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x100, 0xfffffffc, 0x7, 0x0, 0xfffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x1, &(0x7f0000000500)=[0x0]) 09:53:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x17, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4138ae84, &(0x7f0000000000)={0x0, 0x0, [0x0, 0x0, 0x68000000]}) 09:53:26 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:53:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x21, 0x4, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104ff00fd4354c0071100", 0xf) write(r3, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200), 0x0) syz_open_dev$vbi(0x0, 0x2, 0x2) pipe2(0x0, 0x0) socket(0x0, 0x80000, 0xf0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) bind$rds(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000400), 0xc, &(0x7f0000000540), 0x1, 0x0, 0x0, 0xc0884}, 0x4008040) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000040}, 0xc, &(0x7f0000000140)={&(0x7f0000001480)=ANY=[@ANYPTR, @ANYRESHEX=r4, @ANYRES32, @ANYPTR=&(0x7f0000001400)=ANY=[@ANYRESDEC], @ANYPTR64=&(0x7f0000001440)=ANY=[@ANYRESHEX], @ANYRES64=r3, @ANYRESHEX, @ANYRESDEC], 0x8}}, 0x9850) sendmsg$IPVS_CMD_DEL_SERVICE(r3, 0x0, 0x4000) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1272.639759][T25592] bridge0: port 1(bridge_slave_0) entered disabled state 09:53:26 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) [ 1272.834335][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1272.844380][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1272.851605][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state 09:53:27 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x17, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:27 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) creat(0x0, 0x0) uname(&(0x7f00000004c0)=""/29) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x8, 0x0, 0x0, 0x1, 0x804, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x100, 0xfffffffc, 0x7, 0x0, 0xfffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) 09:53:27 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1273.759987][T25634] bridge0: port 1(bridge_slave_0) entered disabled state [ 1273.883375][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1273.893363][T11741] bridge0: port 1(bridge_slave_0) entered blocking state [ 1273.900624][T11741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1276.574652][ T32] audit: type=1800 audit(1583920410.639:248): pid=25650 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16566 res=0 [ 1278.658114][ T32] audit: type=1804 audit(1583920412.719:249): pid=25650 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/524/file0" dev="sda1" ino=16566 res=1 09:53:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:32 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:53:32 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:53:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x1) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) syz_genetlink_get_family_id$gtp(0x0) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x28944}, 0x8080) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000340), &(0x7f0000000380)=0x8) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x2f, &(0x7f0000000200)={0xfffffffe}, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x240087bd, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000000)='\f', 0xfb386d1f6a4fd57d, 0x400800a, 0x0, 0xae19fea218018fd) recvfrom$inet(r3, &(0x7f0000000080)=""/8, 0xfffffffffffffe6a, 0x700, 0x0, 0xb84608a41099d4b8) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xfb, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@local, @empty={[0x0, 0x0, 0x0, 0x4]}, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c0270, r4}) 09:53:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x17, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:32 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) creat(0x0, 0x0) uname(&(0x7f00000004c0)=""/29) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x8, 0x0, 0x0, 0x1, 0x804, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x100, 0xfffffffc, 0x7, 0x0, 0xfffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) 09:53:33 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) [ 1279.294874][T25653] bridge0: port 1(bridge_slave_0) entered disabled state 09:53:33 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) creat(0x0, 0x0) uname(&(0x7f00000004c0)=""/29) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) 09:53:33 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) [ 1280.017602][T25660] bridge0: port 1(bridge_slave_0) entered disabled state [ 1280.334004][T25666] bridge0: port 1(bridge_slave_0) entered blocking state [ 1280.341277][T25666] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1280.363204][T24927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1280.374564][T24927] bridge0: port 1(bridge_slave_0) entered blocking state 09:53:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x1) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) syz_genetlink_get_family_id$gtp(0x0) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x28944}, 0x8080) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000340), &(0x7f0000000380)=0x8) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x2f, &(0x7f0000000200)={0xfffffffe}, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x240087bd, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000000)='\f', 0xfb386d1f6a4fd57d, 0x400800a, 0x0, 0xae19fea218018fd) recvfrom$inet(r3, &(0x7f0000000080)=""/8, 0xfffffffffffffe6a, 0x700, 0x0, 0xb84608a41099d4b8) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xfb, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@local, @empty={[0x0, 0x0, 0x0, 0x4]}, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c0270, r4}) [ 1280.381789][T24927] bridge0: port 1(bridge_slave_0) entered forwarding state 09:53:34 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}]}) 09:53:34 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x17, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:34 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1280.909093][T25713] bridge0: port 1(bridge_slave_0) entered disabled state [ 1281.023938][T24927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1281.033993][T24927] bridge0: port 1(bridge_slave_0) entered blocking state [ 1281.041236][T24927] bridge0: port 1(bridge_slave_0) entered forwarding state 09:53:35 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) creat(0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) [ 1281.452425][T25723] bridge0: port 1(bridge_slave_0) entered disabled state [ 1281.541438][T25724] bridge0: port 1(bridge_slave_0) entered blocking state [ 1281.548830][T25724] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1285.374256][ T32] audit: type=1800 audit(1583920419.439:250): pid=25736 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16574 res=0 09:53:40 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(0xffffffffffffffff, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:53:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x17, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:40 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, 0x0) 09:53:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) 09:53:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:40 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) [ 1286.450490][T25746] EXT4-fs error (device sda1): ext4_remount:5395: Abort forced by user [ 1286.459388][T25746] EXT4-fs (sda1): Remounting filesystem read-only 09:53:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x8, 0x0, 0x0, 0x0, 0x0) 09:53:40 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, 0x0) 09:53:40 executing program 4: open(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000000000000000"], 0x48}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="ec0100002800270d00"/20, @ANYRES32=r8, @ANYBLOB="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"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x11, 0x800000003, 0x0) bind(r10, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000c80)=ANY=[@ANYBLOB="ec0100002800270d00"/20, @ANYRES32=r11, @ANYBLOB="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"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 1286.976173][T25740] bridge0: port 1(bridge_slave_0) entered disabled state [ 1287.007646][T25769] EXT4-fs error (device sda1): ext4_remount:5395: Abort forced by user [ 1287.016350][T25769] EXT4-fs (sda1): Remounting filesystem read-only 09:53:41 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, 0x0) 09:53:41 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) [ 1287.475783][T25782] EXT4-fs error (device sda1): ext4_remount:5395: Abort forced by user [ 1287.484472][T25782] EXT4-fs (sda1): Remounting filesystem read-only [ 1287.521247][T25741] bridge0: port 1(bridge_slave_0) entered disabled state [ 1287.612299][T25753] bridge0: port 1(bridge_slave_0) entered blocking state [ 1287.619666][T25753] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1287.642839][T24927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1287.654341][T24927] bridge0: port 1(bridge_slave_0) entered blocking state [ 1287.661569][T24927] bridge0: port 1(bridge_slave_0) entered forwarding state 09:53:41 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)) [ 1287.971407][T25795] EXT4-fs error (device sda1): ext4_remount:5395: Abort forced by user [ 1287.980227][T25795] EXT4-fs (sda1): Remounting filesystem read-only [ 1290.656325][ T32] audit: type=1800 audit(1583920424.719:251): pid=25802 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16608 res=0 [ 1290.680161][ T32] audit: type=1804 audit(1583920424.719:252): pid=25802 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/526/file0" dev="sda1" ino=16608 res=1 [ 1290.708234][ T32] audit: type=1804 audit(1583920424.729:253): pid=25802 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/526/file0" dev="sda1" ino=16608 res=1 09:53:44 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(0xffffffffffffffff, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:53:44 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:44 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x17, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:44 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)) 09:53:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(0x0, 0x8, 0x0, 0x0, 0x0, 0x0) 09:53:44 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) [ 1291.003289][T25813] EXT4-fs error (device sda1): ext4_remount:5395: Abort forced by user [ 1291.011717][T25813] EXT4-fs (sda1): Remounting filesystem read-only 09:53:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="ec0100002800270d00"/20, @ANYRES32=r5, @ANYBLOB="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"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 1291.238038][T25806] bridge0: port 1(bridge_slave_0) entered disabled state 09:53:45 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)) [ 1291.546190][T25829] EXT4-fs error (device sda1): ext4_remount:5395: Abort forced by user [ 1291.554692][T25829] EXT4-fs (sda1): Remounting filesystem read-only [ 1291.570675][T25810] bridge0: port 1(bridge_slave_0) entered disabled state [ 1291.645024][T25818] bridge0: port 1(bridge_slave_0) entered blocking state [ 1291.652301][T25818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1291.678686][T24927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1291.690200][T24927] bridge0: port 1(bridge_slave_0) entered blocking state [ 1291.697506][T24927] bridge0: port 1(bridge_slave_0) entered forwarding state 09:53:45 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb'}}]}) 09:53:45 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) 09:53:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x17, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1292.115059][T25840] EXT4-fs error (device sda1): ext4_remount:5395: Abort forced by user [ 1292.123689][T25840] EXT4-fs (sda1): Remounting filesystem read-only [ 1292.248949][T25847] bridge0: port 1(bridge_slave_0) entered disabled state [ 1292.368925][T25849] bridge0: port 1(bridge_slave_0) entered blocking state [ 1292.376421][T25849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1292.497303][T25853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1292.640389][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1292.651954][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1292.659238][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1297.295993][ T32] audit: type=1800 audit(1583920431.359:254): pid=25860 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16534 res=0 [ 1297.319793][ T32] audit: type=1804 audit(1583920431.359:255): pid=25860 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/527/file0" dev="sda1" ino=16534 res=1 [ 1297.350241][ T32] audit: type=1804 audit(1583920431.359:256): pid=25860 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/527/file0" dev="sda1" ino=16534 res=1 09:53:51 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb'}}]}) 09:53:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0xa02000000000000, 0x60, &(0x7f0000000000)={'filter\x00', 0x2, 0x4, 0x3d0, 0x0, 0x0, 0x39e, 0x2e8, 0x2e8, 0x2e8, 0x4, 0x0, {[{{@uncond=[0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c], 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x1d8}}, {{@arp={@broadcast, @multicast2, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'netdevsim0\x00', 'ip6tnl0\x00'}, 0xc0, 0xf0}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x420) 09:53:51 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(0xffffffffffffffff, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:53:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x0, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:51 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:51 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) [ 1297.635708][T25872] EXT4-fs error (device sda1): ext4_remount:5395: Abort forced by user [ 1297.644822][T25872] EXT4-fs (sda1): Remounting filesystem read-only 09:53:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4138ae84, &(0x7f0000000000)) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) [ 1297.893782][T25865] bridge0: port 1(bridge_slave_0) entered disabled state 09:53:52 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x29408a2, &(0x7f0000000080)={[{@max_dir_size_kb={'max_dir_size_kb'}}]}) [ 1298.203505][T25891] EXT4-fs error (device sda1): ext4_remount:5395: Abort forced by user [ 1298.212199][T25891] EXT4-fs (sda1): Remounting filesystem read-only 09:53:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4138ae84, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000140)={{}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 'syz1\x00', &(0x7f0000000100)=['\x00', '{mime_typeem0em0#\x00'], 0x13}) 09:53:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x49, 0x4) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) add_key$user(&(0x7f0000000100)='user\x00', 0x0, &(0x7f0000000200), 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) 09:53:52 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) [ 1298.603211][T25869] bridge0: port 1(bridge_slave_0) entered disabled state [ 1298.802291][T25881] bridge0: port 1(bridge_slave_0) entered blocking state [ 1298.810180][T25881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1298.836143][T24927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1298.848436][T24927] bridge0: port 1(bridge_slave_0) entered blocking state [ 1298.855964][T24927] bridge0: port 1(bridge_slave_0) entered forwarding state 09:53:52 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@multicast]}) 09:53:53 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x0, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1299.337751][T25922] bridge0: port 1(bridge_slave_0) entered disabled state [ 1299.504182][T25923] bridge0: port 1(bridge_slave_0) entered disabled state [ 1299.575668][T25924] bridge0: port 1(bridge_slave_0) entered blocking state [ 1299.583038][T25924] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1299.606526][T25927] bridge0: port 1(bridge_slave_0) entered blocking state [ 1299.614113][T25927] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1304.096122][ T32] audit: type=1800 audit(1583920438.159:257): pid=25933 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16651 res=0 [ 1304.119893][ T32] audit: type=1804 audit(1583920438.159:258): pid=25933 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/528/file0" dev="sda1" ino=16651 res=1 [ 1304.147987][ T32] audit: type=1804 audit(1583920438.169:259): pid=25933 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/528/file0" dev="sda1" ino=16651 res=1 09:53:58 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:53:58 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0), &(0x7f0000000440)=0x8) r1 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) dup2(r1, r2) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 09:53:58 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) 09:53:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x0, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:58 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:53:58 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x89ec, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) 09:53:58 executing program 4: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)=ANY=[@ANYPTR64=&(0x7f0000000600)=ANY=[@ANYBLOB="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"]], 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x390, 0xfffffffffffffffb) 09:53:58 executing program 2: prlimit64(0x0, 0x6, &(0x7f0000000280), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x50) 09:53:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x240087bd, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, &(0x7f0000000000)='\f', 0xfb386d1f6a4fd57d, 0x400800a, 0x0, 0xae19fea218018fd) recvfrom$inet(r1, &(0x7f0000000080)=""/8, 0xfffffffffffffe6a, 0x700, 0x0, 0xb84608a41099d4b8) [ 1304.740579][T25958] dns_resolver: Unsupported content type (6) [ 1304.842163][T25940] bridge0: port 1(bridge_slave_0) entered disabled state [ 1305.166896][T25942] bridge0: port 1(bridge_slave_0) entered disabled state 09:53:59 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) 09:53:59 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10, 0x0}, 0x20004004) recvmsg$kcm(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x2) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1305.487231][T24927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1305.498856][T24927] bridge0: port 1(bridge_slave_0) entered blocking state [ 1305.506195][T24927] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1305.517699][T24927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1305.528033][T24927] bridge0: port 1(bridge_slave_0) entered blocking state [ 1305.535325][T24927] bridge0: port 1(bridge_slave_0) entered forwarding state 09:53:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x0, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1306.190374][T25987] bridge0: port 1(bridge_slave_0) entered disabled state [ 1306.252287][T25988] bridge0: port 1(bridge_slave_0) entered blocking state [ 1306.259773][T25988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1310.895710][ T32] audit: type=1800 audit(1583920444.959:260): pid=25993 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16538 res=0 [ 1310.919549][ T32] audit: type=1804 audit(1583920444.959:261): pid=25993 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/529/file0" dev="sda1" ino=16538 res=1 [ 1310.947576][ T32] audit: type=1804 audit(1583920444.959:262): pid=25993 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/529/file0" dev="sda1" ino=16538 res=1 09:54:05 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9d7}], 0x1, 0x0) r1 = getpid() r2 = gettid() tkill(r2, 0x15) ptrace(0x10, r1) ptrace$cont(0x420e, r1, 0x2, 0x20007ff6) 09:54:05 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:05 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:54:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x240087bd, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, &(0x7f0000000000)='\f', 0xfb386d1f6a4fd57d, 0x400800a, 0x0, 0xae19fea218018fd) recvfrom$inet(r1, &(0x7f0000000080)=""/8, 0xfffffffffffffe6a, 0x700, 0x0, 0xb84608a41099d4b8) 09:54:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x0, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:05 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) [ 1311.366890][T25997] bridge0: port 1(bridge_slave_0) entered disabled state [ 1311.456268][T26004] bridge0: port 1(bridge_slave_0) entered disabled state [ 1311.477324][T26011] bridge0: port 1(bridge_slave_0) entered blocking state [ 1311.484694][T26011] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1311.520158][T12126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1311.531679][T12126] bridge0: port 1(bridge_slave_0) entered blocking state [ 1311.539065][T12126] bridge0: port 1(bridge_slave_0) entered forwarding state 09:54:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x0, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:06 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1311.985807][T26017] bridge0: port 1(bridge_slave_0) entered disabled state [ 1312.052300][T26017] bridge0: port 1(bridge_slave_0) entered blocking state [ 1312.059673][T26017] bridge0: port 1(bridge_slave_0) entered forwarding state 09:54:06 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) 09:54:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) socket(0x11, 0x800000003, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1312.404660][T26021] bridge0: port 1(bridge_slave_0) entered disabled state 09:54:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@empty, 0x2}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1312.592405][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1312.603836][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1312.611051][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1312.635180][T26030] bridge0: port 1(bridge_slave_0) entered disabled state 09:54:06 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1313.033225][T26041] bridge0: port 1(bridge_slave_0) entered disabled state [ 1313.130161][T26042] bridge0: port 1(bridge_slave_0) entered blocking state [ 1313.137550][T26042] bridge0: port 1(bridge_slave_0) entered forwarding state 09:54:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x7fffffff, 0x0, [{}, {}, {}, {}, {}, {0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xff}]}}) 09:54:08 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) r1 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r1, r2) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) read(0xffffffffffffffff, 0x0, 0x0) 09:54:12 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:54:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:12 executing program 4: r0 = perf_event_open(&(0x7f0000001200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps_rollup\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f0, 0x0, 0x0, 0x0, 0x110, 0x0, 0x220, 0x220, 0x220, 0x220, 0x220, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'ip6gretap0\x00', 'batadv_slave_0\x00'}, 0x0, 0xf0, 0x110, 0x0, {}, [@common=@unspec=@helper={{0x48, 'helper\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x350) fcntl$getown(0xffffffffffffffff, 0x9) r4 = memfd_create(&(0x7f0000000200)='\vem1\xc1\xf8\xa6\x8dN\xaa\xa2\xac#*\xef\xd9NeX\xab#\xcc\x942\xd3\xb44\xf0#oT\t$\xca\xcd\xd6\xbe\x17\x9d\xfd\x15\x98_\xda\xc5\xda424\xf0\xc7v\xe3PJ\xae\xb9n\xda]tq\xec\xb5\xbav\xd8\xd3\xbb\x1a7\xe43\x7f\x8b\t\x15\xe3F:AhJ\xb8W\x0fM\xc8\xc2AT\a1\xcf\xbc\xc4&)\xcd\x12\x1e\x9c\xdagia\xdd\x1dg\x89\x9c\x8f\x9e\x01\x81?\xc1^\t\xa5\xa8o_\xb4\xa3\xb5\xa9R\xe3\xc2\x91\x90\xf86\xd2#\x00\xfa)\xac\t[\x853\xd7q\x02\x83\x12\xfc\rN\x80\x88\xfc\xff\xbdw\xb6(BK\x9b\xacz\x9a\xb2\xdb\x03\xdcf\xba`.8\xbd0)s\x11\xa3b\x91\x85\x7f|\x03\x1cI74\xa9\xf6\xce%\x9d\x95\xd6\x15\xe5{}p\t\xb9\xd9\xaf\xe6\xb4KZ\xb710\x95\xb7\x96\xe1\xd3\xe4\xa1\xa1T[!Z\a\xee\x10D\xea\xc2\x9f9\x94\x9fL9\xfb\xd1\x9a\x13\x1f\xafhm\xda\x7f\x9en\x97\xb3\x1b6\xff \xa8\xd2\\\xda\x13\xd8%\xfe\v\x84\xdcp\xfb\xbbI\xaeh\xc3\xd3\xf36\xb4DAS\x8e\x99\x9b\x94\x03\xeeA5G6\x89\xd9u\x96F\xe1\xf5C%7\x05\x1a\x9c', 0x0) sendfile(r4, r1, 0x0, 0x7) 09:54:12 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) 09:54:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) socket(0x11, 0x800000003, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1318.606866][T26070] mmap: syz-executor.4 (26070) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 1318.790140][T26060] bridge0: port 1(bridge_slave_0) entered disabled state 09:54:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000cc0)=ANY=[@ANYRES16=0x0, @ANYBLOB="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"], 0x2}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) [ 1318.982112][T24927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1318.992609][T24927] bridge0: port 1(bridge_slave_0) entered blocking state [ 1318.999826][T24927] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1319.149896][T26068] bridge0: port 1(bridge_slave_0) entered disabled state 09:54:13 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) shutdown(0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) dup2(r1, r0) [ 1319.320948][T26072] bridge0: port 1(bridge_slave_0) entered blocking state [ 1319.328311][T26072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1319.350627][T24506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1319.361031][T24506] bridge0: port 1(bridge_slave_0) entered blocking state [ 1319.368560][T24506] bridge0: port 1(bridge_slave_0) entered forwarding state 09:54:13 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) 09:54:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x0, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) socket(0x11, 0x800000003, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1319.643326][T26067] bridge0: port 1(bridge_slave_0) entered disabled state 09:54:13 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r1}, 0xc) bpf$MAP_DELETE_ELEM(0x4, &(0x7f00000007c0)={r2, 0x0, 0x719000}, 0x20) [ 1320.115409][T26096] bridge0: port 1(bridge_slave_0) entered disabled state [ 1320.250404][T26099] bridge0: port 1(bridge_slave_0) entered disabled state [ 1320.268888][T26105] bridge0: port 1(bridge_slave_0) entered blocking state [ 1320.276518][T26105] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1320.301153][T26104] bridge0: port 1(bridge_slave_0) entered blocking state [ 1320.309064][T26104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1322.736781][ T32] audit: type=1800 audit(1583920456.799:263): pid=26114 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16708 res=0 [ 1324.816313][ T32] audit: type=1804 audit(1583920458.879:264): pid=26114 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/531/file0" dev="sda1" ino=16708 res=1 [ 1324.844784][ T32] audit: type=1804 audit(1583920458.879:265): pid=26114 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir238570954/syzkaller.w1dNDZ/531/file0" dev="sda1" ino=16708 res=1 09:54:19 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(0x0, 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:54:19 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)="2e00000015008105e00f80ecdb4cb92e0a78022c15000000160001008e7948f328995a017c7b58510600000001ff", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$kcm(r1, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x7) socketpair(0x0, 0x0, 0x0, 0x0) r2 = socket$kcm(0x11, 0x0, 0x0) r3 = socket$kcm(0x11, 0x8000000000000003, 0x0) sendmsg(r3, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)) 09:54:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000007780)={&(0x7f0000000000)=@caif, 0x80, 0x0}, 0x0) 09:54:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x0, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00'}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:19 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) 09:54:19 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) dup2(r1, r0) socket$unix(0x1, 0x0, 0x0) [ 1325.319153][T26123] bridge0: port 1(bridge_slave_0) entered disabled state [ 1325.586581][T26125] bridge0: port 1(bridge_slave_0) entered disabled state [ 1325.709783][T24608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1325.720185][T24608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1325.727935][T24608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1325.738037][T24608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1325.749098][T24608] bridge0: port 1(bridge_slave_0) entered blocking state 09:54:19 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="f13c906d6b66732e666174000804010002000270fff8", 0x16}], 0x0, 0x0) [ 1325.756357][T24608] bridge0: port 1(bridge_slave_0) entered forwarding state 09:54:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x0, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00'}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000540)=ANY=[@ANYBLOB]) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000002900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=""/231, 0xe7}}, {{0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000f40)=""/185, 0xb9}], 0x1}}, {{0x0, 0x0, 0x0}, 0x72e}], 0x3, 0x40000103, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000340)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) syz_open_dev$rtc(0x0, 0x0, 0x48000) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) writev(r5, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="e23240bc066616fe9c3599d486007a58b9fe33a3a6069f9224319424028eac6b81b1ee9f996559c9fd", @ANYRES32, @ANYRES32], 0x3, 0x2) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 09:54:20 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) [ 1326.485046][T26157] bridge0: port 1(bridge_slave_0) entered disabled state [ 1326.715865][T26159] bridge0: port 1(bridge_slave_0) entered disabled state [ 1326.800557][T26166] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1327.013576][T26165] bridge0: port 1(bridge_slave_0) entered blocking state [ 1327.020980][T26165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1327.036983][T26168] bridge0: port 1(bridge_slave_0) entered blocking state [ 1327.044517][T26168] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1327.063053][T26169] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1329.376918][ T32] audit: type=1800 audit(1583920463.439:266): pid=26178 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16709 res=0 09:54:25 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(0x0, 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:54:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet6_int(r1, 0x29, 0x19, 0x0, &(0x7f0000000140)) memfd_create(0x0, 0x0) 09:54:25 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1900ffff00000000f19300000000022959de1983e54c6c7127cba50100000000000000002000"/47], 0x6) 09:54:25 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) 09:54:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x0, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:25 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00'}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:25 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf92a1a7511bf746bec66ba", 0x1334, 0x11, 0x0, 0x27) 09:54:26 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f00000004c0)=""/152) [ 1331.954850][T26189] bridge0: port 1(bridge_slave_0) entered disabled state 09:54:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x30, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xfffffe1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="7400000000011905000000000000000000000000240001001400010008000100ac1414aa08000200e00000000c0002000500010000000000240002000c000200050001000000000014000100080001000000000008000200000000000800070000000000100005"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) 09:54:26 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000340)='\xf8t\x82\xa5\xae\x02\xd2zd\xfdo*mI\xb8E\x12\t\xc2\xfc\x94\'\xd3\x1d\xcfjr\b\xbe\x88\xbf\xf5\xc6\xb4\xd0v\x01\a\xf9\xa6\xdc\xdf=\xb6\x90V\xc5/J\xe6\xd3>\xdb\xff\a+5jh9\x89G\x18Wh\a|N\x9f\x1e\x16P\xe6\a0\x05\x88\xdd\xb2f\x18B\xbat\xe6\xab\xa8NT&\xa1\xa9\xd3\x8ca\xb6\xccA\x06\xfa\x15E\xa9\xd1\x1dP3\xf74\xfby\x96#\xe1\xec\xc0\x91irU\x04k\x1d\xf8w\x04\xe3\xe6FIZ\xe5\x87\xb5;wk\t\fH/3|\xca+G\xec6\xf8\xf9\xdbi\xd7\xb9\xb7\\\xbb') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) [ 1332.391361][T26188] bridge0: port 1(bridge_slave_0) entered disabled state [ 1332.568171][T26211] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1332.591299][T26197] bridge0: port 1(bridge_slave_0) entered blocking state [ 1332.598677][T26197] bridge0: port 1(bridge_slave_0) entered forwarding state 09:54:26 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) [ 1332.622601][T24608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1332.632929][T24608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1332.640156][T24608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1332.655893][ T32] audit: type=1326 audit(1583920466.719:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=26213 comm=F87482A5AE02D27A64FD6F2A6D49B8 exe="/root/syz-executor.2" sig=9 arch=40000003 syscall=265 compat=1 ip=0xf7f25d99 code=0x0 09:54:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x0, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1332.861306][T26215] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1333.181616][T26226] bridge0: port 1(bridge_slave_0) entered disabled state [ 1333.254414][T12126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1333.265425][T12126] bridge0: port 1(bridge_slave_0) entered blocking state [ 1333.272771][T12126] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1333.437193][ T32] audit: type=1326 audit(1583920467.499:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=26213 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=40000003 syscall=265 compat=1 ip=0xf7f25d99 code=0x0 [ 1336.016531][ T32] audit: type=1800 audit(1583920470.079:269): pid=26234 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16718 res=0 09:54:32 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) dup2(r1, r0) 09:54:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:32 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(0x0, 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:54:32 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) 09:54:32 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) syz_open_dev$sndtimer(0x0, 0x0, 0x0) creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000001000)=0x63, 0x2) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = dup(r0) r2 = open(0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r3, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) msgget$private(0x0, 0x204) msgctl$IPC_STAT(0x0, 0x2, 0x0) 09:54:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x0, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1338.589436][T26243] bridge0: port 1(bridge_slave_0) entered disabled state 09:54:32 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1338.979773][T26242] bridge0: port 1(bridge_slave_0) entered disabled state 09:54:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000540)=ANY=[@ANYBLOB="27770516165493a969cd70b507ec772f06302875180d025f0b5e902acb8bfc01078463629004d587b0f6b539617ccd7d5a5fbd992336ad0ee4c99ff4f21204b000c0be0c0d6fbaf99f5187e89fdf85df7ddb7975bf8f650c9fe5beeca74610b57e1f615d2d023223cbc88737f1092e633fac83ebe03aa22135fe1a"]) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000002d80)={@dev={0xac, 0x14, 0x14, 0x43}, @empty, r1}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000002900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=""/231, 0xe7}}, {{&(0x7f0000000e00)=@nfc, 0x80, &(0x7f0000001000)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=""/232, 0xe8}}, {{&(0x7f0000001500), 0x80, 0x0}}], 0x4, 0x40000103, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000340)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) syz_open_dev$rtc(0x0, 0x0, 0x48000) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="e23240bc066616fe9c3599d486007a58b9fe33a3a6069f9224319424028eac6b81b1ee9f996559c9fde0bd5c6f5e39d14197251b86061b56b2846c3e4f7b84202930d1bb4cd7c43afeec02d9e0", @ANYRES32, @ANYRES32], 0x3, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 09:54:33 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="000826bd7000ffdbdf25010000001400020076652f340000746f5f6200640000000900010073797a0202e3ff000900030073797a00c05a60cd873b57b05a1b94c46aebe95bcba01f6a465bc6f4145769c0f4c08b102ef4a0f445cd648685b0eae2653331262eb4ed541218dca7150ccc7528a42ac64263e7be2f47c6b3dd4adf182f98986b4988998d80acda0332b6e40c3bb4c25ac9bf9d8490be6b7e72d171a07971224109a99456aeaed10f341b72d57381b077bf7045ac43b2d9773531230d3b"], 0x3}}, 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 09:54:33 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) [ 1339.180189][T26249] bridge0: port 1(bridge_slave_0) entered blocking state [ 1339.187552][T26249] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1339.211503][T24562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1339.221585][T24562] bridge0: port 1(bridge_slave_0) entered blocking state [ 1339.228930][T24562] bridge0: port 1(bridge_slave_0) entered forwarding state 09:54:33 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:33 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) socket(0x11, 0x800000003, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1339.425328][T26272] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1339.438995][T26274] dns_resolver: Unsupported server list version (0) [ 1339.466985][T26275] dns_resolver: Unsupported server list version (0) 09:54:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="000826bd7000ffdbdf25010000001400020076652f340000746f5f6200640000000900010073797a0202e3ff000900030073797a00c05a60cd873b57b05a1b94c46aebe95bcba01f6a465bc6f4145769c0f4c08b102ef4a0f445cd648685b0eae2653331262eb4ed541218dca7150ccc7528a42ac64263e7be2f47c6b3dd4adf182f98986b4988998d80acda0332b6e40c3bb4c25ac9bf9d8490be6b7e72d171a07971224109a99456aeaed10f341b72d57381b077bf7045ac43b2d9773531230d3b"], 0x3}, 0x1, 0x0, 0x0, 0xc000}, 0x40080) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) [ 1339.804259][T26289] dns_resolver: Unsupported server list version (0) [ 1339.844573][T26278] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1339.864104][T26289] dns_resolver: Unsupported server list version (0) 09:54:34 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xffffffffa0018000, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={0x2, 0x2, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 1339.969159][T26283] bridge0: port 1(bridge_slave_0) entered disabled state [ 1340.246872][T26284] bridge0: port 1(bridge_slave_0) entered disabled state [ 1340.404688][T26286] bridge0: port 1(bridge_slave_0) entered blocking state [ 1340.412005][T26286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1340.427304][T26288] bridge0: port 1(bridge_slave_0) entered blocking state [ 1340.434687][T26288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1342.576124][ T32] audit: type=1800 audit(1583920476.639:270): pid=26300 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16726 res=0 09:54:38 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(0x0, 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:54:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000540)=ANY=[@ANYBLOB="27770516165493a969cd70b507ec772f06302875180d025f0b5e902acb8bfc01078463629004d587b0f6b539617ccd7d5a5fbd992336ad0ee4c99ff4f21204b000c0be0c0d6fbaf99f5187e89fdf85df7ddb7975bf8f650c9fe5beeca74610b57e1f615d2d023223cbc88737f1092e633fac83ebe03aa22135fe1a"]) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000002d80)={@dev={0xac, 0x14, 0x14, 0x43}, @empty, r1}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000002900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=""/231, 0xe7}}, {{&(0x7f0000000e00)=@nfc, 0x80, &(0x7f0000001000)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=""/232, 0xe8}}, {{&(0x7f0000001500), 0x80, 0x0}}], 0x4, 0x40000103, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000340)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) syz_open_dev$rtc(0x0, 0x0, 0x48000) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="e23240bc066616fe9c3599d486007a58b9fe33a3a6069f9224319424028eac6b81b1ee9f996559c9fde0bd5c6f5e39d14197251b86061b56b2846c3e4f7b84202930d1bb4cd7c43afeec02d9e0", @ANYRES32, @ANYRES32], 0x3, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 09:54:38 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) 09:54:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x40, 0x0, @loopback, 0x40}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xf31706a800) 09:54:38 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) socket(0x11, 0x800000003, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:38 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1345.301147][T26309] bridge0: port 1(bridge_slave_0) entered disabled state 09:54:39 executing program 4: dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') pipe(0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000600)=ANY=[@ANYBLOB="40001d00", @ANYRES16, @ANYBLOB="000826bd7000ffdbdf25010000001400020076652f340000746f5f6200640000000900010073797a0202e3ff000900030073797a00c05a60cd873b57b05a1b94c46aebe95bcba01f6a465bc6f4145769c0f4c08b102ef4a0f445cd648685b0eae2653331262eb4ed541218dca7150ccc7528a42ac64263e7be2f47c6b3dd4adf182f98986b4988998d80acda0332b6e40c3bb4c25ac9bf9d8490be6b7e72d171a07971224109a99456aeaed10f341b72d57381b077bf7045ac43b2d9773531230d3b"], 0x3}, 0x1, 0x0, 0x0, 0xc000}, 0x40080) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) [ 1345.635274][T26312] bridge0: port 1(bridge_slave_0) entered disabled state 09:54:39 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) [ 1345.791659][T26316] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1345.979317][T26325] dns_resolver: Unsupported server list version (0) [ 1346.027641][T26315] bridge0: port 1(bridge_slave_0) entered blocking state [ 1346.034988][T26315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1346.046886][T26318] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1346.071325][T24608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1346.081392][T24608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1346.082516][T26329] dns_resolver: Unsupported server list version (0) [ 1346.088655][T24608] bridge0: port 1(bridge_slave_0) entered forwarding state 09:54:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000540)=ANY=[@ANYBLOB="27770516165493a969cd70b507ec772f06302875180d025f0b5e902acb8bfc01078463629004d587b0f6b539617ccd7d5a5fbd992336ad0ee4c99ff4f21204b000c0be0c0d6fbaf99f5187e89fdf85df7ddb7975bf8f650c9fe5beeca74610b57e1f615d2d023223cbc88737f1092e633fac83ebe03aa22135fe1a"]) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000002d80)={@dev={0xac, 0x14, 0x14, 0x43}, @empty, r1}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000002900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=""/231, 0xe7}}, {{&(0x7f0000000e00)=@nfc, 0x80, &(0x7f0000001000)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=""/232, 0xe8}}, {{&(0x7f0000001500), 0x80, 0x0}}], 0x4, 0x40000103, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000340)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) syz_open_dev$rtc(0x0, 0x0, 0x48000) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="e23240bc066616fe9c3599d486007a58b9fe33a3a6069f9224319424028eac6b81b1ee9f996559c9fde0bd5c6f5e39d14197251b86061b56b2846c3e4f7b84202930d1bb4cd7c43afeec02d9e0", @ANYRES32, @ANYRES32], 0x3, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 09:54:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00'}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x17, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="7400000000011905000000000000000000000000240001001400010008000100ac1414aa08000200e00000000c0002000500010000000000240002000c00020005000100000000001400010008000100000000000800020000000000080007"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 09:54:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) socket(0x11, 0x800000003, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1346.520882][T26341] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1346.612982][T26340] bridge0: port 1(bridge_slave_0) entered disabled state [ 1346.656852][T26341] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1346.756331][T26343] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1347.151868][T26345] bridge0: port 1(bridge_slave_0) entered disabled state [ 1347.224869][T26346] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1347.245429][T26347] bridge0: port 1(bridge_slave_0) entered blocking state [ 1347.252803][T26347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1347.270820][T24608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1347.280863][T24608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1347.288165][T24608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1349.215192][ T32] audit: type=1800 audit(1583920483.279:271): pid=26355 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16733 res=0 09:54:45 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(0x0, 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:54:45 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) 09:54:45 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x42, 0x100) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r4, 0xc0a85352, &(0x7f00000003c0)={{0x7f, 0x70}, 'port0\x00', 0x86, 0x20004, 0xc0000000, 0x4, 0x76, 0x2, 0x7, 0x0, 0x2, 0x6}) readv(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='devtmpfs\x00', 0x0, 0x0) r5 = epoll_create1(0x0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f0000c85000)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000380)=0x96c, 0x3f604d6a, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) chdir(&(0x7f00000000c0)='./file0\x00') r7 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x1000100) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000140)='NLBL_UNLBL\x00') 09:54:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000540)=ANY=[@ANYBLOB="27770516165493a969cd70b507ec772f06302875180d025f0b5e902acb8bfc01078463629004d587b0f6b539617ccd7d5a5fbd992336ad0ee4c99ff4f21204b000c0be0c0d6fbaf99f5187e89fdf85df7ddb7975bf8f650c9fe5beeca74610b57e1f615d2d023223cbc88737f1092e633fac83ebe03aa22135fe1a"]) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000002d80)={@dev={0xac, 0x14, 0x14, 0x43}, @empty, r1}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000002900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=""/231, 0xe7}}, {{&(0x7f0000000e00)=@nfc, 0x80, &(0x7f0000001000)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=""/232, 0xe8}}, {{&(0x7f0000001500), 0x80, 0x0}}], 0x4, 0x40000103, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000340)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) syz_open_dev$rtc(0x0, 0x0, 0x48000) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="e23240bc066616fe9c3599d486007a58b9fe33a3a6069f9224319424028eac6b81b1ee9f996559c9fde0bd5c6f5e39d14197251b86061b56b2846c3e4f7b84202930d1bb4cd7c43afeec02d9e0", @ANYRES32, @ANYRES32], 0x3, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 09:54:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00'}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x17, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:45 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00'}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1351.736487][T26361] bridge0: port 1(bridge_slave_0) entered disabled state [ 1351.907763][T26366] bridge0: port 1(bridge_slave_0) entered disabled state [ 1351.997931][T26369] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1352.208147][T26370] bridge0: port 1(bridge_slave_0) entered blocking state [ 1352.215505][T26370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1352.236210][T26375] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1352.261110][T24608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1352.271454][T24608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1352.278823][T24608] bridge0: port 1(bridge_slave_0) entered forwarding state 09:54:46 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00'}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x17, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:46 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) 09:54:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00'}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:46 executing program 4: syz_open_dev$sndtimer(0x0, 0x0, 0x0) creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) msgget$private(0x0, 0x204) msgctl$IPC_STAT(0x0, 0x2, &(0x7f00000002c0)=""/106) 09:54:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000540)=ANY=[@ANYBLOB="27770516165493a969cd70b507ec772f06302875180d025f0b5e902acb8bfc01078463629004d587b0f6b539617ccd7d5a5fbd992336ad0ee4c99ff4f21204b000c0be0c0d6fbaf99f5187e89fdf85df7ddb7975bf8f650c9fe5beeca74610b57e1f615d2d023223cbc88737f1092e633fac83ebe03aa22135fe1a"]) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000002d80)={@dev={0xac, 0x14, 0x14, 0x43}, @empty, r1}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000002900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=""/231, 0xe7}}, {{&(0x7f0000000e00)=@nfc, 0x80, &(0x7f0000001000)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=""/232, 0xe8}}, {{&(0x7f0000001500), 0x80, 0x0}}], 0x4, 0x40000103, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000340)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) syz_open_dev$rtc(0x0, 0x0, 0x48000) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="e23240bc066616fe9c3599d486007a58b9fe33a3a6069f9224319424028eac6b81b1ee9f996559c9fde0bd5c6f5e39d14197251b86061b56b2846c3e4f7b84202930d1bb4cd7c43afeec02d9e0", @ANYRES32, @ANYRES32], 0x3, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1352.872932][T26382] bridge0: port 1(bridge_slave_0) entered disabled state 09:54:47 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) [ 1353.980020][T26389] bridge0: port 1(bridge_slave_0) entered disabled state [ 1354.068391][T26394] bridge0: port 1(bridge_slave_0) entered blocking state [ 1354.075647][T26394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1354.087507][T26397] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1354.270511][T26399] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1354.288027][T24563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1354.298461][T24563] bridge0: port 1(bridge_slave_0) entered blocking state [ 1354.305778][T24563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1357.857274][ T32] audit: type=1800 audit(1583920491.919:272): pid=26410 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16751 res=0 09:54:52 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(0x0, 0x8207d, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:54:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:52 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x2000073d, &(0x7f0000e68000)={0x2, 0x0, @empty}, 0x1) 09:54:52 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00'}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:54:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000540)=ANY=[@ANYBLOB="27770516165493a969cd70b507ec772f06302875180d025f0b5e902acb8bfc01078463629004d587b0f6b539617ccd7d5a5fbd992336ad0ee4c99ff4f21204b000c0be0c0d6fbaf99f5187e89fdf85df7ddb7975bf8f650c9fe5beeca74610b57e1f615d2d023223cbc88737f1092e633fac83ebe03aa22135fe1a"]) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000002d80)={@dev={0xac, 0x14, 0x14, 0x43}, @empty, r1}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000002900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=""/231, 0xe7}}, {{&(0x7f0000000e00)=@nfc, 0x80, &(0x7f0000001000)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=""/232, 0xe8}}, {{&(0x7f0000001500), 0x80, 0x0}}], 0x4, 0x40000103, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000340)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) syz_open_dev$rtc(0x0, 0x0, 0x48000) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="e23240bc066616fe9c3599d486007a58b9fe33a3a6069f9224319424028eac6b81b1ee9f996559c9fde0bd5c6f5e39d14197251b86061b56b2846c3e4f7b84202930d1bb4cd7c43afeec02d9e0", @ANYRES32, @ANYRES32], 0x3, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:52 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) [ 1358.915698][T26418] bridge0: port 1(bridge_slave_0) entered disabled state 09:54:53 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x3, 0xfffffffffffffffd, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmmsg(0xffffffffffffffff, &(0x7f0000005600)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) r0 = creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000001000)=0x63, 0x2) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000580)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) r4 = dup(r2) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f0000000340)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r5, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r5, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f00000002c0)=""/106) 09:54:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1359.251843][T26422] bridge0: port 1(bridge_slave_0) entered disabled state [ 1359.327282][ T32] audit: type=1804 audit(1583920493.389:273): pid=26431 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir137566825/syzkaller.QJKr2N/678/bus" dev="sda1" ino=16768 res=1 [ 1359.450789][T26423] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:54:53 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) 09:54:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000540)=ANY=[@ANYBLOB="27770516165493a969cd70b507ec772f06302875180d025f0b5e902acb8bfc01078463629004d587b0f6b539617ccd7d5a5fbd992336ad0ee4c99ff4f21204b000c0be0c0d6fbaf99f5187e89fdf85df7ddb7975bf8f650c9fe5beeca74610b57e1f615d2d023223cbc88737f1092e633fac83ebe03aa22135fe1a"]) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000002d80)={@dev={0xac, 0x14, 0x14, 0x43}, @empty, r1}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000002900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=""/231, 0xe7}}, {{&(0x7f0000000e00)=@nfc, 0x80, &(0x7f0000001000)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=""/232, 0xe8}}, {{&(0x7f0000001500), 0x80, 0x0}}], 0x4, 0x40000103, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000340)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) syz_open_dev$rtc(0x0, 0x0, 0x48000) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="e23240bc066616fe9c3599d486007a58b9fe33a3a6069f9224319424028eac6b81b1ee9f996559c9fde0bd5c6f5e39d14197251b86061b56b2846c3e4f7b84202930d1bb4cd7c43afeec02d9e0", @ANYRES32, @ANYRES32], 0x3, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1360.329910][T26426] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1360.348265][T12126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1360.360110][T12126] bridge0: port 1(bridge_slave_0) entered blocking state [ 1360.367443][T12126] bridge0: port 1(bridge_slave_0) entered forwarding state 09:54:54 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00'}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1360.454052][ T32] audit: type=1804 audit(1583920494.519:274): pid=26433 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir137566825/syzkaller.QJKr2N/678/bus" dev="sda1" ino=16768 res=1 09:54:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1360.630488][T26446] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1360.958276][T26448] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1361.112219][T26453] bridge0: port 1(bridge_slave_0) entered disabled state [ 1361.241432][T26456] bridge0: port 1(bridge_slave_0) entered blocking state [ 1361.248980][T26456] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1363.135381][ T32] audit: type=1800 audit(1583920497.199:275): pid=26461 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16785 res=0 09:54:59 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:54:59 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x3, 0xfffffffffffffffd, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmmsg(0xffffffffffffffff, &(0x7f0000005600)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) r0 = creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000001000)=0x63, 0x2) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000580)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) r4 = dup(r2) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f0000000340)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r5, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r5, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f00000002c0)=""/106) 09:54:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) 09:54:59 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) 09:54:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000540)=ANY=[@ANYBLOB="27770516165493a969cd70b507ec772f06302875180d025f0b5e902acb8bfc01078463629004d587b0f6b539617ccd7d5a5fbd992336ad0ee4c99ff4f21204b000c0be0c0d6fbaf99f5187e89fdf85df7ddb7975bf8f650c9fe5beeca74610b57e1f615d2d023223cbc88737f1092e633fac83ebe03aa22135fe1a"]) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000002d80)={@dev={0xac, 0x14, 0x14, 0x43}, @empty, r1}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000002900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=""/231, 0xe7}}, {{&(0x7f0000000e00)=@nfc, 0x80, &(0x7f0000001000)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=""/232, 0xe8}}, {{&(0x7f0000001500), 0x80, 0x0}}], 0x4, 0x40000103, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000340)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) syz_open_dev$rtc(0x0, 0x0, 0x48000) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="e23240bc066616fe9c3599d486007a58b9fe33a3a6069f9224319424028eac6b81b1ee9f996559c9fde0bd5c6f5e39d14197251b86061b56b2846c3e4f7b84202930d1bb4cd7c43afeec02d9e0", @ANYRES32, @ANYRES32], 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 09:54:59 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00'}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1365.619781][ T32] audit: type=1804 audit(1583920499.679:276): pid=26464 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir137566825/syzkaller.QJKr2N/679/bus" dev="sda1" ino=16915 res=1 09:54:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) [ 1365.762220][T26472] bridge0: port 1(bridge_slave_0) entered disabled state 09:55:00 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) getpid() r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) [ 1366.509663][T26476] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:55:00 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x3, 0xfffffffffffffffd, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmmsg(0xffffffffffffffff, &(0x7f0000005600)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) r0 = creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000001000)=0x63, 0x2) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000580)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) r4 = dup(r2) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f0000000340)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r5, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r5, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f00000002c0)=""/106) [ 1366.795011][T26479] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1366.817586][T12126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1366.829152][T12126] bridge0: port 1(bridge_slave_0) entered blocking state [ 1366.836501][T12126] bridge0: port 1(bridge_slave_0) entered forwarding state 09:55:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000540)=ANY=[@ANYBLOB="27770516165493a969cd70b507ec772f06302875180d025f0b5e902acb8bfc01078463629004d587b0f6b539617ccd7d5a5fbd992336ad0ee4c99ff4f21204b000c0be0c0d6fbaf99f5187e89fdf85df7ddb7975bf8f650c9fe5beeca74610b57e1f615d2d023223cbc88737f1092e633fac83ebe03aa22135fe1a"]) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000002d80)={@dev={0xac, 0x14, 0x14, 0x43}, @empty, r1}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000002900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=""/231, 0xe7}}, {{&(0x7f0000000e00)=@nfc, 0x80, &(0x7f0000001000)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=""/232, 0xe8}}, {{&(0x7f0000001500), 0x80, 0x0}}], 0x4, 0x40000103, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000340)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) syz_open_dev$rtc(0x0, 0x0, 0x48000) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="e23240bc066616fe9c3599d486007a58b9fe33a3a6069f9224319424028eac6b81b1ee9f996559c9fde0bd5c6f5e39d14197251b86061b56b2846c3e4f7b84202930d1bb4cd7c43afeec02d9e0", @ANYRES32, @ANYRES32], 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 1366.977899][ T32] audit: type=1804 audit(1583920501.039:277): pid=26492 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir137566825/syzkaller.QJKr2N/680/bus" dev="sda1" ino=16980 res=1 09:55:01 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00'}) r2 = socket(0x11, 0x800000003, 0x0) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 09:55:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) [ 1367.480409][T26500] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1367.891889][T26504] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1368.180465][T26505] bridge0: port 1(bridge_slave_0) entered disabled state [ 1368.228703][T26508] bridge0: port 1(bridge_slave_0) entered blocking state [ 1368.236004][T26508] bridge0: port 1(bridge_slave_0) entered forwarding state 09:55:06 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/84, 0x54}], 0x1) r5 = dup2(r4, r4) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r6, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) 09:55:06 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x121800) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8f}, 0x0) getpid() r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) 09:55:06 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) shutdown(r0, 0x0) 09:55:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x17, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00'}) 09:55:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000540)=ANY=[@ANYBLOB="27770516165493a969cd70b507ec772f06302875180d025f0b5e902acb8bfc01078463629004d587b0f6b539617ccd7d5a5fbd992336ad0ee4c99ff4f21204b000c0be0c0d6fbaf99f5187e89fdf85df7ddb7975bf8f650c9fe5beeca74610b57e1f615d2d023223cbc88737f1092e633fac83ebe03aa22135fe1a"]) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000002d80)={@dev={0xac, 0x14, 0x14, 0x43}, @empty, r1}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000002900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=""/231, 0xe7}}, {{&(0x7f0000000e00)=@nfc, 0x80, &(0x7f0000001000)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=""/232, 0xe8}}, {{&(0x7f0000001500), 0x80, 0x0}}], 0x4, 0x40000103, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000340)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) syz_open_dev$rtc(0x0, 0x0, 0x48000) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="e23240bc066616fe9c3599d486007a58b9fe33a3a6069f9224319424028eac6b81b1ee9f996559c9fde0bd5c6f5e39d14197251b86061b56b2846c3e4f7b84202930d1bb4cd7c43afeec02d9e0", @ANYRES32, @ANYRES32], 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 09:55:06 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x11, 0x800000003, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) [ 1372.971654][T26522] bridge0: port 1(bridge_slave_0) entered disabled state 09:55:07 executing program 4: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'sed\x00', 0x0, 0x8000}, {@broadcast}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) [ 1373.132903][T26528] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1373.278865][T26535] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1373.288688][T26535] FAT-fs (loop4): error, fat_get_cluster: invalid start cluster (i_pos 1, start ffffffff) [ 1373.298810][T26535] FAT-fs (loop4): Filesystem has been set read-only [ 1373.305581][T26535] ===================================================== [ 1373.312627][T26535] BUG: KMSAN: uninit-value in fat_evict_inode+0x2f4/0x920 [ 1373.319750][T26535] CPU: 0 PID: 26535 Comm: syz-executor.4 Not tainted 5.6.0-rc2-syzkaller #0 [ 1373.328444][T26535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1373.338501][T26535] Call Trace: [ 1373.341809][T26535] dump_stack+0x1c9/0x220 [ 1373.346163][T26535] kmsan_report+0xf7/0x1e0 [ 1373.350602][T26535] __msan_warning+0x58/0xa0 [ 1373.355127][T26535] fat_evict_inode+0x2f4/0x920 [ 1373.359914][T26535] ? fat_write_inode+0x250/0x250 [ 1373.365819][T26535] evict+0x4ab/0xe10 [ 1373.369741][T26535] iput+0xa70/0xe10 [ 1373.373575][T26535] fat_fill_super+0x7b5c/0x89b0 [ 1373.378512][T26535] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1373.384344][T26535] ? kmsan_get_metadata+0x11d/0x180 [ 1373.389558][T26535] vfat_fill_super+0xa6/0xc0 [ 1373.394157][T26535] mount_bdev+0x654/0x880 [ 1373.399617][T26535] ? vfat_mount+0xe0/0xe0 [ 1373.403975][T26535] vfat_mount+0xc9/0xe0 [ 1373.408157][T26535] legacy_get_tree+0x169/0x2e0 [ 1373.412921][T26535] ? __fat_nfs_get_inode+0x6f0/0x6f0 [ 1373.418228][T26535] ? legacy_parse_monolithic+0x2c0/0x2c0 [ 1373.423873][T26535] vfs_get_tree+0xdd/0x580 [ 1373.428319][T26535] do_mount+0x365c/0x4ac0 [ 1373.432785][T26535] ? _copy_from_user+0x15b/0x260 [ 1373.437762][T26535] __se_compat_sys_mount+0x3a8/0xa10 [ 1373.443072][T26535] ? kmsan_get_metadata+0x4f/0x180 [ 1373.448209][T26535] __ia32_compat_sys_mount+0x157/0x1b0 [ 1373.453692][T26535] ? locks_show+0x580/0x580 [ 1373.458210][T26535] do_fast_syscall_32+0x3c7/0x6e0 [ 1373.463263][T26535] entry_SYSENTER_compat+0x68/0x77 [ 1373.468385][T26535] RIP: 0023:0xf7f0cd99 [ 1373.472641][T26535] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1373.492350][T26535] RSP: 002b:00000000f5d06ef0 EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 1373.500771][T26535] RAX: ffffffffffffffda RBX: 00000000f5d06f8c RCX: 0000000020000380 [ 1373.508754][T26535] RDX: 00000000f5d06f6c RSI: 0000000000000000 RDI: 00000000f5d06fcc [ 1373.516735][T26535] RBP: 00000000f5d07168 R08: 0000000000000000 R09: 0000000000000000 [ 1373.524714][T26535] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1373.532729][T26535] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1373.540730][T26535] [ 1373.543060][T26535] Uninit was created at: [ 1373.547317][T26535] kmsan_save_stack_with_flags+0x3c/0x90 [ 1373.552970][T26535] kmsan_alloc_page+0x12a/0x310 [ 1373.557833][T26535] __alloc_pages_nodemask+0x5712/0x5e80 [ 1373.563385][T26535] alloc_pages_current+0x67d/0x990 [ 1373.568513][T26535] alloc_slab_page+0x111/0x12f0 [ 1373.573368][T26535] new_slab+0x2bc/0x1130 [ 1373.577613][T26535] ___slab_alloc+0x1533/0x1f30 [ 1373.582375][T26535] kmem_cache_alloc+0xb23/0xd70 [ 1373.587245][T26535] fat_alloc_inode+0x58/0x120 [ 1373.591935][T26535] new_inode_pseudo+0xb1/0x590 [ 1373.596727][T26535] new_inode+0x5a/0x3d0 [ 1373.600894][T26535] fat_fill_super+0x634b/0x89b0 [ 1373.605829][T26535] msdos_fill_super+0xa3/0xc0 [ 1373.610500][T26535] mount_bdev+0x654/0x880 [ 1373.614821][T26535] msdos_mount+0xc9/0xe0 [ 1373.619059][T26535] legacy_get_tree+0x169/0x2e0 [ 1373.623823][T26535] vfs_get_tree+0xdd/0x580 [ 1373.628232][T26535] do_mount+0x365c/0x4ac0 [ 1373.632551][T26535] __se_compat_sys_mount+0x3a8/0xa10 [ 1373.637825][T26535] __ia32_compat_sys_mount+0x157/0x1b0 [ 1373.643276][T26535] do_fast_syscall_32+0x3c7/0x6e0 [ 1373.648297][T26535] entry_SYSENTER_compat+0x68/0x77 [ 1373.653389][T26535] ===================================================== [ 1373.660303][T26535] Disabling lock debugging due to kernel taint [ 1373.666438][T26535] Kernel panic - not syncing: panic_on_warn set ... [ 1373.673026][T26535] CPU: 0 PID: 26535 Comm: syz-executor.4 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 1373.683084][T26535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1373.693138][T26535] Call Trace: [ 1373.696440][T26535] dump_stack+0x1c9/0x220 [ 1373.700843][T26535] panic+0x3d5/0xc3e [ 1373.704770][T26535] kmsan_report+0x1df/0x1e0 [ 1373.709273][T26535] __msan_warning+0x58/0xa0 [ 1373.713784][T26535] fat_evict_inode+0x2f4/0x920 [ 1373.718562][T26535] ? fat_write_inode+0x250/0x250 [ 1373.723496][T26535] evict+0x4ab/0xe10 [ 1373.727401][T26535] iput+0xa70/0xe10 [ 1373.731218][T26535] fat_fill_super+0x7b5c/0x89b0 [ 1373.736106][T26535] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1373.741906][T26535] ? kmsan_get_metadata+0x11d/0x180 [ 1373.747103][T26535] vfat_fill_super+0xa6/0xc0 [ 1373.751694][T26535] mount_bdev+0x654/0x880 [ 1373.756012][T26535] ? vfat_mount+0xe0/0xe0 [ 1373.760344][T26535] vfat_mount+0xc9/0xe0 [ 1373.764505][T26535] legacy_get_tree+0x169/0x2e0 [ 1373.769261][T26535] ? __fat_nfs_get_inode+0x6f0/0x6f0 [ 1373.774546][T26535] ? legacy_parse_monolithic+0x2c0/0x2c0 [ 1373.780341][T26535] vfs_get_tree+0xdd/0x580 [ 1373.784759][T26535] do_mount+0x365c/0x4ac0 [ 1373.789085][T26535] ? _copy_from_user+0x15b/0x260 [ 1373.794034][T26535] __se_compat_sys_mount+0x3a8/0xa10 [ 1373.799317][T26535] ? kmsan_get_metadata+0x4f/0x180 [ 1373.804446][T26535] __ia32_compat_sys_mount+0x157/0x1b0 [ 1373.809931][T26535] ? locks_show+0x580/0x580 [ 1373.814697][T26535] do_fast_syscall_32+0x3c7/0x6e0 [ 1373.819753][T26535] entry_SYSENTER_compat+0x68/0x77 [ 1373.824859][T26535] RIP: 0023:0xf7f0cd99 [ 1373.828942][T26535] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1373.848538][T26535] RSP: 002b:00000000f5d06ef0 EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 1373.856952][T26535] RAX: ffffffffffffffda RBX: 00000000f5d06f8c RCX: 0000000020000380 [ 1373.864917][T26535] RDX: 00000000f5d06f6c RSI: 0000000000000000 RDI: 00000000f5d06fcc [ 1373.872882][T26535] RBP: 00000000f5d07168 R08: 0000000000000000 R09: 0000000000000000 [ 1373.880874][T26535] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1373.888865][T26535] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1373.898140][T26535] Kernel Offset: 0x7000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 1373.909759][T26535] Rebooting in 86400 seconds..